Browse content
Table of contents
Actions for selected chapters
- Full text access
- Book chapterAbstract only
Chapter 1 - What Is Asterisk and Why Do You Need It?
Pages 1-20 - Book chapterAbstract only
Chapter 2 - Setting Up Asterisk
Pages 21-64 - Book chapterAbstract only
Chapter 3 - Configuring Asterisk
Pages 65-114 - Book chapterAbstract only
Chapter 4 - Writing Applications with Asterisk
Pages 115-145 - Book chapterAbstract only
Chapter 5 - Understanding and Taking Advantage of VoIP Protocols
Pages 147-181 - Book chapterAbstract only
Chapter 6 - Asterisk Hardware Ninjutsu
Pages 183-224 - Book chapterAbstract only
Chapter 7 - Threats to VoIP Communications Systems
Pages 225-244 - Book chapterNo access
Index
Pages 245-253
About the book
Description
Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.
This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.
Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.
This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.
Key Features
- Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
- See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
- Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
- See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
Details
ISBN
978-1-59749-151-8
Language
English
Published
2007
Copyright
Copyright © 2007 Elsevier Inc. All rights reserved
Imprint
Syngress