Asterisk Hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot!
This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword - for defense or attack!
* Asterisk Live CD containing all the tools discussed in the book and ready to boot!
* Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
* See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 2 Setting Up Asterisk
Chapter 3 Configuring Asterisk
Chapter 4 Writing Applications with Asterisk
Chapter 5 Understanding and Taking Advantage of VolP Protocols
AGI script allows applications ARP cache Asterisk server Asterisk::AGI AsteriskWin32 attack audio bandwidth call queue Caller ID camera channel Cisco codec command compile conﬁguration ﬁles Configuring connection Contains settings context create default device dial plan Digium distribution DTMF endpoints Ettercap example execute exten extensions.conf ﬁeld Figure ﬁrst gateway hardware hosts IAX2 install Asterisk interact interface Internet IP address IP phone iWar License Linux MAC address macro menu menuselect messages modem modules music on hold options packets password PBXes pcap phone calls phone number phpAGI print ALARM PSTN reload restart scan serial port setup SLAST Soft phones speciﬁc spoof string target tcpdump telephone tells Asterisk trafﬁc trixbox variables VLAN voice mail voice-mail VoIP VoIP networks VoIP protocols VoIP service war dialing Wireshark Zaptel