Grand Idea Studio

Compromising Voice Messaging Systems

 

Voice mail systems and answering machines are an important part of the corporate information flow. However, they are frequently left unprotected and are overlooked when security assessments are performed. Access to these systems may yield valuable information and may assist attackers to further their attacks on the company’s computer infrastructure. This brief paper introduces the concept and methodologies of compromising voice mail systems and answering machines, provides vendor specific characteristics to aid in voice mail compromise, and contains a reference of related news reports, security advisories, and software tools.

Paper: Compromising Voice Messaging Systems

Originally released on the @stake website.

Press

Altium Stories

Confessions of a Hacker known as ...

The Hacker Next Door Podcast

Hardware Hacker Joe Grand

Advanced Assembly

Beat a Hacker by Thinking Like a ...