In part one, we discussed the architecture of web conferencing applications, with a specific focus on Zoom’s architecture to support web conferencing at a massive global scale. Part two will discuss the approach we developed to support tunneling traffic through Zoom and Microsoft Teams using the TURN protocol. Let’s start with a quick recap of […] The post Ghost Calls: Abusing Web Conferencing for Covert Command & Control (Part 2 of 2) appeared first on Praetorian.