Looking through an Attacker’s Eye—Picture to Compromise in 30 Seconds

  • Friday, March 4, 2016 | 10:10 AM – 11:00 AM | West | Room: 3002

View all Sessions

This presentation will focus on tools and techniques that can turn multiple commonly used videoconference systems into attacker platforms. The speakers will demonstrate unique methods of porting through a standard VoIP system from the outside directly into the internal network.


This document was retrieved from on Mon, 17 Jun 2019 13:41:55 -0400.