Hacking Exposed VoIP: Voice Over IP Security Secrets & So... and over 2 million other books are available for Amazon Kindle . Learn more
  • RRP: £34.99
  • You Save: £7.37 (21%)
FREE Delivery in the UK.
Only 1 left in stock.
Dispatched from and sold by Amazon.
Gift-wrap available.
Hacking Exposed VoIP: Voi... has been added to your Basket
+ £2.80 UK delivery
Used: Very Good | Details
Sold by 2ndhandbook
Condition: Used: Very Good
Comment: Slight shelf wear, but overall vgc. Dispatched within 24 hours (weekdays only). Thousands of satisfied customers
Trade in your item
Get a £0.35
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions: Voice Over IP Security Secrets and Solutions Paperback – 1 Jan 2007


See all 5 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
£27.62
£15.95 £10.00


Trade In this Item for up to £0.35
Trade in Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions: Voice Over IP Security Secrets and Solutions for an Amazon Gift Card of up to £0.35, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

  • Paperback: 539 pages
  • Publisher: McGraw-Hill Osborne; 1 edition (1 Jan. 2007)
  • Language: English
  • ISBN-10: 0072263644
  • ISBN-13: 978-0072263640
  • Product Dimensions: 19 x 2.8 x 23.6 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 1,047,483 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Author

Discover books, learn about writers, and more.

Product Description

From the Back Cover

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way

"This book illuminates how remote users can probe, sniff, and modify your
phones, phone switches, and networks that offer VoIP services. Most
importantly, the authors offer solutions to mitigate the risk of deploying
VoIP technologies." --Ron Gula, CTO of Tenable Network Security

Block debilitating VoIP attacks by learning how to look at your network and
devices through the eyes of the malicious intruder. Hacking Exposed VoIP
shows you, step-by-step, how online criminals perform reconnaissance, gain
access, steal data, and penetrate vulnerable systems. All hardware-specific
and network-centered security issues are covered alongside detailed
countermeasures, in-depth examples, and hands-on implementation techniques.
Inside, you'll learn how to defend against the latest DoS,
man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling
and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.

Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks
and hardware
Fortify Cisco, Avaya, and Asterisk systems
Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
Thwart number harvesting, call pattern tracking, and conversation
eavesdropping
Measure and maintain VoIP network quality of service and VoIP conversation
quality
Stop DoS and packet flood-based attacks from disrupting SIP proxies and
phones
Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
Avoid insertion/mixing of malicious audio
Learn about voice SPAM/SPIT and how to prevent it
Defend against voice phishing and identity theft scams

About the Author

David Endler is the Director of Security Research for TippingPoint, a division of 3Com. Previously, he performed security research for Xerox Corporation, the NSA, and MIT.  Endler is also the chairman and founder of the Voice over IP Security Alliance.

Mark Collier is CTO for SecureLogix Corporation.  He is an expert author and frequent presenter on the topic of VoIP security. Collier is also a founding member of the Voice over IP Security Alliance.


Inside This Book (Learn More)
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
0
See the customer review
Share your thoughts with other customers

Most Helpful Customer Reviews

2 of 2 people found the following review helpful By Martyn Davies on 21 July 2007
Format: Paperback Verified Purchase
In this book David Endler and Mark Collier have pulled together a vast wealth of material about hacking VoIP networks at every possible level. More than this, they have also created new value in the form of software test tools, which they have published on an accompanying website. It really is a must-have reference book for anyone working in VoIP.

Chapter 1 talks about Google hacking, or in other words, using the Internet to find out things about a target network. They show that Google can be a crucial tool in finding out what type of hardware and software you use in your VoIP networks, and in some cases will give vital clues even about how to login to the management systems of your network from the Internet. If this doesn't scare the bejesus out of you, then proceed on to further chapters about more VoIP-specific issues.

Chapters 2 and 3 detail the kind of tools a hacker might use to scan your network and enumerate all the devices, i.e. build their own map of how your network is laid out, right down to the telephone numbers and MAC addresses of desktop phones. Chapter 4 talks about Denial-of-Service, and the kind of attack resources that hackers might use to cripple a telephony network.

Chapter 5 is on VoIP eavesdropping, talking about some existing tools that can be used for this (Oreka, Wireshark and the unpleasantly named vomit), and as in the earlier chapters, some suggestions on how to defend against such a type of threat. Chapter 6 goes further to explain how a VoIP man-in-the-middle attack might be mounted, giving the possibility not just to listen, but to modify, replace or remix the audio stream.

Chapters 7, 8, 9 talk about specific platform threats, namely to Cisco Unified CallManager, Avaya Communication Manager and the Asterisk PBX.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 6 reviews
11 of 11 people found the following review helpful
A great Hacking Exposed and VoIP security book 6 May 2007
By Richard Bejtlich - Published on Amazon.com
Format: Paperback
Hacking Exposed: VoIP (HE:V) is the sort of HE book I like. It's fashionable to think HE books are only suitable for script kiddies who run tools they don't understand against vulnerable services they don't recognize. I like HE books because the good ones explain a technology from a security standpoint, how to exploit it, and how to defend it. I thought HE:V did well in all three areas, even featuring original research and experiments to document and validate the authors' claims.

