Upload

Loading icon Loading...

This video is unavailable.

iSEC Partners presents: The Hacked and the Furious

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like iSECPartners's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike iSECPartners's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add iSECPartners's video to your playlist.

Uploaded on Aug 7, 2011

Don Bailey and Mat Solnik of iSEC Partners demonstrate one of the more practical applications of War Texting.

For more information, see Don's Blackhat USA 2011 presentation "War Texting: Identifying and Interacting with Devices on the Telephone Network" on the iSEC Partners blog:
http://www.isecpartners.com/blog/2011...

Note: This video has been edited (animal noises added) to protect vendor specific information.

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

The interactive transcript could not be loaded.

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to