понеділок, 1 серпня 2016 р.

Linux security tools

outline

  • Introduction
  • PART I: Casing the Establishment
    • Chapter 1: Footprinting
    • Chapter 2: Scanning
    • Chapter 3: Enumeration
  • PART II: Exploiting the VoIP Network
    • Chapter 4: VoIP Network Infrastructure Denial of Service
    • Chapter 5: Network Eavesdropping
    • Chapter 6: Network and Application Interception
  • PART III: Exploiting Specific VoIP Platforms
    • Chapter 7: Cisco Call Manager
    • Chapter 8: Avaya Communication Manager
    • Chapter 9: Asterisk
    • Chapter 10: Emerging Softphone Technologies
  • PART IV: VoIP Session and Application Hacking
    • Chapter 11: Fuzzing VoIP
    • Chapter 12: Disruption of Service
    • Chapter 13: VoIP Signaling and Media Manipulation
  • PART V: Social Threats
    • Chapter 14: SPAMMING/SPIT
    • Chapter 15: VoIP Phishing
security tools
These are the tools we demonstrated in the book. The tools listed in blue are the ones we wrote ourselves. Most of our linux tools require that you also download the following two libraries: hack_library and g711conversions.
  • Chapter 14: SPAMMING/SPIT
voicemail database
This is a collection of default sound files of popular VoIP voicemail systems to assist in properly identifying the vendor. This goes along with Chapter 1.

Asterisk 1.2.x (gsm can be played with QuickTime Player): 


Avaya IP Office / Audix:


Cisco Unity 4.x:

Немає коментарів:

Дописати коментар