outline
- Introduction
- PART I: Casing the Establishment
- Chapter 1: Footprinting
- Chapter 2: Scanning
- Chapter 3: Enumeration
- PART II: Exploiting the VoIP Network
- Chapter 4: VoIP Network Infrastructure Denial of Service
- Chapter 5: Network Eavesdropping
- Chapter 6: Network and Application Interception
- PART III: Exploiting Specific VoIP Platforms
- Chapter 7: Cisco Call Manager
- Chapter 8: Avaya Communication Manager
- Chapter 9: Asterisk
- Chapter 10: Emerging Softphone Technologies
- PART IV: VoIP Session and Application Hacking
- Chapter 11: Fuzzing VoIP
- Chapter 12: Disruption of Service
- Chapter 13: VoIP Signaling and Media Manipulation
- PART V: Social Threats
- Chapter 14: SPAMMING/SPIT
- Chapter 15: VoIP Phishing