Unified Communications Forensics

Unified Communications Forensics

Anatomy of Common UC Attacks

1st Edition - October 7, 2013

Write a review

  • Authors: Nicholas Grant, Joseph Shaw
  • Paperback ISBN: 9781597499927
  • eBook ISBN: 9780124046054

Purchase options

Purchase options
Available
DRM-free (EPub, Mobi, PDF)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: • analysis of forensic artifacts in common UC attacks • an in-depth look at established UC technologies and attack exploits • hands-on understanding of UC attack vectors and associated countermeasures • companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.

Key Features

  • Provides key information for hackers and pen testers on the most current Unified Communications implementations
  • The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment
  • Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics

Readership

Information Security professionals of all levels, VOiP practitioners, information assurance engineers, digital forensics analysts, telecommunications engineers, network engineers, security managers, auditors, and an academic audience among computer science and information assurance majors.

Table of Contents

  • List of Figures

    About the Authors

    Contributing Author

    Dedications

    Chapter 1. A Brief Introduction

    Abstract

    Introduction to Unified Communications

    Chapter 2. Spit, Phishing, and Other Social Outings

    Abstract

    Introduction

    Conclusion

    Chapter 3. Misconfiguration Begat Toll Fraud and Other VoIP Mischief

    Abstract

    Introduction

    Conclusion

    Chapter 4. Mixed Signals

    Abstract

    Introduction

    SIP Requests

    SIP Responses

    Summary

    Chapter 5. Can You Hear Me Now

    Abstract

    Introduction

    Chapter 6. When SIP Attacks

    Abstract

    SIP Attacks: Introduction

    SIP Enumeration

    Attacking SIP

    Conclusion

    Chapter 7. Hacking the Network

    Abstract

    Chapter points

    Introduction

    Gaining Initial Access

    Scanning the Network for Potential Vulnerabilities

    Vulnerabilities and Exploits

    Softphone Exploits

    Maintaining Access

    Chapter 8. VoIP Bots

    Abstract

    Introduction

    Covert Channel

    Attacks

    Chapter 9. Introduction to Digital Forensics

    Abstract

    Introduction

    One Discipline, Divergent Fields

    Understanding Packet Capture

    Network Intrusion Detection Systems

    Pulling It All Together

    Chapter 10. Security Best Practices—VoIP Implementation Policy

    Abstract

    Introduction

    Index

Product details

  • No. of pages: 156
  • Language: English
  • Copyright: © Syngress 2013
  • Published: October 7, 2013
  • Imprint: Syngress
  • Paperback ISBN: 9781597499927
  • eBook ISBN: 9780124046054

About the Authors

Nicholas Grant

Nicholas Grant is an information security professional with over ten years of experience within the industry. He holds a CISSP and has an M.S. in Management of Information Systems Security from Colorado Technical Institute. He works as a Vulnerability Manager for a large financial institution and is a professor, teaching Bachelor’s and Associate-level courses at a nationally accredited university.

Joseph Shaw

Joseph W. Shaw II (CISM, CISSP, EnCE, GAWN) has been working in Information Security for over 18 years, with experience in industry verticals including telecommunications, energy, luxury retail, legal, and healthcare. He is now a consultant for a large worldwide professional services company, where he provides expertise in Digital Forensics with an emphasis on incident response, malware analysis and reverse engineering, vulnerability assessment, penetration testing, and security even and incident management.

Ratings and Reviews

Write a review

There are currently no reviews for "Unified Communications Forensics"