4

Exploring Microsoft Teams Rooms (MTR) Console as a Potential Attack Vector – | b...

 3 years ago
source link: https://bohops.com/2020/02/14/exploring-microsoft-teams-rooms-mtr-console-as-a-potential-attack-vector/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Exploring Microsoft Teams Rooms (MTR) Console as a Potential Attack Vector

Introduction

Microsoft Teams Rooms (MTR), formerly known as Skype Room System and Lync Room Systems, is the latest and greatest solution from Microsoft for managing online collaborative meetings. In many businesses across the globe, a Teams Rooms console (“Teams console”) is the lifeblood of the conference room. The console typically consists of a supported computer system, management dock, camera, and output device(s). The Teams Room application suite runs on Windows 10 Enterprise or Windows 10 Enterprise IoT.

For offensive security testers, this post will cover a simple case where attacking Teams gear may be beneficial when conducting a physical or internal penetration test. For defenders and system administrators, this post will highlight opportunities to reduce the attack surface of your expensive, often forgotten conferencing equipment. Let’s get started…

[Continue reading at EmberCyberSecurity.com]

Published by bohops

View all posts by bohops


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK