12.07.2015 Views

Exploiting Voice over IP Networks - Hacking Exposed VoIP

Exploiting Voice over IP Networks - Hacking Exposed VoIP

Exploiting Voice over IP Networks - Hacking Exposed VoIP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Agenda• We take a phased approach in presenting the material:— PART I: Casing the Establishment• Chapter 1: Footprinting• Chapter 2: Scanning• Chapter 3: Enumeration— PART II: <strong>Exploiting</strong> the Vo<strong>IP</strong> Network• Chapter 4: Vo<strong>IP</strong> Network Infrastructure Denial of Service• Chapter 5: Network Eavesdropping• Chapter 6: Network and Application Interception— PART III: Vo<strong>IP</strong> Session and Application <strong>Hacking</strong>• Chapter 11: Fuzzing Vo<strong>IP</strong>• Chapter 12: Disruption of Service• Chapter 13: Vo<strong>IP</strong> Signaling and Media Manipulation— PART IV: Social Threats• Chapter 14: SPAMMING/SPIT• Chapter 15: Vo<strong>IP</strong> Phishing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!