Skip to main content

Asterisk Hacking

  • 1st Edition - June 29, 2007
  • Latest edition
  • Author: Joshua Brashars
  • Language: English

Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the mo… Read more

World Book Day celebration

Where learning shapes lives

Up to 25% off trusted resources that support research, study, and discovery.

Description

Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.

This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.

Key features

  • Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
  • See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.

Readership

New and experienced Asterisk users

Table of contents

What is Asterisk and why do you need it?

Installing Asterisk

Add-ons and Modules

Scripting

Asterisk Hardware Ninjutsu

Protocols, say what?

Asterisk Underground

Lock it down!

Reach out and touch someone: The future of Asterisk Hacking

Product details

  • Edition: 1
  • Latest edition
  • Published: June 29, 2007
  • Language: English

About the author

JB

Joshua Brashars

Affiliations and expertise
External Threat Assessment Team, Secure Science Corporation, San Diego, CA

View book on ScienceDirect

Read Asterisk Hacking on ScienceDirect