Looking through an Attacker’s Eye—Picture to Compromise in 30 Seconds

  • Friday, March 4, 2016 | 10:10 AM – 11:00 AM | West | Room: 3002

View all Sessions

This presentation will focus on tools and techniques that can turn multiple commonly used videoconference systems into attacker platforms. The speakers will demonstrate unique methods of porting through a standard VoIP system from the outside directly into the internal network.


This document was retrieved from on Wed, 26 Oct 2016 19:06:21 -0400.
© 2016 EMC Corporation. All rights reserved.