Conducting an IP Telephony Security Assessment



Similar documents
Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation

Hacking VoIP Exposed. David Endler, TippingPoint Mark Collier, SecureLogix

Voice Over IP (VoIP) Denial of Service (DoS)

Securing Enterprise VoIP. VoIP Vulnerabilities Patrick Young CEO Arlinx Inc.

Basic Vulnerability Issues for SIP Security

The Trivial Cisco IP Phones Compromise

Exploiting Voice over IP Networks

Voice Over IP and Firewalls

CS5008: Internet Computing

Intrusion Prevention: The Future of VoIP Security

Introduction to VOIP Security OWASP. The OWASP Foundation. Angad Singh and Rohit Shah

Recommended IP Telephony Architecture

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Black Box Analysis and Attacks of Nortel VoIP Implementations


PRINTER SECURITY AUDIT: THE UNIVERSITY OF VIRGINIA. Kevin Savoy, CPA, CISA, CISSP Brian Daniels, CISA, GCFA

An outline of the security threats that face SIP based VoIP and other real-time applications

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Enumerating and Breaking VoIP

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Recommendations for secure deployment of an IP-PBX

nexvortex Setup Guide

CyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise

Voice over IP (VoIP) Vulnerabilities

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Cisco 7940 How To. (c) Bicom Systems

8 Steps for Network Security Protection

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

8 Steps For Network Security Protection

Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform.

VoIP SPAM and a Defence against this Type of Threat

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Demystifying Penetration Testing

How To Fix A Hard Phone Bug

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011

Vulnerabilities in SOHO VoIP Gateways

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

The VoIP Vulnerability Scanner

Linux Network Security

Network Security Fundamentals

Hacking SIP Services Like a Boss. Fatih Özavcı Information Security Researcher & Consultant

Multi-Homing Dual WAN Firewall Router

DLink-655 Router Configuration Guide for VoIP

ICE 008 IP PBX. 1. Product Information New Mini PBX Features System Features

Understanding Security Testing

THINKTEL COMMUNICATIONS DIGIUM G100/G200 PRI OVER IP SIP TRUNKING

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

VoIP Wars : Return of the SIP

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Dustin D. Trammell Security Research BreakingPoint Systems, Inc. Computer Academic Underground

Security Type of attacks Firewalls Protocols Packet filter

Optimum Business SIP Trunk Set-up Guide

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

General Network Security

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Villains and Voice Over IP

VoIP Wars : Return of the SIP

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

NEW!!! Industry s only Comprehensive VoIP Security Boot Camp

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

EE4607 Session Initiation Protocol

Snom 720 and Elastix Server

VOIP Attacks On The Rise

A: The default WAN IP address is with subnet mask

VoIP Security. Threats and Countermeasures. Eric Chen NTT Information Sharing Platform Laboratories & VOIPSA Technical Board of Advisors

VoIP Security Threats and Vulnerabilities

Evaluation of Security for a H.323-based VoIP Emulated Architecture

Basic Network Configuration

Overview. Packet filter

Vulnerability Scan. January 6, 2015

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Codes of Connection for Devices Connected to Newcastle University ICT Network

Chapter 8 Router and Network Management

Configuration Notes 283

VoIP Security. Customer Best Practices Guide. August IntelePeer

FLX UC1000/1500 Registering with Siemens HiPath 4000 & OpenScape Voice Server

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

LifeSize Video Communications Systems Administrator Guide

Avaya TM G700 Media Gateway Security. White Paper

IBM. Vulnerability scanning and best practices

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Avaya G700 Media Gateway Security - Issue 1.0

Grandstream Networks, Inc. UCM6100 Security Manual

Vulnerability Assessment and Penetration Testing

VoIP Security regarding the Open Source Software Asterisk

Firewalls. Chapter 3

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Basics of Internet Security

Transcription:

Conducting an IP Telephony Security Assessment Mark D. Collier Chief Technology Officer mark.collier@securelogix.com www.securelogix.com

Presentation Outline Ground rules and scope Discovery Security policy review and physical security checks Platform tests Network tests Application tests

Layers of Security Essential to test at all layers

Ground Rules and Scope Ground rules: Internal and/or external How much information to start with Which group to work with, if any Agree how intrusive the test will be Scope: Number of sites Which systems/components to test What tests should be avoided for which components

Policy Review/Physical Security Review IP Telephony security policy: Use as a guide to verify IP Telephony system configuration Physical security: Essential for core components If the network is not physically secure, many attacks are trivial for insiders All other security is moot if physical security is lacking Don t forget to protect the IP phones

