Event: January 15th, 2010
In addition to attacks on network availability and authentication, administrators must contend with eavesdropping, audio injection, Caller ID spoofing, VoIP phishing, and other unique exploits. All of these security holes can result in the leakage of information and in unreliable phone calls. Hacking VoIP reviews the many possible VoIP attacks, and discusses the best defenses against them for both enterprise and home VoIP solutions. Author Himanshu Dwivedi introduces popular security assessment tools, describes the inherent vulnerabilities of common hardware and software packages, and provides the first ever VoIP security audit program. The book covers common enterprise VoIP protocols such as SIP and RTP as well as unique protocols like H.323 and IAX.
No Starch Press, publishers of Hacking VoIP, have generously given us two copies to give away to participants of the VUC.
Some of the tools mentioned in the book are on this page.[audio:http://media.blubrry.com/winelover/recordings.talkshoe.com/TC-22622/TS-313655.mp3|titles=Part 2 – Nexus and more]