Board Room Spy Cams: How Attackers Take Over Your Video Conferencing Systems And How To Stop Them

Video conferencing systems are one of the least understood platforms found on enterprise networks, often installed in locations that host senior-level staff, and outside of the scope of typical security assessments. This combination can expose the organization and the partners that it communicates with to espionage and data theft. Many vendors ship video conferencing system with default settings that can be used to remotely monitor a conference room, initiate outbound calls, and in some cases, provide remote system access to the device itself, turning it into a launching pad for new attacks.

In this On Demand Webcast, HD Moore showcases new research on scanning H.323 video conferencing equipment to obtain unauthorized access to video and audio. Participants will about the following topics:

  • H.323 video conferencing standard
  • Weaknesses of the H.323 protocol
  • New Metasploit module for H.323 scanning
  • Demo: Accessing video and audio and moving the camera
  • Beyond listening to conferences
  • How to stop attackers
  • Q&A

Speaker:
HD Moore
CSO and Chief Architect, Metasploit

moore-headshot.jpgHD is Chief Security Officer at Rapid7 and Chief Architect of Metasploit, the leading open-source penetration testing platform. HD founded the Metasploit Project in the summer of 2003 with the goal of becoming a public resource for exploit code research and development. Prior to joining Rapid7 and continuing his work on the Metasploit Framework, HD was the Director of Security Research at BreakingPoint Systems, where he focused on the content and security testing features of the BreakingPoint product line. Prior to BreakingPoint, HD spent seven years providing vulnerability assessments, leading penetration tests, and developing exploit code.

  •  

Rapid7 rated "Strong Positive" in
Gartner MarketScope


Rapid7 is committed to respecting your privacy.