Asterisk Hacking

Front Cover
Syngress, Aug 13, 2007 - Computers - 272 pages

Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.

This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.

  • Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
  • See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chapter 1 What Is Asterisk and Why Do You Need It ?
1
Chapter 2 Setting Up Asterisk
21
Chapter 3 Configuring Asterisk
65
Chapter 4 Writing Applications with Asterisk
115
Chapter 5 Understanding and Taking Advantage of VolP Protocols
147
Chapter 6 Asterisk Hardware Ninjutsu
183
Chapter 7 Threats to VolP Communications Systems
225
Index
245
GNU GENERAL PUBLIC LICENSE
255
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information