Asterisk Hacking


  • Joshua Brashars, External Threat Assessment Team, Secure Science Corporation, San Diego, CA

Asterisk Hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot!This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword - for defense or attack!
View full description


New and experienced Asterisk users


Book information

  • Published: June 2007
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-151-8

Table of Contents

What is Asterisk and why do you need it?
Installing Asterisk
Add-ons and Modules
Asterisk Hardware Ninjutsu
Protocols, say what?
Asterisk Underground
Lock it down!
Reach out and touch someone: The future of Asterisk Hacking