SCTPscan - Finding entry points to SS7 Networks & Telecommunication Backbones
|
|
|
- Ross Mitchell
- 10 years ago
- Views:
Transcription
1 SCTPscan - Finding entry points to SS7 Networks & Telecommunication Backbones Philippe Langlois Telecom Security Task Force [email protected] 1
2 Agenda History of telecommunications security Review of digital telephony concepts Discovering the backbone SIGTRAN: From SS7 to TCP/IP Attacking SIGTRAN Q&A 2
3 The origins Phreaking is a slang term for the action of making a telephone system do something that it normally should not allow. Telecommunications security problems started in the 1960 s when the hackers of the time started to discover ways to abuse the telephone company. 3
4 But what is it? Discovery and exploration of features of telecommunications systems Controlling Network Elements (NE) in a way that was not planned by its designers Abusing weaknesses of protocols, systems and applications in telephone networks 4
5 The Blue Box Steve Jobs and Steve Wozniak in 1975 with a bluebox CCITT#5 in-band signalling sends control messages over the speech channel, allowing trunks to be controlled Seize trunk (2600) / KP1 or KP2 / destination / ST Started in mid-60 s, became popular after Esquire 1971 Sounds produced by whistles, electronics dialers, computer programs, recorded tones 5
6 The end of the blueboxing era Telcos installed filters, changed frequencies, analyzed patterns, sued fraudsters The new SS7 digital signalling protocol is out-of-band and defeats blueboxing In Europe, boxing was common until the early nineties and kept on until In Asia, boxing can still be done on some countries. 6
7 Past & current threats on the telecom backbone Fraud Blue Box Internal Fraud Reliability US: 911, Europe: 112 How much lost revenue is one minute of downtime? 7
8 21st century telecom attacks SIP account hacking Remember Calling Cards fraud? VoIP GW hacking Remember PBX hacking? Signalling hacking directly on SS7 SIGTRAN level Back at the good old BlueBox? Not nearly but, the closest so far 8
9 Example of SS7 Attacks Theft of service, interception of calling cards numbers, privacy concerns Introduce harmful packets into the national and global SS7 networks Get control of call processing, get control of accounting reports Obtain credit card numbers, non-listed numbers, etc. Messages can be read, altered, injected or deleted Denial of service, security triplet replay to compromise authentication Annoyance calls, free calls, disruption of emergency services Capture of gateways, rerouting of call traffic Disruption of service to large parts of the network Call processing exposed through Signaling Control Protocol Announcement service exposed to IP through RTP Disclosure of bearer channel traffic 9
10 Agenda History of telecommunications security Review of digital telephony concepts Discovering the backbone SIGTRAN: From SS7 to TCP/IP Attacking SIGTRAN Q&A Lab - BYOL 10
11 Telephony 101 (recap) Fixed line (PSTN): analog, digital (ISDN) Mobile: analog (AMPS, NMT), digital (GSM, CDMA, 3G), private (PMR, Military) Telephony switches speak out-of-band SS7 signalling Speech and data convergence is increasing Services are growing (SMS, MMS, packet data, WLAN integration, etc.) VoIP and related technologies (SIP, IMS, PacketCable) 11
12 Telecom Backbones Organization 12
13 SS7: The walled garden From a customer perspective Wikipedia: Walled Garden Mobile Network Operators (MNOs). At the start of 2007, probably the best example. MNOs manage closed networks - very hard to enter the garden, or leave the garden, especially as it pertains to Internet, web services, web applications. Fearful of losing customer and brand control, the MNOs opt to guard the garden as much as possible. But also from a technology perspective OSI : Open Protocol - Proprietary Stacks Closed OSI network, IP management network 13
14 Agenda History of telecommunications security Review of digital telephony concepts Discovering the backbone SIGTRAN: From SS7 to TCP/IP Attacking SIGTRAN Q&A Lab - BYOL 14
15 SS7 Network: Regional & Local 15
16 Opening up Deregulation Europe / US: CLEC vs ILEC New services and new busines partners Premium numbers, SMS providers, Push toward an All IP infrastructure Management network first Cost SIGTRAN (SS7 over IP) 16
17 Telco Backbone Global Picture IMS = SS7 SIGTRAN + IP-based Advanced Services 17
18 VoIP and SIGTRAN SS7 & SIGTRAN Core Formerly, the walled garden VoIP Edge Hard to make it reliable (QoS, SBCs) 18
19 SS7 and IP There is also exponential growth in the use of interconnection between the telecommunication networks and the Internet, for example with VoIP protocols (e.g. SIP, SCTP, M3UA, etc.) The IT community now has many protocol converters for conversion of SS7 data to IP, primarily for the transportation of voice and data over the IP networks. In addition new services such as those based on IN will lead to a growing use of the SS7 network for general data transfers. There have been a number of incidents from accidental action on SS7, which have damaged a network. To date, there have19 been very few deliberate actions. Far from VoIP here.
