• Complain

Nicholas Grant - Unified Communications Forensics: Anatomy of Common UC Attacks

Here you can read online Nicholas Grant - Unified Communications Forensics: Anatomy of Common UC Attacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2013, publisher: Syngress, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Unified Communications Forensics: Anatomy of Common UC Attacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Unified Communications Forensics: Anatomy of Common UC Attacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

. analysis of forensic artifacts in common UC attacks

. an in-depth look at established UC technologies and attack exploits

. hands-on understanding of UC attack vectors and associated countermeasures

. companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.

. Provides key information for hackers and pen testers on the most current Unified Communications implementations.

. The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.

. Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.

Nicholas Grant: author's other books


Who wrote Unified Communications Forensics: Anatomy of Common UC Attacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Unified Communications Forensics: Anatomy of Common UC Attacks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Unified Communications Forensics: Anatomy of Common UC Attacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Unified Communications Forensics Anatomy of Common UC Attacks Nicholas Grant - photo 1
Unified Communications Forensics
Anatomy of Common UC Attacks

Nicholas Grant

Joseph W. Shaw II

Technical Editor

Jamey B. Tubbs, CISSP, ENCE, SCERS, CEH

Table of Contents Copyright Acquiring Editor Chris Katsaropoulos - photo 2

Table of Contents
Copyright

Acquiring Editor:Chris Katsaropoulos

Development Editor:Benjamin Rearick

Project Manager:Malathi Samayan

Designer:Greg Harris

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

2014 Elsevier, Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Grant, Nicholas, 1978

Unified communications forensics : anatomy of common UC attacks / Nicholas Grant, Joseph Shaw II.

pages cm

Includes bibliographical references and index.

ISBN 978-1-59749-992-7 (pbk.)

1. Internet telephony. 2. Computer network protocols. 3. Forensic sciences. I. Shaw, Joseph, II, 1976- II. Title.

TK5105.8865.G73 2013

658.478--dc23

2013023565

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library.

For information on all Syngress publications, visit our website at store.elsevier.com/Syngress

ISBN: 978-1-59749-992-7

Printed in the United States of America

14 15 16 12 11 10 9 8 7 6 5 4 3 2 1

List of Figures SIP header format Tpcdump Wireshark interface Downloading - photo 3

List of Figures

SIP header format.

Tpcdump.

Wireshark interface.

Downloading Security Onion ISO.

Downloading VMware Player.

Installing VMware Player.

Installing Security Onion.

Virtual machine hardware configuration.

Security Onion VM installation screen.

About the Authors

Nicholas Grant is an information security professional with over ten years of experience within the industry. He holds a CISSP and has a Masters of Science in Management of Information Systems Security from Colorado Technical Institute. He works as a Vulnerability Manager for a large financial institution. Also, Nicholas is a professor, teaching Bachelor and Associate level courses for a nationally accredited university. His experience includes IT Governance, Security Policy Development, Information Assurance Engineering, Voice Over IP Implementation and Penetration Testing, Training, and Teaching.

Joseph W Shaw II has been working in Information Security for over 18 years, with experience in various industry verticals including telecommunications, energy, luxury retail, legal and healthcare. He is now a consultant for a large worldwide professional services company, where he provides expertise in Digital Forensics with an emphasis on Incident Response, Malware Analysis and Reverse Engineering, Vulnerability Assessment, Penetration Testing and, Security Event and Incident Management (SEIM) for clients in multiple industries. Mr. Shaws current duties also include teaching Mastering Macintosh Forensics, Cellebrite UFED Physical and Logical Analyzer, and Incident Response classes to civilians as well as local, state, and federal law enforcement agencies. In addition, he also teaches digital forensics to foreign law enforcement agencies across the globe through the US Department of States Antiterrorism Assistance program. Mr. Shaw is a SANS Lethal Forensicator and holds the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), EnCase Certified Examiner (EnCE), GIAC Auditing Wireless Networks (GAWN), and is a licensed Private Investigator Qualified Manager in the State of Texas. When not on the road or speaking at Information Security conventions, Mr. Shaw lives in the suburbs of Dallas, TX with his beautiful wife Melissa, their eight awesome children, two cats and a great dane.

Contributing Author

Nick Hensley , CISSP

Nick Hensley, having held his CISSP since 2002, is a seasoned information security professional with 12 years in the industry. He currently manages a team of penetration testers and performs penetration and application security testing alongside his team, supporting roughly 150 different clients. His background covers a broad range of managerial and technical positions. Nicks expertise lies in Penetration Testing, Computer Forensics, Electronic Discovery, Intrusion Detection and Prevention Systems, and Security Architecture Design and Implementation.

Dedications

Joseph W Shaw II Personal:

First, Id like to thank my Lord and Savior, Jesus Christ, for His grace and blessings. You have led, and I have followed. I was lost, but now am found.

Id like to dedicate this book to my family, whose sacrifices during its production cannot be overstated. To my wife, Melissa, who has always believed in me and kept me sane, even in the face of deadlines and immense pressures. I know were both Type-A personalities, but youve been the best goat ever, and Id be nothing without you. And to my children, Haley, Joseph, Jeffery, Thomas, Jubilee, Judah, David and Daniel, for understanding when daddy needed to sequester himself away in his office and write/edit instead of spending time with the family. Your graciousness and understanding made this book possible, and I promise to make it worth it!

To Syngress, Dave and Brian:

The authors would first like to thank everyone at Syngress for working with us to get this book produced and published. Its been a long road from the initial book proposal we submitted to a published book, and we greatly appreciate all the hard work that went into making it happen.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Unified Communications Forensics: Anatomy of Common UC Attacks»

Look at similar books to Unified Communications Forensics: Anatomy of Common UC Attacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Unified Communications Forensics: Anatomy of Common UC Attacks»

Discussion, reviews of the book Unified Communications Forensics: Anatomy of Common UC Attacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.