VoIP Wars: Destroying Jar Jar Lync

Similar documents
A Brief Security Analysis of Microsoft Skype for Business

VOIP WARS: THE PHREAKERS AWAKEN. Fatih Managing Consultant Context Information Security

Viproy Reloaded 2.0. Compliance, Protection & Business Confidence. Melbourne Level 10, 401 Docklands Drv

VoIP Wars: Attack of the Cisco Phones

VoIP Wars: Attack of the Cisco Phones

Practical VoIP Hacking with Viproy

VoIP Wars : Return of the SIP

VoIP Wars : Return of the SIP

An outline of the security threats that face SIP based VoIP and other real-time applications

Hacking SIP Services Like a Boss. Fatih Özavcı Information Security Researcher & Consultant

PENTEST. Pentest Services. VoIP & Web.

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

SIP Security Controllers. Product Overview

Module 6. Designing and Deploying External Access. MVA Jump Start

Securing SIP Trunks APPLICATION NOTE.

Acano solution. Security Considerations. August E

Quick Setup Guide. Integration of Aastra MX-ONE / Aastra 700 and Microsoft Lync Server 2010

VoIP Security regarding the Open Source Software Asterisk

Polycom RealPresence Access Director System

The Trivial Cisco IP Phones Compromise

UC and SIP Trunking Luncheon. Sponsored by:

Penetration Testing SIP Services

Ethical Hacking as a Professional Penetration Testing Technique

4xx High Definition IP Phones. Deployment Guide. AudioCodes 420HD Compatible IP Phone Tested and Qualified for Microsoft Lync. Document #: LTRT-21920

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Avaya SBCE 6.3 Security Configuration and Best

Application Note. Onsight Connect Network Requirements V6.1

Building the Lync Security Eco System in the Cloud Fact Sheet.

Recommended IP Telephony Architecture

Threats to be considered (1) ERSTE GROUP

Acano solution. Third Party Call Control Guide. March E

Hacking Trust Relationships of SIP Gateways

StarLeaf Connectivity Services. Deployment Guide

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Introducing Cisco Voice and Unified Communications Administration Volume 1

Voice over IP Security

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide

The SIP School- 'Mitel Style'

Cisco Expressway Series

Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options


Microsoft Exam-Osler

Unified Communications in RealPresence Access Director System Environments

Polycom Unified Communications Deployment Guide for Microsoft Environments

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Alcatel OmniPCX Enterprise R11 Supported SIP RFCs

How to make free phone calls and influence people by the grugq

CyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise

Learn Ethical Hacking, Become a Pentester

Cisco Advanced Services for Network Security

Integrating Avaya Aura Presence Services with Microsoft OCS

April 11, (Revision 2)

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

Chapter 2 PSTN and VoIP Services Context

Fabrizio Volpe. MVP Directory Services MCITP Lync

Best Practices for Securing IP Telephony

Application Security Testing

IM and Presence. Skype for Business 2015 users. Legend. Skype for Business 2015 users. Active Directory Domain Services.

SIP Proxy. SIP Proxy. Bicom SYSTEMS. SIP Proxy... Advanced Simplicity

Sense of Security VoIP Security Testing Training

Firewall Testing Methodology W H I T E P A P E R

SIP A Technology Deep Dive

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Protecting Your Organisation from Targeted Cyber Intrusion

Secured Communications using Linphone & Flexisip

How To Implement A Cisco Vip From Scratch

SIP Trunking with Microsoft Office Communication Server 2007 R2

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

Infrastructure developments to build on AARNet s VoIP and Video services. Leon Li. Overview. Enterprise UC Network. Beta program.

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

SIP Trunking Configuration with

VoIP Security: How Secure is Your IP Phone?