20 A shock of culture: SS7 vs. IP Different set of people IT vs Telecom Operations New Open Technology Open stack Open software Interconnected Networks Habits and induced security problems Eiffel, QA, Acceptance tests, 20
21 Agenda History of telecommunications security Review of digital telephony concepts Discovering the backbone SIGTRAN: From SS7 to TCP/IP Attacking SIGTRAN Q&A Lab - BYOL 21
22 SIGTRAN in the VoIP big picture 22
23 SCTP as SIGTRAN Foundation SS7 SIGTRAN 23
24 SCTP over IP Telephony Signalling Protocol User Adaptation Layers Stream Control Transmission Protocol (SCTP) Internet Protocol (IPv4/IPv6) From RFC
25 SCTP Specs & Advantages RFC2960 SCTP: Stream Control Transmission Protocol Advantages Multi-homing DoS resilient (4-way handshake, cookie) Multi-stream Reliable datagram mode Some of TCP & UDP, improved 25
26 SCTP Packets 3. SCTP packet Format Common Header Chunk # Chunk #n From RFC
27 SCTP Common Header SCTP Common Header Format Source Port Number Destination Port Number Verification Tag Checksum Straight from RFC
28 SCTP Chunk types ID Value Chunk Type Payload Data (DATA) 1 - Initiation (INIT) 2 - Initiation Acknowledgement (INIT ACK) 3 - Selective Acknowledgement (SACK) 4 - Heartbeat Request (HEARTBEAT) 5 - Heartbeat Acknowledgement (HEARTBEAT ACK) 6 - Abort (ABORT) 7 - Shutdown (SHUTDOWN) 8 - Shutdown Acknowledgement (SHUTDOWN ACK) 9 - Operation Error (ERROR) 10 - State Cookie (COOKIE ECHO) 11 - Cookie Acknowledgement (COOKIE ACK) 12 - Reserved for Explicit Congestion Notification Echo (ECNE) 13 - Reserved for Congestion Window Reduced (CWR) 14 - Shutdown Complete (SHUTDOWN COMPLETE) 28
29 SCTP in the wild Software Tons of proprietary implementations Open source implementations (Linux, BSD ) Network presence Stack widespread with Linux 2.6 support Scarcity on the open Internet Rising in telco backbones / intranet Adoption by other worlds: MPI clusters, high speed transfers, 29
30 SCTP Ports & Applications Common ports from IANA and RFCs Augmented with open source package ports Updated based on SCTPscan results Open to contribution Watch out for the application fingerprinting Cf. collaborative scanning 30
31 Agenda History of telecommunications security Review of digital telephony concepts Discovering the backbone SIGTRAN: From SS7 to TCP/IP Attacking SIGTRAN Q&A Lab - BYOL 31
32 SCTP Association: 4-way handshake Client socket(), connect() Server socket(), bind(), listen(), accept() INIT INIT-ACK COOKIE-ECHO COOKIE-ACK 32
33 Scanning vs. Stealth Scanning Attacker Servers INIT INIT INIT INIT-ACK 33
34 RFC & Implementation Where implementation diverge from RFCs RFC says «hosts should never answer to INIT packets on non-existings ports.» RFC: 0, hacker: 1. Syn scanning is slow when no RST Same here, but thanks to over-helping implementation on scanning, hacker wins 34
35 Scan against current implementation Attacker Servers INIT (port=a) ABORT INIT (port=b) INIT-ACK 35
36 Below the IDS radar How many firewall logs dropped SCTP packets? How many IDSes watch for SCTP socket evil content? Example Dshield.org Real life distributed IDS Hundreds of thousands of IP scanned Not detected / Not reported as scanner 36
37 INIT vs SHUTDOWN_ACK Packet Scanning From RFC Handle "Out of the blue" Packets An SCTP packet is called an "out of the blue" (OOTB) packet if it is correctly formed, i.e., passed the receiver's Adler-32 / CRC-32 check (see Section 6.8), but the receiver is not able to identify the association to which this packet belongs. The receiver of an OOTB packet MUST do the following: [ ] 5) If the packet contains a SHUTDOWN ACK chunk, the receiver should respond to the sender of the OOTB packet with a SHUTDOWN COMPLETE. New way to elicit answers even if not answering ABORTs to INITs targeted at not-opened port. 37
