Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

  • 8h 24m
  • David Endler, Mark Collier
  • McGraw-Hill/Osborne
  • 2014

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

  • See how hackers target vulnerable UC devices and entire networks
  • Defend against TDoS, toll fraud, and service abuse
  • Block calling number hacks and calling number spoofing
  • Thwart voice social engineering and phishing exploits
  • Employ voice spam mitigation products and filters
  • Fortify Cisco Unified Communications Manager
  • Use encryption to prevent eavesdropping and MITM attacks
  • Avoid injection of malicious audio, video, and media files
  • Use fuzzers to test and buttress your VoIP applications
  • Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

About the Authors

Mark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company’s UC security products. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud.

David Endler is the director of product development at AVAST Software. He founded an industry-wide group called the Voice over IP Security Alliance, voipsa.org. David was named one of the Top 100 Voices in IP Communications by IP Telephony magazine.

In this Book

  • VoIP Targets, Threats, and Components
  • Footprinting a UC Network
  • Scanning a UC Network
  • Enumerating A UC Network
  • Toll Fraud and Service Abuse
  • Calling Number Spoofing
  • Harassing Calls and Telephony Denial of Service (TDoS)
  • Voice Spam
  • Voice Social Engineering and Voice Phishing
  • UC Network Eavesdropping
  • UC Interception and Modification
  • UC Network Infrastructure Denial of Service (DoS)
  • Cisco Unified Communications Manager
  • Fuzzing, Flooding, and Disruption of Service
  • Signaling Manipulation
  • Audio and Video Manipulation
  • Emerging Technologies