By Himanshu Dwivedi

Voice over net Protocol (VoIP) networks have freed clients from the tyranny of huge telecom, permitting humans to make cellphone calls over the net at very low or free of charge. yet whereas VoIP is straightforward and inexpensive, it truly is notoriously missing in safety. With minimum attempt, hackers can listen in on conversations, disrupt mobilephone calls, swap caller IDs, insert undesirable audio into latest cellphone calls, and entry delicate information.

Hacking VoIP takes a twin method of VoIP safety, explaining its many safety holes to hackers and directors. if you are interested by safeguard, and also you both use or administer VoIP, you want to recognize the place VoIP's largest weaknesses lie and the way to shore up your protection. And in case your highbrow interest is major you to discover the limits of VoIP, Hacking VoIP is your map and guidebook.

Hacking VoIP will introduce you to each element of VoIP protection, either in domestic and company implementations. you will know about renowned safety review instruments, the inherent vulnerabilities of universal and software program applications, and the way to:

  • Identify and guard opposed to VoIP safety assaults resembling eavesdropping, audio injection, caller identification spoofing, and VoIP phishing
  • Audit VoIP community security
  • Assess the safety of enterprise-level VoIP networks resembling Cisco, Avaya, and Asterisk, and residential VoIP strategies like Yahoo! and Vonage
  • Use universal VoIP protocols like H.323, SIP, and RTP in addition to designated protocols like IAX
  • Identify the various vulnerabilities in any VoIP network

Whether you are constructing and protecting your VoIP community opposed to assaults or simply having ailing enjoyable checking out the bounds of VoIP networks, Hacking VoIP is your go-to resource for each element of VoIP protection and defense.

Show description

Read or Download Hacking VoIP: Protocols, Attacks, and Countermeasures PDF

Similar Data In The Enterprise books

Tubes: A Journey to the Center of the Internet

“Andrew Blum plunges into the unseen yet genuine ether of the web in a trip either compelling and profound…. you are going to by no means open an e-mail in really an identical means back. ”—Tom Vanderbilt, big apple occasions bestselling writer of TrafficIn Tubes, Andrew Blum, a correspondent at stressed out journal, takes us on an attractive, totally interesting journey backstage of our daily lives and divulges the darkish beating middle of the net itself.

OSI Reference Model for Telecommunications

The OSI (Open procedure Interconnection) reference version is the root of recent facts community layout, however it underlines the general public switched mobilephone community (PSTN) besides. For voice engineers studying the way to ship providers over facts networks, and for net engineers studying the best way to faucet into the PSTN, the OSI version is a perfect aspect of reference.

IP Location

Accomplished assurance of the leap forward expertise which may locate someone or Anything--AnywhereIn state-of-the-art huge global of world trade with clients which are extra nomadic than ever, the necessity for trustworthy, safe, and effective entry applied sciences is speedily expanding. IP situation offers you a guided journey of situation choice, tackling this new know-how head on and addressing all points of situation administration, supply, and conveyance inside IP networks.

Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications (2nd Edition)

Written by way of key individuals to the specification, Bluetooth published, moment version deals an in-depth, insider's view of the hot Bluetooth 1. 1 regular and protocols: an important details for imposing Bluetooth suggestions now. New, in-depth insurance comprises: interoperability improvements, Bluetooth qualification, Bluetooth and 802.

Additional resources for Hacking VoIP: Protocols, Attacks, and Countermeasures

Show sample text content

Rated 4.29 of 5 – based on 21 votes