|
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today`s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies and examples.
Key Features:
See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC and cloud and WebRTC
Table of Contents:
Part I: Casing the Establishment
VoIP Targets, Threats and Components Footprinting a UC Network Scanning a UC Network Enumerating a UC Network
Part II: Application Attacks
Toll Fraud and Service Abuse Calling Number Spoofi ng Harassing Calls and Telephony Denial of Service (TDoS) Voice SPAM Voice Social Engineering and Voice Phishing
Part III: Exploiting the UC Network
UC Network Eavesdropping UC Interception and Modifi cation UC Network Infrastructure Denial of Service (DoS) Cisco Unifi ed Communications Manager
Part IV: UC Session and Application Hacking
Fuzzing, Flooding and Disruption of Service Signaling Manipulation Audio and Video Manipulation Emerging Technologies
IndexISBN - 9789339204211
|
|
|