Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
David Endler, Mark Collier
- 出版商: McGraw-Hill Education
- 出版日期: 2006-11-28
- 定價: $1,730
- 售價: 5.0 折 $865
- 語言: 英文
- 頁數: 539
- 裝訂: Paperback
- ISBN: 0072263644
- ISBN-13: 9780072263640
-
相關分類:
資訊安全、駭客 Hack
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$600$199 -
$1,176Computer Networks: A Systems Approach, 3/e (IE) (美國版ISBN:155860832X)
-
$780$616 -
$580$568 -
$540$427 -
$650$514 -
$780$702 -
$650$507 -
$550$468 -
$550$468 -
$580$458 -
$2,990$2,841 -
$550$429 -
$480$408 -
$399Hacking Exposed Wireless
-
$880$616 -
$600$480 -
$399CCNA ICND2 Official Exam Certification Guide (CCNA Exams 640-816 and 640-802), 2/e
-
$107資料庫技術與應用:Visual FoxPro.第2版
-
$133Visual FoxPro 9.0專案開發案例教程
-
$148Visual FoxPro課程設計
-
$143Visual FoxPro及其應用系統開發(第二版)
-
$102Visual FoxPro程式設計習題.實驗.應用案例
-
$163Visual FoxPro 數據庫應用教程
-
$590$531
相關主題
商品描述
Description
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way
"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security
Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertion/mixing of malicious audio Learn about voice SPAM/SPIT and how to prevent it Defend against voice phishing and identity theft scams
Table of contents
Part I: Casing the Establishment
Chapter 1: Footprinting a VoIP Network
Chapter 2: Scanning a VoIP Network
Chapter 3: Enumerating a VoIP Network
Part II: Exploiting the VoIP Underlying Platforms
Chapter 4: VoIP Network Infrastructure Denial of Service (DoS)
Chapter 5: VoIP Network Eavesdropping
Chapter 6: VoIP Interception and Modification
Part III: Exploiting Specific VoIP Platforms
Chapter 7: Cisco Unified CallManager
Chapter 8: Avaya Communication Manager
Chapter 9: Asterisk
Chapter 10: Emerging Softphone Technologies
Part IV : VoIP Session and Application Hacking
Chapter 11: VoIP Fuzzing
Chapter 12: Flood-based Disruption of Service
Chapter 13: Signaling and Media Manipulation
Part V: Social Threats
Chapter 14: SPAM over Internet Technology (SPIT)
Chapter 15: Voice Phishing
Index
商品描述(中文翻譯)
描述
這本書揭示了遠程用戶如何探測、嗅探和修改您的電話、電話交換機和提供VoIP服務的網絡。最重要的是,作者提供了解決部署VoIP技術風險的解決方案。——Ron Gula,Tenable Network Security的CTO
通過學習如何以惡意入侵者的眼光查看您的網絡和設備,阻止破壞性的VoIP攻擊。《Hacking Exposed VoIP》逐步展示了在線犯罪分子如何進行偵察、獲取訪問權限、竊取數據和入侵易受攻擊的系統。該書涵蓋了所有硬件特定和以網絡為中心的安全問題,並提供了詳細的對策、深入的示例和實踐技巧。在書中,您將學習如何防範最新的DoS、中間人攻擊、呼叫洪水、竊聽、VoIP模糊測試、信令和音頻操縱、語音垃圾郵件/SPIT和語音釣魚攻擊。
- 了解黑客如何追蹤、掃描、列舉和竊取VoIP網絡和硬件
- 加強Cisco、Avaya和Asterisk系統的安全性
- 防止DNS污染、DHCP耗盡和ARP表操縱
- 阻止號碼收集、呼叫模式追蹤和對話竊聽
- 測量和維護VoIP網絡服務質量和語音通話質量
- 防止DoS和基於封包洪水的攻擊擾亂SIP代理和電話
- 對抗REGISTER劫持、INVITE洪水和BYE呼叫拆除攻擊
- 避免插入/混合惡意音頻
- 了解語音垃圾郵件/SPIT及其防範方法
- 防範語音釣魚和身份盜竊詐騙
目錄
第一部分:調查機構
第1章:追蹤VoIP網絡
第2章:掃描VoIP網絡
第3章:列舉VoIP網絡
第二部分:利用VoIP底層平台
第4章:VoIP網絡基礎設施拒絕服務(DoS)
第5章:VoIP網絡竊聽
第6章:VoIP截聽和修改
第三部分:利用特定的VoIP平台
第7章:Cisco Unified CallManager
第8章:Avaya Communication Manager
第9章:Asterisk
第10章:新興的軟電話技術
第四部分:VoIP會話和應用程式入侵
第11章:VoIP模糊測試
第12章:基於洪水的服務擾亂
第13章:信令和媒體操縱
第五部分:社交威脅
第14章:互聯網技術上的垃圾郵件(SPIT)
第15章:語音釣魚
索引