IVR Applications are Unaudited because they are Considered Safe
No Firewalls|Captcha or security systems in place for IVR Applications
Finger Printing Internal Servers:
Triggering Errors | Vulnerable Programs | Automating itInput Validation Attacks
Grammer Files | Potential Sql Injection | Vulnerable ProgramsPotential Buffer Over Flow in CGI
DTMF , Voice Fuzzing | Vulnerable Applications | Alpha Numeric Payload, Crashing An Internal ServerFinger Printing Internal Servers
Triggering Errors...
Finger Printing Internal Servers
Demo ApplicationDemo Video
SQL Injection
vai Telephone Phone LineLesson 2: What all did we learn.