O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PART IIAPPLICATION ATTACKS

Case Study: A Real-World Telephony Denial of Service (TDoS) Attack

The primary threats affecting enterprises are at the application level, coming from and carried over the public voice network. These threats include calling number spoofing, toll fraud, and harassing calls as well as telephony denial of service (TDoS), voice SPAM, and social engineering/voice phishing. These threats all are common because there are clear financial and disruption incentives behind them, and they can be safely launched from the public network, whereas most of the attacks covered in the rest of this book must be launched from within the enterprise. This case study covers a real-world TDoS attack seen in 2013.

The Payday Loan Scam

A payday ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required