Hacking exposed : unified communications & VoIP security secrets & solutions

The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP , Second Edition offers thoroughly expanded coverage...

Descripción completa

Detalles Bibliográficos
Otros Autores: Collier, Mark D Author (author), Endler, David Contributor (contributor), Endler, David Author
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] McGraw Hill Education 2014
Edición:1st edition
Colección:Hacking Exposed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629517306719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Acknowledgments
  • Introduction
  • Part I: Casing the Establishment
  • Case Study: Is There Really Any SIP in the Internet?
  • Scanning the Entire Internet for SIP Servers
  • Using the Shodan Search Engine to Locate Internet SIP Servers
  • 1 VoIP Targets, Threats, and Components
  • Campus/Internal UC
  • Session Initiation Protocol and SIP Trunk Threats
  • Increased Threats from the Public Voice Network
  • Hosted UC
  • Summary
  • References
  • 2 Footprinting a UC Network
  • Why Footprint First?
  • UC Footprinting Methodology
  • Summary
  • References
  • 3 Scanning a UC Network
  • Our VoIP Test Bed
  • Network Host/Device Discovery
  • Port Scanning and Service Discovery
  • Host/Device Identification
  • UC Phone Scanning and Discovery
  • Summary
  • References
  • 4 Enumerating a UC Network
  • SIP 101
  • RTP 101
  • Banner Grabbing
  • SIP User/Extension Enumeration
  • Enumeration of Other UC Support Services
  • UC Application-Level Enumeration
  • Summary
  • References
  • Part II: Application Attacks
  • Case Study: A Real-world Telephony Denial of Service (TDoS) Attack
  • The Payday Loan Scam
  • 5 Toll Fraud and Service Abuse
  • Internal Abuse of Unmonitored Phones
  • Full-Scale Toll Fraud
  • Summary
  • References
  • 6 Calling Number Spoofing
  • Calling Number 101
  • Spoofing/Masking the Calling Number with an IP PBX
  • Anonymous Calling
  • Network Services and Smartphone Apps
  • Summary
  • References
  • 7 Harassing Calls and Telephony Denial of Service (TDoS)
  • Harassing and Threatening Calls
  • Social Networking TDoS
  • Automated TDoS
  • Call Pumping
  • DTMF DoS and Fuzzing
  • Summary
  • References
  • 8 Voice SPAM
  • Understanding Voice SPAM
  • Summary
  • References
  • 9 Voice Social Engineering and Voice Phishing
  • Voice Social Engineering
  • Voice Phishing
  • Summary
  • References.
  • Part III: Exploiting the UC Network
  • Case Study: The Angry Ex-Employee
  • 10 UC Network Eavesdropping
  • UC Privacy: What's at Risk
  • First, Gain Access to the UC Traffic
  • Now That We Have Access, Let's Sniff!
  • Summary
  • References
  • 11 UC Interception and Modification
  • ARP Poisoning
  • Application-Level Interception Techniques
  • Summary
  • References
  • 12 UC Network Infrastructure Denial of Service (DoS)
  • Call and Session Quality
  • What Are DoS and DDoS Attacks?
  • Flooding Attacks
  • Network Availability Attacks
  • Supporting Infrastructure Attacks
  • Summary
  • References
  • 13 Cisco Unified Communications Manager
  • Introduction to the Basic Cisco UC Components
  • Network Reconnaissance
  • Exploiting the Network
  • Summary
  • References
  • Part IV: UC Session and Application Hacking
  • Case Study: An Attack Against Central SIP
  • 14 Fuzzing, Flooding, and Disruption of Service
  • Access to SIP and RTP
  • What Is Fuzzing?
  • Flooding
  • Summary
  • References
  • 15 Signaling Manipulation
  • Registration Manipulation
  • Redirection Attacks
  • Session Teardown
  • SIP Phone Reboot
  • Other Signaling Manipulation Tools
  • Summary
  • References
  • 16 Audio and Video Manipulation
  • Media Manipulation
  • Media "Steganophony"
  • Summary
  • References
  • 17 Emerging Technologies
  • Other Enterprise UC Systems
  • Over-the-Top (OTT)/Internet Softphone Applications
  • Mobility and Smartphones
  • Other Forms of Communications
  • Bring Your Own Device (BYOD)
  • The Cloud
  • WebRTC
  • Summary
  • References
  • Index.