Chapter 7

Hacking the Network

Abstract

This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.

Keywords

Hacking; Attacks; Network penetration; Social engineering; Vulnerabilities

Chapter points

■ Gaining Initial Access

■ Scanning the Network for Potential Vulnerabilities

■ Vulnerabilities and Exploits

■ Softphone Exploits

■ Maintaining Access

Introduction ...

Get Unified Communications Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.