Discovery - Footprinting Search enterprise web site: Job listings Names, extensions, organization structure Voice mail greetings Use Google to search for: Case studies/vendor Press Releases User resumes and postings Web based IP Telephony logins Vendor user forums Use WHOIS and DNS to find IP addresses

Discovery - Footprinting

Discovery - Scanning Use various available tools to find more IP addresses: fping and nmap Identify IP Telephony systems: Identify the system Identify operating system and software versions nmap is probably the best tool for this nmap has a very good database for IP Telephony Some commercial scanners support this as well

Platform IP PBX Involves testing of IP PBX and adjunct systems Test for open or unnecessary network ports: telnet or other remote access Find application ports for later testing Test operating systems for known vulnerabilities: Use general vulnerability scanners Use IP Telephony-specific scanners where possible Test for default or weak passwords Test for default configuration weaknesses

Platform IP PBX Test for SNMP weaknesses: Simple SNMP sweeps can provide a lot of information If you know the device type, you can use snmpwalk You can find the OID using Solarwinds MIB database

Platform Support Services Test DHCP and DNS Test provisioning database Test TFTP for open or unnecessary network ports: Many IP phones use TFTP for configuration/image files TFTP is rarely secured Use tftpbrute to guess the name of the file and download it Configuration files have usernames, passwords, etc. It may also be possible to corrupt a software image

Platform IP Phones Test for open or unnecessary network ports: telnet or other remote access Find application ports for later testing Test for default or weak passwords Test for weak local protections Check for admin access during boot Some IP phones have sniffers

Network - General The data network is used to transport IP Telephony signaling/media Any component is a potential target Test security on switches, routers, hubs, VPNs, etc. The IP Telephony network enables attacks such as: Denial of Service (DoS) Eavesdropping Man-in-the-Middle (MITM) attacks Test to determine if the network is vulnerable

Network - DoS/Eavesdropping/MITM Test for network DoS vulnerabilities: UDP floods TCP SYN floods Test for eavesdropping: Trivial to eavesdrop if you have access to unencrypted data Test with ethereal, CAIN, VOMIT, VoIPong Test for MITM vulnerabilities: Easy to attack depending on network Test with ettercap, dsniff

Network Man-in-the-Middle Proxy Proxy User Attacker Places Themselves Between Proxies Or Proxy/UA Attacker Attacker User

Application - General The application consists of the actual IP Telephony signaling and media exchanged over the network The various components generating/consuming this information can be vulnerable to attack This will be especially true when IP Telephony is exchanged with a public network The examples used are for SIP, but similar issues exist with other protocols

Application - Enumeration Enumeration involves identification of valid users: Quite a few tools available SIPSCAN and SiVuS automates much of this for you:

Application - Fuzzing Fuzzing is a term used to describe functional protocol testing Involves sending various forms of malformed protocol requests, to test protocol processing software Fuzzing has resulted in identification of many vulnerabilities in protocol processing software INVITE sip:6713@192.168.26.180:6060;user=phone SIP/2.0 Via: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaa From: UserAgent<sip:6710@192.168.22.36:6060;user=phone> To: 6713<sip:6713@192.168.26.180:6060;user=phone> Call-ID: 96561418925909@192.168.22.36

Application - Fuzzing Most vendors test their protocol implementations Still a good idea though to test deployed system There are freeware and commercial fuzzers available: www.ee.oulu.fi/research/ouspg/protos/index.html www.codenomicon.com

Application Service Disruption There are many types of service disruptions possible Testing for them is necessary, to determine if your system is vulnerable The following several slides describe several types of possible attacks

Application Service Disruption DoS Attacks UDP, RTP, TCP SYN INVITE, REGISTER Floods Primary Proxy Flood Application On PC SIP Phone SIP Phone SIP Phone SIP Phone

Application Service Disruption Registration Hijacking and Manipulation Proxy Proxy Hijacked Session Hijacked Media User Attacker The Attacker Can Perform A Man-In-The-Middle Attack User

Application Service Disruption Session Teardown Proxy Proxy Attacker Sends BYE Messages To UAs User Attacker User

Application Service Disruption RTP Injection Proxy Proxy User Attacker Sees Packets And Attacker Injects New Audio User

Summary A comprehensive IP Telephony security assessment addresses the entire IP Telephony system An IP Telephony security assessment is recommended when you deploy your system and as you expand SecureLogix, www.securelogix.com, along with other vendors, offers IP Telephony security assessments See www.hackingexposedvoip.com for more information