Asterisk Hacking
About this book
Asterisk Hacking provides detials oftechniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.This book providesdetials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.- Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!- See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Front Cover
- Asterisk Hacking: ToolKit and Live CD
- Copyright Page
- Contents
- Chapter 1. What Is Asterisk and Why Do You Need It ?
- Chapter 2. Setting Up Asterisk
- Chapter 3. Configuring Asterisk
- Chapter 4. Writing Applications with Asterisk
- Chapter 5. Understanding and Taking Advantage of VolP Protocols
- Chapter 6. Asterisk Hardware Ninjutsu
- Chapter 7. Threats to VolP Communications Systems
- Index
- GNU GENERAL PUBLIC LICENSE
