Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions 2/E

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions 2/E

by David Endler, Mark Collier

Paperback(2nd ed.)

$50.00
View All Available Formats & Editions
Members save with free shipping everyday! 
See details

Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” —Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

“The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers.” —Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious

“Powerful UC hacking secrets revealed within. An outstanding and informative book. Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security.” —Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class

“After reading Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold.” —J. Oquendo, Lead Security Engineer, E–Fensive Security Strategies

Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece.” —Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy

“This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them.” —Shane Green, Senior Voice Security Analyst

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new

Product Details

ISBN-13: 9780071798761
Publisher: McGraw-Hill Professional Publishing
Publication date: 12/20/2013
Series: Hacking Exposed Series
Edition description: 2nd ed.
Pages: 560
Product dimensions: 7.10(w) x 9.10(h) x 1.20(d)

About the Author

Mark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company’s UC security products. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud.

David Endler is the director of product development at AVAST Software. He founded an industry-wide group called the Voice over IP Security Alliance, www.voipsa.org. David was named one of the Top 100 Voices in IP Communications by IP Telephony magazine.

Table of Contents

1 VoIP Components & Targets

2 Footprinting

3 Scanning & Enumeration

4 Toll Fraud & service Abuse

5 Harassing Callers & TdoS

6 Social Engineering & Information Harvesting

7 Voice Spam & Phishing

8 Infastructure Denial of Service

9 Network Eavesdropping

10 Interception

11 Cisco Unified Cisco Call Manager

12 Avaya Communication Manager

13 Microsoft Lync

14 Cloud, Emerging, and other Technologies

15 Fuzzing & Disrupting of Service

16 VoIP Signaling Manipulation

17 Audio & Video Manipulation

Customer Reviews