Cover image for Unified communications forensics : anatomy of common UC attacks
Title:
Unified communications forensics : anatomy of common UC attacks
Publication Information:
Amsterdam : Syngress is an imprint of Elsevier, [2014]
Physical Description:
xvii, 149 pages: illustrations ; 24 cm.
ISBN:
9781597499927
General Note:
Includes index
Abstract:
"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--provided by publisher

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
32090000000197 TK5105.8865 G73 2014 Open Access Book Book
Searching...
Searching...
33000000009210 TK5105.8865 G73 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

* analysis of forensic artifacts in common UC attacks

* an in-depth look at established UC technologies and attack exploits

* hands-on understanding of UC attack vectors and associated countermeasures

* companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.


Author Notes

Nick Grant and Joe Shaw have a combined 28 years of experience working in the Security and Computer Forensics Industries, they have multiple Certifications, and both have a passion for their work.


Table of Contents

List of Figuresp. xi
About the Authorsp. xiii
Contributing Authorp. xv
Dedicationsp. xvii
Chapter 1 A Brief Introductionp. 1
Introduction to Unified Communicationsp. 1
Protocolsp. 2
Signalingp. 2
Media Sessionp. 3
An Introduction to Network Forensicsp. 3
Network Forensics and Analysis Toolsp. 5
Brop. 5
Nftrackerp. 5
Snortp. 6
Tcpdumpp. 6
Tcpxtractp. 7
Wireshaikp. 7
Xplico Systemp. 7
Security Onion: All the Tools Rolled into Onep. 8
Chapter 2 Spit, Phishing, and Other Social Outingsp. 15
Introductionp. 18
Caller ID Spoofingp. 18
Phishing/Vishing/SMishingp. 20
SPITp. 20
Security Best Practicesp. 21
Required Annual Attendancep. 22
Role-Based Trainingp. 22
Delivery Modesp. 22
Require Training Firstp. 23
Acknowledgment of Policyp. 23
Outside Referencesp. 23
Utilize Multiple Organizationsp. 23
Conclusionp. 24
Chapter 3 Misconfiguration Begat Toll Fraud and Other VoIP Mischiefp. 25
Introductionp. 26
Common Misconfigurationsp. 26
Long Distance, Premium-Rate Telephone Numbers, and Internationalp. 27
Encryptionp. 27
Direct Inward System Accessp. 27
Call Forwardingp. 28
Weak or Null Passwordsp. 28
Security Best Practicesp. 28
Dialing Restrictionsp. 29
Encryptionp. 29
Restrict Premium Featuresp. 29
Password/PIN Strengthp. 30
Baselinep. 30
Phone Bill Analysisp. 31
Log Analysisp. 31
Conclusionp. 31
Chapter 4 Mixed Signalsp. 33
Introductionp. 34
SIP Requestsp. 34
Registerp. 34
Invitep. 37
Byep. 44
Optionsp. 45
Ackp. 46
Summing Upp. 48
SIP Responsesp. 48
1xx Responsesp. 48
2xx Responsesp. 48
3xx Responsesp. 49
4xx Responsesp. 49
5xx Responsesp. 49
6xx Responsep. 50
Summaryp. 50
Wrapping Upp. 50
Chapter 5 Can You Hear Me Nowp. 51
Introductionp. 52
What Does It All Mean?p. 52
RTP Header Fieldsp. 53
Versionp. 53
Paddingp. 53
Extensionp. 53
CSRC Countp. 54
Markerp. 54
Payload Typep. 54
Sequence Numberp. 54
Timestampp. 54
SSRCp. 54
CSRC Listp. 54
Formatp. 55
Extension Headerp. 55
RTP Control Protocolp. 55
Feedback of Quality of Data Distributionp. 55
Carry Persistent Transport Identifiersp. 56
Control Send Ratep. 56
Convey Minimal Session Controlp. 56
Packet Formatp. 56
Common Headerp. 56
Encryption Prefixp. 57
SR or RRp. 57
Additional RRsp. 57
SDESp. 57
BYE or APPp. 57
Packet Typesp. 57
Pulling It All Togetherp. 65
Chapter 6 When SIP Attacksp. 67
SIP Attacks: Introductionp. 67
PBX Configurationp. 68
VAST Setupp. 72
SIP Enumerationp. 73
NMAPp. 73
SVMAP.PYp. 75
SVWAR.PYp. 78
SIP Exploitationp. 80
Attacking SIPp. 84
SVCRACK.PYp. 84
I can hear youp. 85
Conclusionp. 91
Chapter 7 Hacking the Networkp. 93
Introductionp. 93
Gaining Initial Accessp. 94
Scanning the Network for Potential Vulnerabilitiesp. 94
Vulnerabilities and Exploitsp. 94
Discovery Scanning and Identification of Vulnerabilitiesp. 95
Softphone Exploitsp. 111
Maintaining Accessp. 113
Chapter 8 VoIP Botsp. 115
Introductionp. 115
Covert Channelp. 115
Attacksp. 116
Botnetp. 116
Data Exfiltrationp. 117
The Proof Is in the Puddingp. 117
Discussionp. 119
Preventionp. 120
Chapter 9 Introduction to Digital Forensicsp. 123
Introductionp. 123
One Discipline, Divergent Fieldsp. 124
Incident Responsep. 125
Understanding Packet Capturep. 131
Netflowp. 135
Full Packet Capture Productsp. 136
Pulling It All Togetherp. 136
Chapter 10 Security Best Practices-VoIP Implementation Policyp. 139
Introductionp. 139
Policyp. 140
Infrastructurep. 140
Serverp. 140
Clientp. 141
Administrativep. 141
Policy Reviewp. 141
Infrastructurep. 141
Serverp. 142
Clientp. 144
Administrationp. 144
Final Thoughtsp. 145
Indexp. 147