outline

  • Introduction
  • PART I: Casing the Establishment
    • Chapter 1: Footprinting
    • Chapter 2: Scanning
    • Chapter 3: Enumeration
  • PART II: Exploiting the VoIP Network
    • Chapter 4: VoIP Network Infrastructure Denial of Service
    • Chapter 5: Network Eavesdropping
    • Chapter 6: Network and Application Interception
  • PART III: Exploiting Specific VoIP Platforms
    • Chapter 7: Cisco Call Manager
    • Chapter 8: Avaya Communication Manager
    • Chapter 9: Asterisk
    • Chapter 10: Emerging Softphone Technologies
  • PART IV: VoIP Session and Application Hacking
    • Chapter 11: Fuzzing VoIP
    • Chapter 12: Disruption of Service
    • Chapter 13: VoIP Signaling and Media Manipulation
  • PART V: Social Threats
    • Chapter 14: SPAMMING/SPIT
    • Chapter 15: VoIP Phishing