O'Reilly logo

Securing Cisco IP Telephony Networks by Akhil Behl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Cisco IP Telephony Endpoint Security

XYZ is a large corporation with a state-of-the-art Headquarters and receives many visitors daily. One day, one such visitor, Mr. X, pays a visit to the CTO of XYZ Corp. (who happens to be his close friend) to invite him to an upcoming security conference. After calling the CTO, who will meet him in the lobby, he turns his attention to the shiny piece of hardware, which a moment ago he used to call his friend. Well, does it look too technical for him to sort out what it is? Maybe not! Mr. X is a seasoned White-Hat hacker and today he is onto something. Mr. X starts playing around with the Cisco Unified IP Phone and reaches the Network Configuration menu. To his surprise, the settings are unlocked! ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required