HE:V is a real eye-opener for those of us who don't perform VoIP pen testing or assessments. It's important to remember that the original HE books were written by Foundstone consultants who put their work experience in book form. HE books that continue this tradition tend to be successful, and HE:V is no exception. Good HE books also introduce a wide variety of tools and techniques to exploit weaknesses in targets, and HE:V also delivers in this respect. HE:V also extends attacks beyond what most people recognize. For example, everyone probably knows about low-level exploitation of VoIP traffic for call interception and manipulation. However, chapter 6 discusses application-level interception.

HE:V goes the extra mile by introducing tools written by the authors specifically to implement attacks. In at least one case the authors also provide a packet capture (for the Skinny protocol) which I particularly appreciate. HE:V also looks ahead to attacks that are appearing but not yet prevalent, like telephony spam and voice phishing. Taken together, all of these features result in a great book. You should already be familiar with the common enumeration and exploitation methods found in HE 5th Ed, because the HE:V authors wisely avoid repeating material in other books (thank you).

If you want to understand VoIP, how to attack it, and how to defend it, I highly recommend reading HE:V. The book is clear, thorough, and written by experts.
5 of 5 people found the following review helpful
Invaluable VoIP Security Handbook 11 Aug. 2007
By Martyn Davies - Published on Amazon.com
Format: Paperback
In this book David Endler and Mark Collier have pulled together a vast wealth of material about hacking VoIP networks at every possible level. More than this, they have also created new value in the form of software test tools, which they have published on an accompanying website. It really is a must-have reference book for anyone working in VoIP.

Chapter 1 talks about Google hacking, or in other words, using the Internet to find out things about a target network. They show that Google can be a crucial tool in finding out what type of hardware and software you use in your VoIP networks, and in some cases will give vital clues even about how to login to the management systems of your network from the Internet. If this doesn't scare the bejesus out of you, then proceed on to further chapters about more VoIP-specific issues.

Chapters 2 and 3 detail the kind of tools a hacker might use to scan your network and enumerate all the devices, i.e. build their own map of how your network is laid out, right down to the telephone numbers and MAC addresses of desktop phones. Chapter 4 talks about Denial-of-Service, and the kind of attack resources that hackers might use to cripple a telephony network.

Chapter 5 is on VoIP eavesdropping, talking about some existing tools that can be used for this (Oreka, Wireshark and the unpleasantly named vomit), and as in the earlier chapters, some suggestions on how to defend against such a type of threat. Chapter 6 goes further to explain how a VoIP man-in-the-middle attack might be mounted, giving the possibility not just to listen, but to modify, replace or remix the audio stream.

Chapters 7, 8, 9 talk about specific platform threats, namely to Cisco Unified CallManager, Avaya Communication Manager and the Asterisk PBX. The vendors have added their own comment to these chapters, at the request of the authors. Chapter 10 takes in Softphones, including Google Talk, Gizmo, Yahoo and of course the ever popular Skype.

Chapter 11 describes VoIP fuzzing, or in other words, testing protocol stacks for flaws, so this is useful for those developing VoIP systems and applications. Chapter 12 talks about disruption of networks using flooding techniques and chapter 13 talks about Signaling and Media Manipulation.

The final section of the book is entitled Social Threats, and talks about SPAM over Internet Telephony (SPIT) in Chapter 14, followed by Voice Phishing in Chapter 15. Neither of these threats are in frequent use yet, but their use is certain to increase in the future, so this is a good moment to get to grips with what this means.

This is a highly technical book, but for managers responsible for IT security but not immersed in the details I would say this: buy the book, and read the case studies. There are five sections to the book, and each starts with a short case study. Invest 20 minutes in reading these, and you will start to get an appreciation for how important VoIP Security will be in the future. Then pass the book on to your hands-on security guy and tell him to read it from cover to cover.
3 of 3 people found the following review helpful
Lots of interesting info, but mostly about enterprise VoIP (not carrier/hosted VoIP) 12 Mar. 2009
By Mark R. Lindsey - Published on Amazon.com
Format: Paperback Verified Purchase
This book has a lot of good background info on VoIP systems. It covers Cisco Call Manager, Avaya, and Asterisk VoIP systems in depth.

It's definitely focused on SIP and RTP, and focused on Enterprise VoIP deployments. The authors appear to be unaware of hosted / carrier VoIP, such as used by Verizon. The authors don't mention anything about BroadSoft BroadWorks, MetaSwitch, Acme Packet, Sylantro, or others, though their general technology coverage certainly relates to these systems. I also wish they had considered some of the very popular SIP phones -- e.g., Linksys and Polycom.

They give examples of using numerous VoIP security-scanning / exploit tools. The theoretical attacker in the book likely has physical access to the target network, or at least layer-2 (Ethernet) access. Many of the attacks are much more difficult or impossible if you're attacking across the Internet.

Still, coverage of the tools is very useful to a Carrier VoIP researcher.
HACKING EXPOSED BOOKS ARE GREAT!! 1 Nov. 2013
By drake - Published on Amazon.com
Format: Paperback Verified Purchase
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

They are Great Books!! ---That is my opinion!
VoIP is a great reference! 22 Feb. 2014
By Taama Marti Forasiepi - Published on Amazon.com
Format: Paperback Verified Purchase
This book continues to be a great reference for those interested in protecting their voice over IP systems. They just issued a new version and I plan to get this one as well.
Were these reviews helpful? Let us know


Feedback