Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
| | ||
| | ||
| | ||
-
Arkin, Ofir. "Registration Hijacking Presentation." Black Hat Conference. http://www.blackhat.com/presentations/win-usa-02/arkin-winsec02.ppt
-
Borderware. http://www.borderware.com
-
Ingate. http://www.ingate.com
-
PacketStorm (source of basic udpflood tool). http://www.packetstorm.org
-
Registration Hijacking Presentation. http://www.securityfocus.com/infocus/1862
-
SecureLogix. http://www.securelogix.com
-
SIP: Session Initiation Protocol. http://www.ietf.org/rfc/rfc3261.txt
-
Sipera. http://www.sipera.com
-
SiVuS. http://www.vopsecurity.org
-
TLS: Transport Layer Security. http://www.rfc.net/rfc2246.html
-
Trammel, Dustin. "Dustin Trammell's Presentation on VoIP Attacks." http://www.dustintrammell.com/presentations/VoIP-Attacks/