Configuring SIP Support for SRTP

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Deployment Guide. Microsoft Lync 2013 and Citrix NetScaler Deployment Guide. citrix.com

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Sense of Security VoIP Security Testing Training

How To Test For Security On A Vlan Vlan On A Cell Phone At A Hotel Room (For A Hotel)

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

LifeSize Transit Deployment Guide June 2011

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

VOICE OVER IP SECURITY

Implementing Cisco Collaboration Applications **Part of the CCNP Collaboration certification track**

Avaya Aura SIP Trunking Training

Penetration Testing with Kali Linux

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

: Introducing Cisco Voice and Unified Communications Administration (ICOMM) v8.0 Course Introduction

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

GSN Cloud Contact Centre Voice & Telephony Datasheet

Cisco EXAM Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) Buy Full Product.

Preparatory Meeting for Phase 2 of Philippine National ENUM Trial

Transcription:

VoIP Wars: Destroying Jar Jar Lync Fatih Ozavci 25 October 2015 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney Melbourne T: 1300 922 923 info@senseofsecurity.com.au Level 8, 66 King Street Level 15, 401 Docklands Drv T: +61 (0) 2 9290 4444 www.senseofsecurity.com.au Sydney NSW 2000 Australia Docklands VIC 3008 Australia F: +61 (0) 2 9290 4455 ABN: 14 098 237 908 1

Speaker Fatih Ozavci, Principal Security Consultant VoIP & phreaking Mobile applications and devices Network infrastructure CPE, hardware and IoT hacking Author of Viproy, Viproxy and VoIP Wars research series Public speaker and trainer Blackhat USA, Defcon, HITB, AusCert, Troopers, Ruxcon 2

Previously on VoIP Wars 3

Current research status This is only the first stage of the research Analysing the security requirements of various designs Developing a tool to assess communication and voice policies in use drive official client to attack other clients and servers debug communication for further attacks Watch this space Viproy with Skype for Business authentication support Potential vulnerabilities to be released 4

Agenda 1. Modern threats targeting UC on Skype for Business 2. Security requirements for various implementations 3. Security testing using Viproxy 4. Demonstration of vulnerabilities identified CVE-2015-6061, CVE-2015-6062, CVE-2015-6063 5

Security requirements for UC Corporate Communication Commercial Services Messaging MITM VLAN Hopping Trust Relationships Skinny SIP CDP/DTP Attacks Voicemail Proxy Call Spoofing DHCP Snooping Physical Security Botnets File/Screen Sharing Device Tampering Encryption Mobile/Desktop Clients DDoS Authentication Hosted VoIP Toll Fraud Call Centre Competitors Sandbox Mobile/Desktop Clients Isolation Federation SSO WebRTC Encryption 6 Management Hosted & Distributed Networks

7 Modern threats targeting UC

Skype for Business Microsoft Live Communications 2005 Microsoft Office Communicator 2007 Microsoft Lync 2000-2013 Microsoft Skype for Business 2015 8

UC on Skype for Business Active Directory, DNS (SRV, NAPTR/Enum) and SSO Extensions to the traditional protocols SIP/SIPE, XMPP, OWA/Exchange PSTN mapping to users Device support for IP phones and teleconference systems Mobile services Not only for corporate communication Call centres, hosted Lync/Skype services Office 365 online services, federated services 9

VoIP basics 1- REGISTER 1-200 OK Client A 2- INVITE 2-100 Trying Skype for Business 2015 SRTP (AES) 4- ACK 4-200 OK 3- INVITE 3-200 OK RTP Proxy SRTP (AES) RTP Proxy SRTP (AES) Client B 10

Corporate communication Windows 2012 R2 Domain Controller Windows 2012 R2 Exchange & OWA Mobile Devices Skype for Business 2015 SIP/TLS? Laptops Phones & Teleconference Systems PSTN Gateway SIP Trunk Services: Voice and video calls Instant messaging Presentation and collaboration File and desktop sharing Public and private meetings 11

