Grand Idea Studio

Compromising Voice Messaging Systems


Voice mail systems and answering machines are an important part of the corporate information flow. However, they are frequently left unprotected and are overlooked when security assessments are performed. Access to these systems may yield valuable information and may assist attackers to further their attacks on the company’s computer infrastructure. This brief paper introduces the concept and methodologies of compromising voice mail systems and answering machines, provides vendor specific characteristics to aid in voice mail compromise, and contains a reference of related news reports, security advisories, and software tools.

Paper: Compromising Voice Messaging Systems

Originally released on the @stake website.


The Hack

Mais destaques do maior festival ...


Hackers devem dar voz para ...

The Security Ledger Podcast

Joe Grand on Unicorn Spotting and ...