Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
List of Figures
About the Authors
Contributing Author
Dedications
Chapter 1. A Brief Introduction
Abstract
Introduction to Unified Communications
Chapter 2. Spit, Phishing, and Other Social Outings
Abstract
Introduction
Conclusion
Chapter 3. Misconfiguration Begat Toll Fraud and Other VoIP Mischief
Abstract
Introduction
Conclusion
Chapter 4. Mixed Signals
Abstract
Introduction
SIP Requests
SIP Responses
Summary
Chapter 5. Can You Hear Me Now
Abstract
Introduction
Chapter 6. When SIP Attacks
Abstract
SIP Attacks: Introduction
SIP Enumeration
Attacking SIP
Conclusion
Chapter 7. Hacking the Network
Abstract
Chapter points
Introduction
Gaining Initial Access
Scanning the Network for Potential Vulnerabilities
Vulnerabilities and Exploits
Softphone Exploits
Maintaining Access
Chapter 8. VoIP Bots
Abstract
Introduction
Covert Channel
Attacks
Chapter 9. Introduction to Digital Forensics
Abstract
Introduction
One Discipline, Divergent Fields
Understanding Packet Capture
Network Intrusion Detection Systems
Pulling It All Together
Chapter 10. Security Best Practices—VoIP Implementation Policy
Abstract
Introduction
Index
← Prev
Back
Next →
← Prev
Back
Next →