security tools
These are the tools we demonstrated in the book. The tools
listed in blue are the ones we wrote ourselves. Most of our linux tools require that you also download the following two libraries:
hack_library and
g711conversions.
- Chapter 2: Scanning
- Chapter 3: Enumeration
- Chapter 4: Infrastructure Denial of Service
- Chapter 5: Eavesdropping
- Chapter 6: Network and Application Interception
- Chapter 7: Cisco Unified CallManager
- Chapter 9: Asterisk
- Chapter 11: Fuzzing
- Chapter 12: Disruption of Service
- Chapter 13: Signaling and Media Manipulation
- Chapter 14: SPAMMING/SPIT