Description
Voice over Internet Protocol (VoIP) is telephony over the internet. More than 3.1 million VoIP phone lines have been installed worldwide with installations of traditional PBX phone systems decreased by 36% in 2004 while VoIP installations increased by 54%. All of these newly installed VoIP phone lines and handsets are accessible via the internet and vulnerable to malicious attack as well as spam.
This book covers exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. Just enough coverage of products like Google Talk and Skype and IM and P2P technologies is provided.
*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently
*Short on theory, history, and technical data that ultimately is not helpful in performing their jobs
*Avoid the time drains associated with securing VoIP