Star 0

Abstract

This presentation will focus on tools and techniques that can turn multiple commonly used videoconference systems into attacker platforms. The speakers will demonstrate unique methods of porting through a standard VoIP system from the outside directly into the internal network.