First page Back Continue Last page Graphics
About this Presentation
Attacks discussed are either recent or significant
Making the case that attack tools are available and mature
Divided into three sections:
- Briefly, VoIP Basics
- Attacks (Vulns, Attacks, Impact, Tools, Mitigation)
- Problems with suggested mitigation actions
I’ll be discussing only technical attacks