PBX-draft.doc...

- AV AC AU C I A
发布: 2000-07-12
修订: 2025-04-13

Finding Holes in Your PBX Before Someone Else Does. Covers switching algorithms, susceptibility to tapping, conferencing, remote access, maintenance feature vulnerabilities, line testing capabilities, undocumented maintenance features, software loading and update tampering, tamper and error detection, crash-restart attacks, live microphone vulnerabilities, embedded login IDs and passwords, alarms and audit trails, silent monitoring, override (intrude), voice mail security, and denial of service.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息