Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions by Mark Collier
Author:Mark Collier
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2014-11-21T16:00:00+00:00
Compromising a Proxy, Gateway, or PC/Softphone
We have tried to emphasize throughout this book that the security of your UC deployment is only as secure as the underlying supporting layers. No matter how securely architected a UC application is, it is irrelevant if the underlying operating system or firmware can be compromised. Most UC gateways, proxies, and softphone PCs run on top of either Windows or Linux. These operating systems are prone to numerous vulnerabilities that require constant patching and updates, as discussed in Chapter 12. There are a variety of exploitation tools that are able to facilitate hacking into these vulnerable hosts. One such tool that comes preloaded with a long list of “point-and-shoot” exploits is the Metasploit Framework, shown in Figure 10-4.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7787)
Grails in Action by Glen Smith Peter Ledbrook(7704)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6423)
Kotlin in Action by Dmitry Jemerov(5073)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3836)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3090)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2612)
Drugs Unlimited by Mike Power(2473)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2335)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2266)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2234)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2196)
JavaScript by Example by S Dani Akash(2139)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2080)
Full-Stack React Projects by Shama Hoque(1993)