38 Tool Demo: SCTPscan Like nmap for SCTP ports (-ss) --scan --autoportscan -r Netscanning with Crc32 checksumed packet SCTP present on port SCTP present on port SCTP present on port SCTP present on port SCTP present on port SCTP present on port SCTP present on port SCTP present on port SCTP present on port
39 SCTP Stack Fingerprinting SCTP stack reliability Robustness testing (stress testing) QA of a few stacks Fuzzing built-in SCTPscan SCTP stack fingerprinting Discrepancies in SCTP answer packets Different stack behaviours Much more states than TCP=opportunities Cookie randomness 39
40 Scarce Presence - Distributed Collaborative Scaning SCTP application is rare on the internet But common on modern telco backbones Research needs collaborative effort Built-in collaborative reporting with SCTPscan. Going to be expanded for Fuzzing results Application Fingerprinting 40
41 Going up: SIGTRAN & SS7 41
42 Going up: upper layer protocols Key to the upper level M2PA and M3UA Vulnerabilities Telecom potential Technical vulnerability The expert way & the automated way Ethereal is our friend In need of new packet captures: open call! 42
43 Demo: Ethereal Dissection of Upper Layer Protocols Fire up your Ethereal or Wireshark! Collect your own examples And contribute to the SCTPscan wiki! Lots of SS7 specifics in higher level protocols DPC/OPC BICC, ISUP, TCAP, GSM-MAP protocols Less and less IP-related IP is only a bearer technology Transport only 43
44 Fuzzing upper layer protocols Quick way to find vulnerabilities Automated inspection State fuzzing vs. input fuzzing Already some stack vulnerabilities in the wild Only found DoS for now Input fuzzing for UA layers SIGTRAN higher protocols User Adaptation layers Largest opportunity / work area 44 Roger Ballen
45 Vulnerability evolution Same as with TCP First, stack and daemons vulnerabilities More and more application-level vulnerabilities Custom & Application-related Requires more knowledge of Telecom Same as with web app testing niche : requires understanding of SS7 world Specifics Defined Peers make attack difficult 45
46 References & Conclusion New realm New tunneling / VPN Same Rules New fun! Lots of references, complex RFC 2960, 4166, 4666 ITU (Now free) 46
47 Thanks Questions? Thank you very much! Special thanks to all TSTF OOB Research Team; Emmanuel Gadaix, Fyodor Yarochkin, Raoul Chiesa, Grugq, Inode, Stealth, Raptor, Job De Haas, Halvar, Michael M. Kemp, and all the community Some illustrations on slides are Sycamore, Cisco, Continous Comp, 47
48 Q&A Thanks a lot! 48
49 Agenda History of telecommunications security Review of digital telephony concepts Discovering the backbone SIGTRAN: From SS7 to TCP/IP Attacking SIGTRAN Q&A Lab - BYOL 49
50 Lab: Hands-on Agenda Setup Network Inventory Scanner vs. Targets Scanning types Scanning conflicts & Kernel impact Analyze a SCTP exchange Ethereal Discover a SIGTRAN architecture Exploring & Finding vulnerabilities 50
51 Required Skills Know how to compile a C program Know how TCP protocol works Know how to use tcpdump and ethereal 51
52 Hands on requirement Laptop with VMware or bootable distribution with Ubuntu with Linux 2.6 kernel (scanner and dummy server tested ok) - Download nubuntu Live CD with Linux 2.6 kernel (scanner and dummy server tested ok) - Download Linux 2.4 distribution (only scanner will work, not the dummy server) Solaris 10 Nexenta OS (GNU/Linux Solaris 10) (dummy server only) - Download instructions or distrib or VMware image at Distrowatch MacOsX (scanner and dummy server tested ok) Software C Compiler (apt-get install gcc) Glib 2.0 development library Libpcap development librar tcpdump (apt-get install tcpdump) ethereal (apt-get install ethereal) netstat 52
