View RSS Feed

Fb1h2s aka Rahul Sasi's Blog

Internal Attacks vai IVR systems [ Security Vulnerabilities in IVR Applications]

Rate this Entry
Am putting down Demo videos along with few important slides form my BlackHat 2012 presentation .

Here is the video from HITB on the same:


My presentation were in HTML 5 and am putting down Demo Presentations here. I will upload the HTML5 presentation some were or you could download them form

https://media.blackhat.com/bh-eu-12/...urity-Tool.zip

For Better understanding about these demos go through the html 5 slides


Name:  black_hat_europe2012.jpg
Views: 4590
Size:  6.3 KB

Name:  Slide04.jpg
Views: 1650
Size:  56.6 KB

Phone Banking

Name:  Slide06.jpg
Views: 1611
Size:  69.3 KB

Brute Forcing IVR Application:


Name:  Slide08.jpg
Views: 1590
Size:  76.3 KB



Layers of an IVR






How IVR Works






Demo IVR Application DTMF and Voice Input





Finger printing IVR Application





Input Validation Attacks [ DTMF Blind SQL Injection ]




IVR Alpha Numeric Input [Chances of sending Alpha Numeric Shellcodes]






IVR Heap OverFlow [Internal Server 500 Error


Comments

Trackbacks

Total Trackbacks 0
Trackback URL: