Chapter 7

Hacking the Network


This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.


Hacking; Attacks; Network penetration; Social engineering; Vulnerabilities

Chapter points

■ Gaining Initial Access

■ Scanning the Network for Potential Vulnerabilities

■ Vulnerabilities and Exploits

■ Softphone Exploits

■ Maintaining Access

Introduction ...

Get Unified Communications Forensics now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.