Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    David Endler and Mark Collier, «Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions»

    Posted By: Spymaker
    David Endler and Mark Collier, «Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions»

    David Endler and Mark Collier, «Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions»
    Publisher: McGraw-Hill/Osborne | Nov 2006 | ISBN: 9780072263640 | Pages: 574 | CHM | 17 MB

    Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.

    Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
    Fortify Cisco, Avaya, and Asterisk systems
    Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
    Thwart number harvesting, call pattern tracking, and conversation eavesdropping
    Measure and maintain VoIP network quality of service and VoIP conversation quality
    Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
    Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
    Avoid insertion/mixing of malicious audio
    Learn about voice SPAM/SPIT and how to prevent it
    Defend against voice phishing and identity theft scams