Limited Offer
Unified Communications Forensics
Anatomy of Common UC Attacks
- 1st Edition - October 7, 2013
- Authors: Nicholas Mr. Grant, Joseph II Shaw
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 9 9 2 - 7
- eBook ISBN:9 7 8 - 0 - 1 2 - 4 0 4 6 0 5 - 4
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteUnified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:
• analysis of forensic artifacts in common UC attacks
• an in-depth look at established UC technologies and attack exploits
• hands-on understanding of UC attack vectors and associated countermeasures
• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.
- Provides key information for hackers and pen testers on the most current Unified Communications implementations
- The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment
- Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics
Information Security professionals of all levels, VOiP practitioners, information assurance engineers, digital forensics analysts, telecommunications engineers, network engineers, security managers, auditors, and an academic audience among computer science and information assurance majors.
List of Figures
About the Authors
Contributing Author
Dedications
Chapter 1. A Brief Introduction
Abstract
Introduction to Unified Communications
Chapter 2. Spit, Phishing, and Other Social Outings
Abstract
Introduction
Conclusion
Chapter 3. Misconfiguration Begat Toll Fraud and Other VoIP Mischief
Abstract
Introduction
Conclusion
Chapter 4. Mixed Signals
Abstract
Introduction
SIP Requests
SIP Responses
Summary
Chapter 5. Can You Hear Me Now
Abstract
Introduction
Chapter 6. When SIP Attacks
Abstract
SIP Attacks: Introduction
SIP Enumeration
Attacking SIP
Conclusion
Chapter 7. Hacking the Network
Abstract
Chapter points
Introduction
Gaining Initial Access
Scanning the Network for Potential Vulnerabilities
Vulnerabilities and Exploits
Softphone Exploits
Maintaining Access
Chapter 8. VoIP Bots
Abstract
Introduction
Covert Channel
Attacks
Chapter 9. Introduction to Digital Forensics
Abstract
Introduction
One Discipline, Divergent Fields
Understanding Packet Capture
Network Intrusion Detection Systems
Pulling It All Together
Chapter 10. Security Best Practices—VoIP Implementation Policy
Abstract
Introduction
Index
- No. of pages: 156
- Language: English
- Edition: 1
- Published: October 7, 2013
- Imprint: Syngress
- Paperback ISBN: 9781597499927
- eBook ISBN: 9780124046054
NG
Nicholas Mr. Grant
JS