Chapter 7

Hacking the Network


This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.


Hacking; Attacks; Network penetration; Social engineering; Vulnerabilities

Chapter points

■ Gaining Initial Access

■ Scanning the Network for Potential Vulnerabilities

■ Vulnerabilities and Exploits

■ Softphone Exploits

■ Maintaining Access

Introduction ...

Get Unified Communications Forensics now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.