Hacking Exposed Unified Communications & VoIP Security by Mark Collier, David Endler

Posted by

By Mark Collier, David Endler

The most recent strategies for avoiding UC catastrophe

Establish a holistic safeguard stance by means of studying to view your unified communications infrastructure throughout the eyes of the nefarious cyber-criminal. Hacking uncovered Unified Communications & VoIP, moment version bargains completely increased assurance of today’s rampant threats along ready-to installation countermeasures. how you can block TDoS, toll fraud, voice junk mail, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits.

This finished advisor positive aspects all-new chapters, case experiences, and examples.
• See how hackers aim weak UC units and full networks
• protect opposed to TDoS, toll fraud, and repair abuse
• Block calling quantity hacks and calling quantity spoofing
• Thwart voice social engineering and phishing exploits
• hire voice unsolicited mail mitigation items and filters
• enhance Cisco Unified Communications supervisor
• Use encryption to avoid eavesdropping and MITM assaults
• stay away from injection of malicious audio, video, and media documents
• Use fuzzers to check and buttress your VoIP purposes
• find out about rising applied sciences akin to Microsoft Lync, OTT UC, other kinds of UC, and cloud and WebRTC

Show description

Read Online or Download Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions (2nd Edition) PDF

Best hacking books

Hacking for dummies

First-class intro to tools/methods used for uncomplicated hacking. no longer whole for CEH prep, as they do not speak about IDS/IPS or different protective measures any. No coding, basically instruments and their utilization. An easy-to-read primer.

eBay Hacks: 100 Industrial-Strength Tips and Tools

Need to know how top to take advantage of eBay? no matter if you are a newcomer or longtime person, eBay Hacks will educate you to turn into effective as either a customer and vendor. you will find quite a lot of themes, from tracking the bidding strategy, getting refunds, and solving images in order that sale goods glance their top, to in-depth suggestions for operating a enterprise on eBay and writing scripts that automate one of the most tedious projects.

Google Maps Hacks

Are looking to locate each pizza position inside of a 15-mile radius? the place the puppy parks are in a brand new city? the main principal assembly position to your classification, membership or crew of neighbors? the most affordable gasoline stations on a daily foundation? the site of convicted intercourse offenders in a space to which you'll be contemplating relocating?

Additional info for Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions (2nd Edition)

Sample text

As you can see, this returns some 435 matches: The Shodan search engine also provides an application programming interface (API) that can be used to download and otherwise manipulate the data. 4 1 , S T E RG A T VOIP TS, AND A E R H T S T N E N O P M CO 5 6 Hacking Exposed: Unified Communications and VoIP Security Secrets & Solutions What worries me most is some kid in his basement, running some call generator/robodialer, taking down my contact center, just to prove a point. S. bank L et’s start with saying that a number of terms are used to describe voice and other forms of communication.

And, of course, if a hacker has internal access to a corporate network, broader security issues are present other than UC security. The connection to the service provider is still TDM in the majority of enterprises. The IP PBX uses an integrated or separate device that provides the media gateway function. Hackers may not be attacking UC systems themselves; they attack the voice application and network, often using VoIP to enable, simplify, and/or reduce the cost of the attack. Many of the threats to UC networks are the types of attacks that are always present at the UC application layer, whether the underlying network is legacy TDM, UC, or a combination.

Many of us use “over the top” VoIP services such as Skype to leverage the Internet for free long-distance/international calling. A recent estimate has one-fourth of long-distance/ international traffic carried by Skype. These are just a few examples. Nevertheless, there is still a lot of TDM traffic in enterprises, especially for infrastructure such as public trunking, fax machines, and so on. We won’t devote a lot of material in this book to TDM per se, but it is present in the majority of complex UC systems.

Download PDF sample

Rated 4.59 of 5 – based on 22 votes