Skip to Main Content
Unified Communications Forensics
book

Unified Communications Forensics

by Nicholas Mr. Grant, Joseph II Shaw
October 2013
Intermediate to advanced content levelIntermediate to advanced
156 pages
3h 37m
English
Syngress
Content preview from Unified Communications Forensics
Chapter 7

Hacking the Network

Abstract

This chapter covers the many malicious activities an attacker can use to gain access and maintain a foothold in a network. It will also cover various attacks and the thought process an attacker may go through when penetrating your environment.

Keywords

Hacking; Attacks; Network penetration; Social engineering; Vulnerabilities

Chapter points

■ Gaining Initial Access

■ Scanning the Network for Potential Vulnerabilities

■ Vulnerabilities and Exploits

■ Softphone Exploits

■ Maintaining Access

Introduction ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Seven Deadliest Network Attacks

Seven Deadliest Network Attacks

Stacy Prowell, Rob Kraus, Mike Borkin
Securing VoIP

Securing VoIP

Regis Jr (Bud) Bates

Publisher Resources

ISBN: 9781597499927