skip to content
Unified Communications Forensics : Anatomy of Common UC Attacks. Preview this item
ClosePreview this item
Checking...

Unified Communications Forensics : Anatomy of Common UC Attacks.

Author: Nicholas Mr Grant; Joseph II Shaw
Publisher: Burlington : Elsevier Science, 2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Grant, Nicholas Mr.
Unified Communications Forensics : Anatomy of Common UC Attacks.
Burlington : Elsevier Science, ©2013
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Nicholas Mr Grant; Joseph II Shaw
ISBN: 9780124046054 0124046053
OCLC Number: 862786816
Notes: Scanning the Network for Potential Vulnerabilities.
Description: 1 online resource (168 pages)
Contents: Front Cover; Unified Communications Forensics: Anatomy of Common UC Attacks; Copyright; List of Figures; About the Authors; Contributing Author; Dedications; Chapter 1: A Brief Introduction; Introduction to Unified Communications; Protocols; Signaling; Media Session; An Introduction to Network Forensics; Network Forensics and Analysis Tools; Bro; Nftracker; Snort; Tcpdump; Tcpxtract; Wireshark; Xplico System; Security Onion: All the Tools Rolled into One; Chapter 2: Spit, Phishing, and Other Social Outings; Introduction; Caller ID Spoofing; Phishing/Vishing/SMishing; Spit. Security Best PracticesRequired Annual Attendance; Role-Based Training; Delivery Modes; Require Training First; Acknowledgment of Policy; Outside References; Utilize Multiple Organizations; Conclusion; Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief; Introduction; Common Misconfigurations; Long Distance, Premium-Rate Telephone Numbers, and International; Encryption; Direct Inward System Access; Call Forwarding; Weak or Null Passwords; Security Best Practices; Dialing Restrictions; Encryption; Restrict Premium Features; Password/PIN Strength; Baseline; Phone Bill Analysis. Log AnalysisConclusion; Chapter 4: Mixed Signals; Introduction; SIP Requests; Register; Invite; Bye; Options; Ack; Summing Up; SIP Responses; 1xx Responses; 100 Trying; 180 Ringing; 2xx Responses; 200 Ok; 3xx Responses; 4xx Responses; 401 Unauthorized; 408 Request Time-Out; 483 Too Many Hops; 486 Busy Here; 5xx Responses; 6xx Response; Summary; Wrapping Up; Chapter 5: Can You Hear Me Now; Introduction; What Does It All Mean?; RTP Header Fields; Version; Padding; Extension; CSRC Count; Marker; Payload Type; Sequence Number; Timestamp; Ssrc; CSRC List; Format; Extension Header. RTP Control ProtocolFeedback of Quality of Data Distribution; Carry Persistent Transport Identifiers; Control Send Rate; Convey Minimal Session Control; Packet Format; Common Header; Version; Padding; Report Count, Source Count, or Subtype; Packet Type; Length; Ssrc; Encryption Prefix; SR or RR; Additional RRs; Sdes; BYE or APP; Packet Types; Send Report Packet; Second Section; NTP Timestamp; RTP Timestamp; Sender Packet Count; Sender Octet Count; Third Section; SSRC_x; Fraction Lost; Cumulative Number of Packets Lost; Extended Highest Sequence Number; Interarrival Jitter; Last SR Timestamp. Delay Since Last SRReceiver Report Packet; SDES Packet; Cname; Name; Email; Phone; Loc; Tool; Note; Priv; Bye; Packet Type.; Source Count.; App; Subtype.; Packet Type.; Name.; Application-Dependent Data.; Pulling It All Together; Chapter 6: When SIP Attacks; SIP Attacks: Introduction; PBX Configuration; VAST Setup; SIP Enumeration; Nmap; Svmap.py; Svwar.py; SIP Exploitation; Attacking SIP; Svcrack. Py; I can hear you{u2026}; Arpspoof; Vomit; VoIP Hopper; Cain & Abel; UCSniff; Conclusion; Chapter 7: Hacking the Network; Introduction; Gaining Initial Access.

Abstract:

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/862786816> # Unified Communications Forensics : Anatomy of Common UC Attacks.
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
   library:oclcnum "862786816" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1772471957#Place/burlington> ; # Burlington
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/vtu> ;
   schema:about <http://dewey.info/class/621.382/> ;
   schema:bookFormat schema:EBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1772471957#Person/shaw_joseph_ii> ; # Joseph II Shaw
   schema:creator <http://experiment.worldcat.org/entity/work/data/1772471957#Person/grant_nicholas_mr> ; # Nicholas Mr Grant
   schema:datePublished "2013" ;
   schema:description "Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors."@en ;
   schema:description "Front Cover; Unified Communications Forensics: Anatomy of Common UC Attacks; Copyright; List of Figures; About the Authors; Contributing Author; Dedications; Chapter 1: A Brief Introduction; Introduction to Unified Communications; Protocols; Signaling; Media Session; An Introduction to Network Forensics; Network Forensics and Analysis Tools; Bro; Nftracker; Snort; Tcpdump; Tcpxtract; Wireshark; Xplico System; Security Onion: All the Tools Rolled into One; Chapter 2: Spit, Phishing, and Other Social Outings; Introduction; Caller ID Spoofing; Phishing/Vishing/SMishing; Spit."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1772471957> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/1772471957#CreativeWork/unified_communications_forensics_anatomy_of_common_uc_attacks> ;
   schema:name "Unified Communications Forensics : Anatomy of Common UC Attacks."@en ;
   schema:productID "862786816" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/862786816#PublicationEvent/burlington_elsevier_science_2013> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1772471957#Agent/elsevier_science> ; # Elsevier Science
   schema:url <http://libguides.aucegypt.edu/content.php?pid=376187&sid=3081542> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1115170> ;
   schema:url <http://ebookcentral.proquest.com/lib/ucm/detail.action?docID=1115170> ;
   schema:workExample <http://worldcat.org/isbn/9780124046054> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/862786816> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1772471957#Agent/elsevier_science> # Elsevier Science
    a bgn:Agent ;
   schema:name "Elsevier Science" ;
    .

<http://experiment.worldcat.org/entity/work/data/1772471957#Person/grant_nicholas_mr> # Nicholas Mr Grant
    a schema:Person ;
   schema:familyName "Grant" ;
   schema:givenName "Nicholas Mr" ;
   schema:name "Nicholas Mr Grant" ;
    .

<http://experiment.worldcat.org/entity/work/data/1772471957#Person/shaw_joseph_ii> # Joseph II Shaw
    a schema:Person ;
   schema:familyName "Shaw" ;
   schema:givenName "Joseph II" ;
   schema:name "Joseph II Shaw" ;
    .

<http://worldcat.org/entity/work/data/1772471957#CreativeWork/unified_communications_forensics_anatomy_of_common_uc_attacks>
    a schema:CreativeWork ;
   rdfs:label "Unified Communications Forensics : Anatomy of Common UC Attacks." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/862786816> ; # Unified Communications Forensics : Anatomy of Common UC Attacks.
    .

<http://worldcat.org/isbn/9780124046054>
    a schema:ProductModel ;
   schema:isbn "0124046053" ;
   schema:isbn "9780124046054" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.