Looking through an Attacker’s Eye—Picture to Compromise in 30 Seconds

  • Friday, March 4, 2016 | 10:10 AM – 11:00 AM | West | Room: 3002

View all Sessions

This presentation will focus on tools and techniques that can turn multiple commonly used videoconference systems into attacker platforms. The speakers will demonstrate unique methods of porting through a standard VoIP system from the outside directly into the internal network.


This document was retrieved from on Sun, 28 May 2017 10:23:36 -0400.
© 2017 EMC Corporation. All rights reserved.