Automotive Holiday Deals Books Gift Guide Books Gift Guide Shop Men's Athletic Shoes Learn more nav_sap_SWP_6M_fly_beacon Prime Music Sweepstakes egg_2015 All-New Amazon Fire TV Luxury Beauty Gifts for Her Amazon Gift Card Offer cm15 cm15 cm15 $30 Off Amazon Echo $30 Off Fire HD 6 Kindle Cyber Monday Deals Indie for the Holidays in Prime Music Outdoors Gift Guide on HTL

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Digital List Price: $35.95
Kindle Price: $19.77

Save $25.18 (56%)

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

Flip to back Flip to front
Audible Narration Playing... Paused   You are listening to a sample of the Audible narration for this Kindle book.
Learn more

Hacking VoIP: Protocols, Attacks, and Countermeasures Kindle Edition

4 customer reviews

New from Used from
"Please retry"

Length: 220 pages

Hero Quick Promo
Holiday Deals in Kindle Books
Save up to 85% on more than 1,000 Kindle Books. These deals are valid until November 30, 2015. Learn more

Editorial Reviews

About the Author

Himanshu Dwivedi is a leading security expert and researcher. He has published four books, Hacking Exposed: Web 2.0 (McGraw-Hill), Securing Storage (Addison Wesley), Hacker's Challenge 3 (McGraw-Hill), and Implementing SSH (Wiley). A founder of iSEC Partners, Himanshu manages iSEC's product development and engineering, specialized security solutions, and the creation of security testing tools for customers.

Product Details

  • File Size: 2072 KB
  • Print Length: 220 pages
  • Simultaneous Device Usage: Unlimited
  • Publisher: No Starch Press; 1 edition (October 28, 2008)
  • Publication Date: August 24, 2010
  • Sold by: Amazon Digital Services, Inc.
  • Language: English
  • ASIN: B004OEJN9C
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Not Enabled
  • Enhanced Typesetting: Not Enabled
  • Amazon Best Sellers Rank: #1,190,898 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images or tell us about a lower price?

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

4 of 4 people found the following review helpful By TurboBorland on January 26, 2011
Format: Paperback Verified Purchase
The opening of this book clearly explains that this book is for people who are system administrators. I would like to add that this book seems to be for system administrators who are just too busy with everything else to care about technicalities of the security and don't know much about security in general.

However, when I saw No Starch Press released this book, I was not expecting the contents to be so tame. The bulk of the book is how man in the middle attacks effect the different protocols and the multitudes of denial of service attacks using legitimate VoIP commands. However, the details are mostly just glossed over and a very general overview is given for the attack and then a tool is provided. How to use tools and the exact switches are perhaps half of the explanations in the book. For those who understand man in the middle, how there is no trust in UDP, and how to read RFC's, you will find little in this book that is interesting. This is the reason why I gave the book a 3 despite it being exactly what the title says.

Not all of the book was bad. Chapter 7 is on unconventional VoIP attacks and gives the reader some interesting ideas on how VoIP attacks can be used. The first half of Chapter 6 shows client configuration abuses and is the type of material I was expecting from this book.

If you are a system administrator who doesn't know much about security and would like to read some quick overview of VoIP insecurities without technicalities, this is the perfect book for you. If you were looking for a technical guide on VoIP security, then look elsewhere.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 4 people found the following review helpful By Viken Derderian on July 22, 2009
Format: Paperback
Eureka! What a pleasant surprise. This is the best Hacking book I have ever read. as matter of fact the book scared me so much that if asked I would classify it as "non-fictional horror".

According to Himanshu Dwivedi "Hacking VoIP is a security book written primarily for VoIP administrators"; This statement is in the introduction of the book, that is the only thing I did not find to be true, I like to change that statement to read something like " .....a security book written primarily for Information Security and Auditors it can also be used by VoIP administrators.....".

I accidentally started reading this book, and I just got hooked. The book is devided into 4 sections;
1-Introduction VoIP Security
2-VoIP Protocols
3-Security treats
4-Securing and Auditing VoIP
The 4 sections are contained in very well organized 10 Chapters. Each chapter, no each line of each chapter is a list of ingredients needed to break in to a VoIP phone, switch or a server.

The author goes at great lengths creating a VoIP lab, following his step by step recommendations and downloading the programs listed, I actually created the exact same lab, I have no idea why. Than downloaded the hacking tools, which should go in the blacklisted application database of every business, once again following the steps outlined in the book I could actually break into conversations, change caller ID (you can really play sick tricks with this feature), and realize that the 6 character password I have for my voice mail is actually crackable in less than 10 minutes.

OK!, Where is the beef? You may ask, how can I use this book? Well! Up to Chapter 9 you learn what a malicious person is or may try to do.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
3 of 4 people found the following review helpful By sixmonkeyjungle on April 7, 2009
Format: Paperback
Voice over IP (VoIP) communications are a core component of the next wave of communications. Consumers and enterprises both are beginning to grasp the benefits of VoIP communications and making the switch from traditional voice communications to VoIP.

VoIP can be a double-edged sword as well though. It provides cost savings. It adds flexibility and extensibility that isn't possible with traditional telephone communications. It enables a whole new scope of applications to interact with and leverage voice communications in whole new ways.

However, with all of those benefits, it also merges voice data onto the standard data network and exposes what was a relatively secure system to a wide variety of attacks and exploits. Traditional voice attacks like eavesdropping or wiretapping are still issues, but on a grander scale. And now voice communications can also be subjected to denial-of-service (DoS) and man-in-the-middle (MiTM) and other attacks that have traditionally been reserved for data networks.

With Hacking VoIP: Protocols, Attacks, and Countermeasures from No Starch Press, Himanshu Dwivedi explores the security issues inherent with VoIP communications and how to protect your VoIP system against them.

Dwivedi opens the book by walking through how to build a VoIP lab environment to use as you read through the book to get first-hand experience and understanding of the VoIP attacks and exploits and the countermeasures to use against them. This hands-on experience helps the reader to see the attacks in action rather than just reading about them.

The book provides a good background on the VoIP protocols themselves, and Dwivedi does an excellent job of explaining the weaknesses and exploits. VoIP admins should read this book and follow Dwivedi's advice to protect their VoIP environments.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse


There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
First post:
Prompts for sign-in