Asterisk Hacking

  • 3h 38m
  • Ben Chapman, Champ Clark
  • Elsevier Science and Technology Books, Inc.
  • 2007

Asterisk Hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.

This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack!

  • Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
  • See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles

In this Book

  • What Is Asterisk and Why Do You Need It?
  • Setting Up Asterisk
  • Configuring Asterisk
  • Writing Applications with Asterisk
  • Understanding and Taking Advantage of VoIP Protocols
  • Asterisk Hardware Ninjutsu
  • Threats to VoIP Communications Systems

YOU MIGHT ALSO LIKE

Rating 4.9 of 13 users Rating 4.9 of 13 users (13)
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)