Cover for Asterisk Hacking

Asterisk Hacking

Toolkit and Live Cd

Book2007

Authors:

Benjamin Jackson, Champ Clark III, ... Johnny Long

Asterisk Hacking

Toolkit and Live Cd

Book2007

 

Cover for Asterisk Hacking

Authors:

Benjamin Jackson, Champ Clark III, ... Johnny Long

Browse this book

Book description

Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most co ... read full description

Browse content

Table of contents

Actions for selected chapters

Select all / Deselect all

  1. Full text access
  2. Book chapterAbstract only

    Chapter 1 - What Is Asterisk and Why Do You Need It?

    Pages 1-20

  3. Book chapterAbstract only

    Chapter 2 - Setting Up Asterisk

    Pages 21-64

  4. Book chapterAbstract only

    Chapter 3 - Configuring Asterisk

    Pages 65-114

  5. Book chapterAbstract only

    Chapter 4 - Writing Applications with Asterisk

    Pages 115-145

  6. Book chapterAbstract only

    Chapter 5 - Understanding and Taking Advantage of VoIP Protocols

    Pages 147-181

  7. Book chapterAbstract only

    Chapter 6 - Asterisk Hardware Ninjutsu

    Pages 183-224

  8. Book chapterAbstract only

    Chapter 7 - Threats to VoIP Communications Systems

    Pages 225-244

  9. Book chapterNo access

    Index

    Pages 245-253

About the book

Description

Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.

This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.

Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.

This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.

Key Features

  • Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
  • See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
  • Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
  • See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.

Details

ISBN

978-1-59749-151-8

Language

English

Published

2007

Copyright

Copyright © 2007 Elsevier Inc. All rights reserved

Imprint

Syngress

You currently don’t have access to this book, however you can purchase separate chapters directly from the table of contents or buy the full version.

Purchase the book

Authors

Benjamin Jackson

Champ Clark III

Larry Chaffin

Johnny Long