Books & Videos

Table of Contents

  1. Chapter 1 AN INTRODUCTION TO VOIP SECURITY

    1. Why VoIP

    2. VoIP Basics

    3. VoIP Security Basics

    4. Attack Vectors

    5. Summary

  2. VOIP PROTOCOLS

    1. Chapter 2 SIGNALING: SIP SECURITY

      1. SIP Basics
      2. SIP Messages
      3. Making a VoIP Call with SIP Methods
      4. Enumeration and Registration
      5. SIP Security Attacks
      6. Summary
    2. Chapter 3 SIGNALING: H.323 SECURITY

      1. H.323 Security Basics
      2. H.323 Security Attacks
      3. Summary
    3. Chapter 4 MEDIA: RTP SECURITY

      1. RTP Basics
      2. RTP Security Attacks
      3. Summary
    4. Chapter 5 SIGNALING AND MEDIA: IAX SECURITY

      1. IAX Authentication
      2. IAX Security Attacks
      3. Summary
  3. VOIP SECURITY THREATS

    1. Chapter 6 ATTACKING VOIP INFRASTRUCTURE

      1. Vendor-Specific VoIP Sniffing
      2. Hard Phones
      3. Cisco CallManager and Avaya Call Center
      4. Modular Messaging Voicemail System
      5. Infrastructure Server Impersonation
      6. Summary
    2. Chapter 7 UNCONVENTIONAL VOIP SECURITY THREATS

      1. VoIP Phishing
      2. Making Free Calls
      3. Caller ID Spoofing
      4. Anonymous Eavesdropping and Call Redirection
      5. Spam Over Internet Telephony
      6. Summary
    3. Chapter 8 HOME VOIP SOLUTIONS

      1. Commercial VoIP Solutions
      2. PC-Based VoIP Solutions
      3. SOHO Phone Solutions
      4. Summary
  4. ASSESS AND SECURE VOIP

    1. Chapter 9 SECURING VOIP

      1. SIP over SSL/TLS
      2. Secure RTP
      3. ZRTP and Zfone
      4. Firewalls and Session Border Controllers
      5. Summary
    2. Chapter 10 AUDITING VOIP FOR SECURITY BEST PRACTICES

      1. VoIP Security Audit Program
      2. Summary
  1. COLOPHON