Federated communication Mobile ABC Federation communication SIP/TLS? Mobile XYZ Laptop ABC Skype for Business 2015 ABC Enterprise Skype for Business 2015 Edge Server ABC Enterprise Skype for Business 2015 XYZ Enterprise Services: Federation connections (DNS, Enum, SIP proxies) Skype for Business external authentication Connecting the users without individual setup Public meetings, calls and instant messaging DNS & Enum Services DNS Server 12

Supported client features https://technet.microsoft.com/en-au/library/dn933896.aspx 13

Supported client features Give control? Give control? https://technet.microsoft.com/en-au/library/dn933896.aspx 14

Security of Skype for Business SIP over TLS is enforced for clients by default SRTP using AES is enforced for clients by default SIP replay attack protections are used on servers Responses have a signature of the critical SIP headers Content itself and custom headers are not in scope Clients validate the server response signatures SIP trunks (PSTN gateway) security TLS enabled and IP restricted No authentication support 15

Research and vulnerabilities related Defcon 20 The end of the PSTN as you know it Jason Ostrom, William Borskey, Karl Feinauer Federation fundamentals, Enumerator, Lyncspoof Remote command execution through vulnerabilities on the font and graphics libraries (MS15-080, MS15-044) Targeting Microsoft Lync users with malwared Microsoft Office files Denial of service and XSS vulnerabilities (MS14-055) 16

Security testing 3 ways to conduct security testing Compliance and configuration analysis MITM analysis (Viproxy 2.0) Using a custom security tester (Viproy 4.0 is coming soon) Areas to focus on Identifying design, authentication and authorisation issues Unlocking client restrictions to bypass policies Identifying client and server vulnerabilities Testing business logic issues, dial plans and user rights 17

Discovering Skype for Business Autodiscovery features Autodiscovery web services Subdomains and DNS records (SRV, NAPTR) Web services Authentication, Webtickets and TLS web services Meeting invitations and components Skype for Business web application Active Directory integration Information gathering via server errors 18

Corporate communication policy Design of the communication infrastructure Phone numbers, SIP URIs, domains, federations, gateways Client type, version and feature enforcements Meeting codes, security, user rights to create meetings Open components such as Skype for Business web app Feature restrictions on clients File, content and desktop sharing restrictions User rights (admin vs user) Encryption design for signalling and media 19

Corporate communication policy The default/custom policies should be assigned to users and groups 20

Corporate communication policy Meeting rights to be assigned by users Policies assigned are in use 21

SRTP AES implementation SRTP using AES is enforced for clients (No ZRTP) SIP/TLS is enforced for clients SIP/TLS is optional for SIP trunks and PSTN gateways Compatibility challenges vs Default configuration SIP/TCP gateways may leak the SRTP encryption keys a=ice-ufrag:x30m a=ice-pwd:ow7iyhxiaor19uh05bao7bmj a=crypto:2 AES_CM_128_HMAC_SHA1_80 inline:gu +c81xctwoahro7cj9un6wqw7qpjndjxfzsofl8 2^31 1:1 22

MITM analysis using Viproxy Challenges SIP/TLS is enabled by default Microsoft Lync clients validate the TLS cert Compression is enabled, not easy to read Viproxy 2.0 A standalone Metasploit module Supports TCP/TLS interception with TLS certs Disables compression Modifies the actions of an official client Provides a command console for real-time attacks 23

Viproxy test setup Debugging the protocol and collecting samples Basic find & replace with fuzzing support Unlocking restricted client features Bypassing communication policies in use Injecting malicious content Windows 10 Skype for Business Clients MS Lync for Mac 2011 Client to be used for attacks Viproxy 2.0 Windows 2012 R2 Skype for Business 2015 Server 24

Analysing the corporate policy Instant Messaging (IM) restrictions File type filters for the file transfers URL filters for the messaging Set-CsClientPolicy (DisableEmoticons, DisableHtmlIm, DisableRTFIm) Call forwarding rights Meeting rights Federated attendees Public attendees Clients default meeting settings Insecure client versions allowed 25

