Tag: Voice over Internet Protocol

  • Advanced Data Exfiltration – full paper

    This paper has been published in several security conferences during 2011, and is now being made fully available (as well as a PDF version for downloading)   Abstract Penetration testing and red-team exercises have been running for years using the same methodology and techniques. Nevertheless, modern attacks do not conform to what the industry has […]