Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

National Vulnerability Database, 68

Nessus scanner, 69

nessus tool, 35

Netcap tool, 6673

Netstumbler tool, 150

network analyzers, 126129

network availability, 122, 136139

network eavesdropping, 165. See also eavesdropping

network hijacking, 169. See also hijacking

network hubs, 149150

Network Management System (NMS), 288

network nodes, 150152

network reconnaissance

ACM, 264295

Asterisk components , 326327

CCM, 220240

network sniffers, 126129. See also sniffers

network switches, 152154

network-based intrusion prevention systems. See NIPS

networking-based attacks

Asterisk, 339343

CCM, 240250

infrastucture attacks, 141146

network availability attacks, 136139

network hijacking, 169

networks

eavesdropping on. See eavesdropping attacks

enumerating. See enumeration

Ethernet, 38

footprinting. See footprinting

gaining access to, 149156, 186

hardening, 135136

latency, 123

physical access to, 186

privacy issues, 148149

scanning. See scanning

wireless (Wi-Fi), 149150

NeWT scanner, 69

Newt tool, 35

NIPS (network-based intrusion prevention systems)

ACM, 310

Asterisk, 342

CCM, 245

network availability attacks, 138139

Nmap tool

APR pings , 38

described, 34

enumerating VxWorks devices, 113116

OS detection option, 4853

ping sweeps , 3435

TCP pings, 3940

TCP SYN scanning, 4447

UDP scanning, 35, 4447

NMS (Network Management System), 288

Nomad tool, 42

Nortel IP Softphone 2050, 352

NOTIFY requests , 58, 467468

number harvesting , 149, 158159

Категории