53 Important workshop notes! Your computers / VMware images must be installed before the workshop. OS installation or vmware image setup is not covered during the workshop. We have some ISOs of these Oses available for download in any case, but beware of the short time. 53
54 Notes on VMware images Make sure to select "Bridged mode" for your ethernet connector. 54
55 Hands-on Tests Who scans who? Scanners vs. Targets Scanning types Scanning conflicts & Kernel impact Analyze a SCTP exchange Ethereal 55
56 Common problems Q: I try to run the Dummy SCTP server for testing, and I get: "socket: Socket type not supported" A: Your kernel does not support SCTP sockets. SCTP sockets are supported by Linux Kernel 2.6 or Solaris 10. For Linux, you may want to try as root something like: modprobe sctp Then rerun: sctpscan --dummyserver Note: you only need a SCTP-aware kernel to run dummyserver. Scanning is ok with 2.4 linux kernels! For Mac Os X, you may add support for SCTP in Tiger by downloading: Install the software package and run as root: kextload /System/Library/Extensions/SCTP.kext Then you can run "sctpscan -d" to run the dummy server. Note that "netstat" won't report the use of the SCTP socket, use instead: lsof -n grep -i '132?' 56
57 Kernel conflicts: Linux 2.6 -s -r p Netscanning with Crc32 checksumed packet SCTP present on port SCTP packet received from port type 1 (Initiation (INIT)) End of scan: duration=5 seconds packet_sent=254 packet_rcvd=205 (SCTP=2, ICMP=203) [root@nubuntu] uname -a Linux nubuntu #2 Fri Oct 13 18:41:40 UTC 2006 i686 GNU/Linux [root@nubuntu] If after this scan, we test the dummy server SCTP daemon built in SCTPscan, we'll notice that further scans from this host will have different behavior: [root@nubuntu]./sctpscan -d Trying to bind SCTP port Listening on SCTP port ^C [root@nubuntu] [root@nubuntu] [root@nubuntu]./sctpscan -s -r p Netscanning with Crc32 checksumed packet SCTP present on port SCTP packet received from port type 1 (Initiation (INIT)) SCTP packet received from port type 6 (Abort (ABORT)) End of scan: duration=5 seconds packet_sent=254 packet_rcvd=206 (SCTP=3, ICMP=203) 57 [root@nubuntu]
58 Kernel conflicts: MacOS X localhost:~/documents/sctpscan/ root# kextload /System/Library/Extensions/SCTP.kext kextload: /System/Library/Extensions/SCTP.kext loaded successfully localhost:~/documents/sctpscan/ root#./sctpscan -s -r p Netscanning with Crc32 checksumed packet End of scan: duration=9 seconds packet_sent=254 packet_rcvd=3 (SCTP=0, ICMP=3) localhost:~/documents/sctpscan/ root# kextunload /System/Library/Extensions/SCTP.kext kextunload: unload kext /System/Library/Extensions/SCTP.kext succeeded localhost:~/documents/sctpscan/ root#./sctpscan -s -r p Netscanning with Crc32 checksumed packet SCTP packet received from port type 1 (Initiation (INIT)) SCTP present on port End of scan: duration=9 seconds packet_sent=254 packet_rcvd=5 (SCTP=2, ICMP=3) localhost:~/documents/sctpscan/ root# You saw in this example that loading the SCTP kernel module prevents SCTPscan to receive the response packets, and thus is not capable to detect presence of a remote open port. 58
59 Thanks Thank you very much! Special thanks to Emmanuel Gadaix, Fyodor Yarochkin, Raoul Chiesa, Inode, Stealth, Raptor, Job De Haas, Michael M. Kemp, all TSTF OOB Research Team and all the community Contact / Questions: Philippe Langlois - [email protected] Some illustrations on slides are Sycamore, Cisco, Continous Comp, 59
60 Backup slides 60
61 Comparison SCTP, TCP, UDP 61
62 Details of an SSP / STP 62
63 63
Philippe Langlois, P1 Security Inc. [email protected]
Telecommunications Infrastructure Security Getting in the SS7 kingdom: hard technology and disturbingly easy hacks to get entry points in the walled garden. Philippe Langlois, P1 Security Inc. [email protected]
Immersed Network Discovery and Attacks. Philippe Langlois Telecom Security Task Force [email protected] http://www.tstf.
