Video conferencing systems are one of the least understood platforms found on enterprise networks, often installed in locations that host senior-level staff, and outside of the scope of typical security assessments. This combination can expose the organization and the partners that it communicates with to espionage and data theft. Many vendors ship video conferencing system with default settings that can be used to remotely monitor a conference room, initiate outbound calls, and in some cases, provide remote system access to the device itself, turning it into a launching pad for new attacks.
In this On Demand Webcast, HD Moore showcases new research on scanning H.323 video conferencing equipment to obtain unauthorized access to video and audio. Participants will about the following topics:
CSO and Chief Architect, Metasploit
HD is Chief Security Officer at Rapid7 and Chief Architect of Metasploit, the leading open-source penetration testing platform. HD founded the Metasploit Project in the summer of 2003 with the goal of becoming a public resource for exploit code research and development. Prior to joining Rapid7 and continuing his work on the Metasploit Framework, HD was the Director of Security Research at BreakingPoint Systems, where he focused on the content and security testing features of the BreakingPoint product line. Prior to BreakingPoint, HD spent seven years providing vulnerability assessments, leading penetration tests, and developing exploit code.