Breaking Trust with a Phone Call


Details
Phones still carry a weird level of trust in most orgs. In this talk, Alex will show how easy it is to spoof caller ID, impersonate internal extensions, and use VOIP to trick the system - and the humans on the other end. We’ll look at real-world scenarios from pentests where spoofed calls led to creds, access, or full compromise. I might even demo how to manipulate SIP headers, dial through auto attendants, and abuse common PBX setups to look legit, none of that cheesy Spoofcard stuff. I’ll leave your ears ringing with knowledge on how this stuff works, how attackers weaponize it, and how to start defending against it.
Additionally, let's try something new. Bring your nerdy stickers for a sticker trade.
We'll have about an hour of nerdy content followed by a social hour at Fassler Hall where you can network and get to know your fellow hackers.

Breaking Trust with a Phone Call