how to intercept skype voip telephone traffic

Frédéric Raynal (EADS) EuSecWest 2006
How to create your own private skype network so you
can authentify the users and be an interface to other
skype networks. In this man in the middle attack the
users think they are logging in to the real network

this is nothing new, if you install yourself as a superserver in a P2P network, you will also intercept all the questions from downloaders (you can sue afterwards with your own logs in your hand). VOIP is nothing else.

17:36 Gepost door technology changes fast not a lot | Permalink | Commentaren (0) |  Facebook |

De commentaren zijn gesloten.