View RSS Feed

Fb1h2s aka Rahul Sasi's Blog

Internal Attacks vai IVR systems [ Security Vulnerabilities in IVR Applications]

Rate this Entry
Am putting down Demo videos along with few important slides form my BlackHat 2012 presentation .

Here is the video from HITB on the same:

My presentation were in HTML 5 and am putting down Demo Presentations here. I will upload the HTML5 presentation some were or you could download them form

For Better understanding about these demos go through the html 5 slides

Name:  black_hat_europe2012.jpg
Views: 4644
Size:  6.3 KB

Name:  Slide04.jpg
Views: 1705
Size:  56.6 KB

Phone Banking

Name:  Slide06.jpg
Views: 1655
Size:  69.3 KB

Brute Forcing IVR Application:

Name:  Slide08.jpg
Views: 1638
Size:  76.3 KB

Layers of an IVR

How IVR Works

Demo IVR Application DTMF and Voice Input

Finger printing IVR Application

Input Validation Attacks [ DTMF Blind SQL Injection ]

IVR Alpha Numeric Input [Chances of sending Alpha Numeric Shellcodes]

IVR Heap OverFlow [Internal Server 500 Error



Total Trackbacks 0
Trackback URL: