Hacking Exposed 5th Edition
Chapter 6: Remote Connectivity and VoIP Hacking
- Code Listing 6-1A: An example of what appears to the first domain, which could change if the correct user ID is input
- Code Listing 6-1B: An example showing the change once the correct user ID is entered
- Code Listing 6-2: An example of a true first domain
- Code Listing 6-3: An example of a true second domain
- Code Listing 6-4: A sample QBASIC program (called 5551235.BAS)
- Code Listing 6-5: A sample third domain target
- Code Listing 6-6: A sample QBASIC program (called 5551235.BAS)
- Code Listing 6-7: A sample fourth domain target
- Code Listing 6-8: A sample QBASIC program (called 5551235.BAS)
- Code Listing 6-9: Simple voicemail hacking script in Procomm Plus ASPECT language