Immersed Network Discovery and Attacks Specifics of Telecom Core Network (CN) insider attacks Philippe Langlois Telecom Security Task Force [email protected] http://www.tstf.net 1 Speaker Introduction
Introduction. Channel Associated Signaling (CAS) Common Channel Signaling (CCS) Still widely deployed today Considered as old technology
VoIP and SS7 Introduction Channel Associated Signaling (CAS) Still widely deployed today Considered as old technology Common Channel Signaling (CCS) Separation of signaling and call paths Signaling System
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Performance Comparison of SCTP and TCP over Linux Platform
Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Computer Networks - Xarxes de Computadors
Computer Networks - Xarxes de Computadors Teacher: Llorenç Cerdà Slides: http://studies.ac.upc.edu/fib/grau/xc Outline Course Syllabus Unit 2. IP Networks Unit 3. TCP Unit 4. LANs Unit 5. Network applications
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Troubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.
Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 IPv6 Security Considerations Patrick Grossetete [email protected] Dennis Vogel [email protected] 2 Agenda Native security in IPv6 IPv6 challenges
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
Convergence Technologies Professional (CTP) Course 1: Data Networking
Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent
Internet Technology Voice over IP
Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
Threat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Introduction to Network Security Lab 2 - NMap
Introduction to Network Security Lab 2 - NMap 1 Introduction: Nmap as an Offensive Network Security Tool Nmap, short for Network Mapper, is a very versatile security tool that should be included in every
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
VoIP-PSTN Interoperability by Asterisk and SS7 Signalling
VoIP-PSTN Interoperability by Asterisk and SS7 Signalling Jan Rudinsky CESNET, z. s. p. o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected] Abstract. PSTN, the world's circuit-switched network,
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Network and Services Discovery
A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Introduction to the Stream Control Transmission Protocol (SCTP):
Introduction to the Stream Control Transmission Protocol (SCTP): The next generation of the Transmission Control Protocol (TCP) Introduction We are guided through security scans at the airport, and then
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
SIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Lawful Interception in German VoIP Networks
Lawful Interception in German VoIP Networks 22C3, Berlin Hendrik Scholz [email protected] http://www.wormulon.net/ Agenda What is Lawful Interception (LI)? Terms, Laws Lawful Interception in PSTN networks
Access Mediation: Preserving Network Security and Integrity
Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
Hands on VoIP. Content. Tel +44 (0) 845 057 0176 [email protected]. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
Firewalls Netasq. Security Management by NETASQ
Firewalls Netasq Security Management by NETASQ 1. 0 M a n a g e m e n t o f t h e s e c u r i t y b y N E T A S Q 1 pyright NETASQ 2002 Security Management is handled by the ASQ, a Technology developed
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions Gigi Joseph, Computer Division,BARC. [email protected] Intranet Security Components Network Admission Control (NAC)
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1 Abstract These Application Notes describe the procedures
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie
An Introduction to Nmap with a Focus on Information Gathering Ionuț Ambrosie January 12, 2015 During the information gathering phase of a penetration test, tools such as Nmap can be helpful in allowing
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Hosted PBX Platform-asa-Service. Offering
Hosted PBX Platform-asa-Service Offering Hosted PBX Platform Overview VoIP Logic s Hosted PBX Platform-as-a-Service (PaaS) delivers cloud-based PBX functionality encompassing traditional PBX features as
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
SCTP-Sec: A secure Transmission Control Protocol
SCTP-Sec: A secure Transmission Control Protocol Rahul Choudhari Indian Institute of Information Technology & Management, Gwalior, INDIA Email: [email protected] { Somanath Tripathy Indian Institute
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012
Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting
R&S IP-GATE IP gateway for R&S MKS9680 encryption devices
Secure Communications Product Brochure 0.00 R&S IP-GATE IP gateway for encryption devices R&S IP-GATE At a glance The R&S IP-GATE is an IP interface for the encryption device. Used with the, the R&S IP-GATE
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
Voice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more
White Paper. avaya.com 1. Table of Contents. Starting Points
White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Securing Voice over Internet Protocol
Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 21 29 2007 PIPS Securing Voice over Internet Protocol Ahmad Ghafarian, Randolph Draughorne,
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma [email protected]
SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma [email protected] Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
MED: Voice over IP systems
www.ptt.co.uk Online course specification MED: Voice over IP systems Target audience: This online course is designed for those who will be responsible for the design or maintenance of Voice over IP (VoIP)
Security & Reliability in VoIP Solution
Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad [email protected] About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
VoIP Resilience and Security Jim Credland
VoIP Resilience and Security Jim Credland About THUS plc Provider and user of VoIP and Soft Switch technologies Developing Enterprise Security Standards NISCC VoIP Working Group Security Considerations
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.
