Skip to content

The Attacker Phase: Phase 2 challenged contestants to circumvent an existing honeypot and prevent it from collecting information on incoming calls. Droid Rachel circumvents the existing honeypot by employing a four-step targeting process that screens out phone numbers potentially connected to a honeypot, and optimizes Droid Rachel’s ability to s…

Notifications You must be signed in to change notification settings

FederalTradeCommission/Zapping-Rachel-Phase-2-DEF-CON-22

Repository files navigation

Zapping-Rachel-Phase-2-DEF-CON-22

Phase 2 challenged contestants to circumvent an existing honeypot and prevent it from collecting information on incoming calls. Droid Rachel circumvents the existing honeypot by employing a four-step targeting process that screens out phone numbers potentially connected to a honeypot, and optimizes Droid Rachel’s ability to send robocalls using unsuspecting consumers’ Android phones.

About

The Attacker Phase: Phase 2 challenged contestants to circumvent an existing honeypot and prevent it from collecting information on incoming calls. Droid Rachel circumvents the existing honeypot by employing a four-step targeting process that screens out phone numbers potentially connected to a honeypot, and optimizes Droid Rachel’s ability to s…

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published