Grand Idea Studio

Compromising Voice Messaging Systems

 

Voice mail systems and answering machines are an important part of the corporate information flow. However, they are frequently left unprotected and are overlooked when security assessments are performed. Access to these systems may yield valuable information and may assist attackers to further their attacks on the company’s computer infrastructure. This brief paper introduces the concept and methodologies of compromising voice mail systems and answering machines, provides vendor specific characteristics to aid in voice mail compromise, and contains a reference of related news reports, security advisories, and software tools.

Paper: Compromising Voice Messaging Systems

Originally released on the @stake website.

Press

Pentester Academy TV

Hardware Security Training

PCMag

Joe 'Kingpin' Grand on Hacker ...

Uses This

Joe Grand