Attack surfaces on IM and calls Various content types (HTML, JavaScript, PPTs) File, desktop and presentation sharing Limited filtering options (IIMFilter) File Filter (e.g. exe, xls, ppt, psh) URL Filter (e.g. WWW, HTTP, call, SIP) Set-CsClientPolicy (DisableHtmlIm, DisableRTFIm) Clients process the content before invitation Presence and update messages Call and IM invitation requests Mass compromise via meetings and multiple endpoints 26

Parsing errors and exceptions to be shared later 27

Bypassing URL filter in IM to be shared later 28

URL filter bypass Reverse browser visiting Windows 10 Skype for Business Clients MS Lync for Mac 2011 Client to be used for attacks Viproxy 2.0 Windows 2012 R2 Skype for Business 2015 Server 29

Sending INVITEs w/ HTML/XSS to be shared later 30

31 Fake Skype update via INVITE

Multi endpoint communication Meeting requests Private meetings, Open meetings, Web sessions Multi callee invitations and messages Attacks do not need actions from the attendees/callees Injecting endpoints to the requests XML conference definitions in the INVITE requests INVITE headers Endpoint headers 3 rd party SIP trunk, PSTN gateway or federation 32

Sending messages w/ HTML/XSS to be shared later 33

Mass compromise of clients BEEF Framework Waiting for the XSS hooks Reverse browser hooks Windows 10 Skype for Business Clients SIP Trunk PSTN Gateway Viproy 4.0 CentOS Linux Freeswitch Windows 2012 R2 Skype for Business 2015 Server 34

35 Mass compromise of clients

Second stage of the research Analysis of mobile clients and SFB web app SFB meeting security and public access federation security and trust analysis Further analysis of the crashes and parsing errors identified for exploitation Social engineering templates for Viproxy and Viproy Viproy 4.0 with Skype for Business authentication, fuzzing and discovery support 36

Securing Unified Communications Secure design is always the foundation Physical security of endpoints (e.g. IP phones, teleconference rooms) should be improved Networks should be segmented based on their trust level Authentication and encryption should be enabled Protocol vulnerabilities can be fixed with secure design Disable unnecessary IM, call and meeting features Software updates should be reviewed and installed 37

Previously on VoIP Wars VoIP Wars I: Return of the SIP (Defcon, Cluecon, Ruxcon, Athcon) Modern VoIP attacks via SIP services explained SIP trust hacking, SIP proxy bounce attack and attacking mobile VoIP clients demonstrated https://youtu.be/d6cgltb6qkw VoIP Wars II : Attack of the Cisco phones (Defcon, Blackhat USA) 30+ Cisco HCS vulnerabilities including 0days Viproy 2.0 with CUCDM exploits, CDP and Skinny support Hosted VoIP security risks and existing threats discussed https://youtu.be/hql25srtoey The Art of VoIP Hacking Workshop (Defcon, Troopers, AusCERT, Kiwicon) Live exploitation exercises for several VoIP vulnerabilities 3 0day exploits for Vi-vo and Boghe VoIP clients New Viproy 3.7 modules and improved features https://www.linkedin.com/pulse/art-voip-hacking-workshop-materials-fatih-ozavci 38

References Viproy VoIP Penetration and Exploitation Kit Author : http://viproy.com/fozavci Homepage : http://viproy.com Github : http://www.github.com/fozavci/viproy-voipkit VoIP Wars : Attack of the Cisco Phones https://youtu.be/hql25srtoey VoIP Wars : Return of the SIP https://youtu.be/d6cgltb6qkw 39

40 https://www.senseofsecurity.com.au/aboutus/careers

41 Questions

Thank you Head office is level 8, 66 King Street, Sydney, NSW 2000, Australia. Owner of trademark and all copyright is Sense of Security Pty Ltd. Neither text or images can be reproduced without written permission. T: 1300 922 923 T: +61 (0) 2 9290 4444 F: +61 (0) 2 9290 4455 info@senseofsecurity.com.au www.senseofsecurity.com.au 42