Hacking VoIP

Protocols, Attacks, and Countermeasures

Nonfiction, Computers, Computer Hardware, Peripherals & Accessories, Networking & Communications, Network Protocols
Cover of the book Hacking VoIP by Himanshu Dwivedi, No Starch Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Himanshu Dwivedi ISBN: 9781593273095
Publisher: No Starch Press Publication: October 15, 2008
Imprint: No Starch Press Language: English
Author: Himanshu Dwivedi
ISBN: 9781593273095
Publisher: No Starch Press
Publication: October 15, 2008
Imprint: No Starch Press
Language: English

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.

Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:
–Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
–Audit VoIP network security
–Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
–Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
–Identify the many vulnerabilities in any VoIP network

Whether you’re setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.

Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:
–Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
–Audit VoIP network security
–Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
–Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
–Identify the many vulnerabilities in any VoIP network

Whether you’re setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.

More books from No Starch Press

Cover of the book The Unofficial LEGO Technic Builder's Guide, 2nd Edition by Himanshu Dwivedi
Cover of the book The Manga Guide to Calculus by Himanshu Dwivedi
Cover of the book Learn to Program with Small Basic by Himanshu Dwivedi
Cover of the book Make Your Own PuzzleScript Games! by Himanshu Dwivedi
Cover of the book A Beginner's Guide to Circuits by Himanshu Dwivedi
Cover of the book Learn Java the Easy Way  by Himanshu Dwivedi
Cover of the book A Bug Hunter's Diary by Himanshu Dwivedi
Cover of the book The Maker's Guide to the Zombie Apocalypse by Himanshu Dwivedi
Cover of the book The Arduino Inventor's Guide by Himanshu Dwivedi
Cover of the book Arduino Workshop by Himanshu Dwivedi
Cover of the book Teach Your Kids to Code by Himanshu Dwivedi
Cover of the book Clojure for the Brave and True by Himanshu Dwivedi
Cover of the book Automate the Boring Stuff with Python by Himanshu Dwivedi
Cover of the book The Book of Audacity by Himanshu Dwivedi
Cover of the book Inside the Machine by Himanshu Dwivedi
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy