At a Glance
Part I Casing the Establishment
1 VoIP Targets, Threats, and Components
5 Toll Fraud and Service Abuse
7 Harassing Calls and Telephony Denial of Service (TDoS)
9 Voice Social Engineering and Voice Phishing
Part III Exploiting the UC Network
11 UC Interception and Modification
12 UC Network Infrastructure Denial of Service (DoS)
13 Cisco Unified Communications Manager
Part IV UC Session and Application Hacking
Get Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.