SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Fatih Ozavci

Fatih Ozavci

70 Followers
21 SlideShares 0 Clipboards 70 Followers 2 Followings
  • Unblock User Block User
21 SlideShares 0 Clipboards 70 Followers 2 Followings

Personal Information
Contact Details
Tags
penetration testing security voip hacking pen-test sip viproy information security exploit metasploit free software skype for business skype microsoft ims defcon blackhat ngn privacy mahremiyet unified communications hardware hacking iot information technology internet of things embedded systems hitb ruxcon lync phreaking cisco turkish tools occupygezi gezi parki athcon exploit development fuzzing mobile application development essentials guvenlik audit
See more
Presentations (19)
See all
Metasploit Framework ile Güvenlik Denetimi
10 years ago • 845 Views
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
10 years ago • 715 Views
Ozgur Yazilimlar ile Saldiri Yontemleri
10 years ago • 1302 Views
Mahremiyet Ekseninde Ozgur Yazilimlar
10 years ago • 762 Views
Bilgi Guvenligi Temel Kavramlar
10 years ago • 5640 Views
MBFuzzer : MITM Fuzzing for Mobile Applications
10 years ago • 1539 Views
Metasploit Framework ile Exploit Gelistirme
9 years ago • 3328 Views
NGN ve VoIP Ağları Güvenlik Denetimi
9 years ago • 2755 Views
Hacking SIP Like a Boss!
9 years ago • 21947 Views
Mahremiyetinizi Koruyun
9 years ago • 1801 Views
VoIP Wars : Return of the SIP
9 years ago • 98958 Views
VoIP Wars: Attack of the Cisco Phones
8 years ago • 72114 Views
Viproy ile VoIP Güvenlik Denetimi
7 years ago • 859 Views
The Art of VoIP Hacking - Defcon 23 Workshop
7 years ago • 57724 Views
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
7 years ago • 6081 Views
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
7 years ago • 47091 Views
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
6 years ago • 1700 Views
VoIP Wars: The Phreakers Awaken
6 years ago • 26422 Views
Departed Communications: Learn the ways to smash them!
5 years ago • 1226 Views
Documents (2)
Metasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
10 years ago • 2485 Views
Hacking Trust Relationships Between SIP Gateways
10 years ago • 1259 Views
Likes (1)
Writing Metasploit Plugins
amiable_indian • 15 years ago
  • Activity
  • About

Presentations (19)
See all
Metasploit Framework ile Güvenlik Denetimi
10 years ago • 845 Views
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
10 years ago • 715 Views
Ozgur Yazilimlar ile Saldiri Yontemleri
10 years ago • 1302 Views
Mahremiyet Ekseninde Ozgur Yazilimlar
10 years ago • 762 Views
Bilgi Guvenligi Temel Kavramlar
10 years ago • 5640 Views
MBFuzzer : MITM Fuzzing for Mobile Applications
10 years ago • 1539 Views
Metasploit Framework ile Exploit Gelistirme
9 years ago • 3328 Views
NGN ve VoIP Ağları Güvenlik Denetimi
9 years ago • 2755 Views
Hacking SIP Like a Boss!
9 years ago • 21947 Views
Mahremiyetinizi Koruyun
9 years ago • 1801 Views
VoIP Wars : Return of the SIP
9 years ago • 98958 Views
VoIP Wars: Attack of the Cisco Phones
8 years ago • 72114 Views
Viproy ile VoIP Güvenlik Denetimi
7 years ago • 859 Views
The Art of VoIP Hacking - Defcon 23 Workshop
7 years ago • 57724 Views
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
7 years ago • 6081 Views
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
7 years ago • 47091 Views
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
6 years ago • 1700 Views
VoIP Wars: The Phreakers Awaken
6 years ago • 26422 Views
Departed Communications: Learn the ways to smash them!
5 years ago • 1226 Views
Documents (2)
Metasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
10 years ago • 2485 Views
Hacking Trust Relationships Between SIP Gateways
10 years ago • 1259 Views
Likes (1)
Writing Metasploit Plugins
amiable_indian • 15 years ago
Tags
penetration testing security voip hacking pen-test sip viproy information security exploit metasploit free software skype for business skype microsoft ims defcon blackhat ngn privacy mahremiyet unified communications hardware hacking iot information technology internet of things embedded systems hitb ruxcon lync phreaking cisco turkish tools occupygezi gezi parki athcon exploit development fuzzing mobile application development essentials guvenlik audit
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.