O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2FOOTPRINTING A UC NETWORK

An investment in knowledge pays the best interest.

—Benjamin Franklin

We should all be familiar with the principles of investing as pertaining to money, but investing in knowledge about a UC network prior to an attack can provide the information necessary to hack successfully. Although making investments and hacking a UC network are very different activities, success in each will depend on solid reconnaissance and research well before either ever begins. By their very nature, unified communications and the Voice over Internet Protocol illustrate the convergence of the phone network and the Internet. Within this intersection of voice and computer networking we are seeing the exploitation of vulnerabilities particular ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required