First page Back Continue Last page Graphics
About this Presentation
All attacks discussed are either recently developed, or extremely significant
Making the case that attack tools are both available and mature
Divided into three sections:
- Briefly, VoIP Basics
- Attacks (Vulns, Attacks, Impact, Tools, Mitigation)
- Problems with suggested mitigation actions
I’ll be discussing only technical attacks; not social attacks like SPIT, Phishing, etc.
Tim Burton is AWESOME!