Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems



Similar documents
Recommended IP Telephony Architecture

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Basic Vulnerability Issues for SIP Security

Voice Over IP (VoIP) Denial of Service (DoS)

The Trivial Cisco IP Phones Compromise

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

Villains and Voice Over IP

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

VoIP Security regarding the Open Source Software Asterisk

An outline of the security threats that face SIP based VoIP and other real-time applications

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

CPNI VIEWPOINT 02/2007 ENTERPRISE VOICE OVER IP

Best Practices for Securing IP Telephony

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

T.38 fax transmission over Internet Security FAQ

Own your LAN with Arp Poison Routing

Threat Mitigation for VoIP

VOICE OVER IP SECURITY

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

SS7 & LTE Stack Attack

CS5008: Internet Computing

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

SIP Trunking Configuration with

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Voice over IP (VoIP) Vulnerabilities

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

CPNI VIEWPOINT 01/2007 INTERNET VOICE OVER IP

Chapter 9 Firewalls and Intrusion Prevention Systems

Securing SIP Trunks APPLICATION NOTE.

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

PENTEST. Pentest Services. VoIP & Web.

Global Partner Management Notice

Ingate Firewall/SIParator SIP Security for the Enterprise

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Frequently Asked Questions about Integrated Access

Multi-layered Security Solutions for VoIP Protection

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

VoIP Time to Make the Call? Abstract

Chapter 1 The Principles of Auditing 1

Chapter 8 Security Pt 2

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Network Security: Introduction

VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006

Wave SIP Trunk Configuration Guide FOR BROADVOX

Security and Risk Analysis of VoIP Networks

Voice Over IP and Firewalls

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V p13 Configuration Guide

VOIP SECURITY ISSUES AND RECOMMENDATIONS

VoIP Security. Customer Best Practices Guide. August IntelePeer

Intrusion Prevention: The Future of VoIP Security

VOIP Attacks On The Rise

Gigabit SSL VPN Security Router

8. Firewall Design & Implementation

Data Security in a Converged Network

Voice over IP Security

Footprinting. Vendor press releases and case studies Resumes of VoIP personnel Mailing lists and user group postings Web-based VoIP logins

VOICE OVER IP VIEWPOINT 01/2006

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

Network Security Best Practices for IP Telephony

Grandstream Networks, Inc. UCM6100 Security Manual

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Conducting an IP Telephony Security Assessment

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

1152 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007

Gigabit Content Security Router

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Business Phone Security. Threats to VoIP and What to do about Them

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Security Technology White Paper

Exploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

How To Protect A Database From Attack

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

Connecting with Vonage

Security Issues with Integrated Smart Buildings

Cisco Unified Communications Manager 7.0

Cisco Unified MobilityManager Version 1.2

Avaya IP Office 8.1 Configuration Guide

Firewalls, Tunnels, and Network Intrusion Detection

Introducing Cisco Voice and Unified Communications Administration Volume 1

Challenges and opportunities for Open Source solutions

VoIP Security: How Secure is Your IP Phone?

An Investigation into the Effect of Security on Performance in a VoIP Network

How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions

CMPT 471 Networking II

TOLL FRAUD POLICIES AND PREVENTION

How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

Securing Enterprise VoIP. VoIP Vulnerabilities Patrick Young CEO Arlinx Inc.

Remote Access Security

SIP Security Controllers. Product Overview

Securing a Converged Network By Steven Sullivan

Transcription:

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

VOIP Components Common Threats How Threats are Used Future Trends

Provides basic network connectivity and transport Infrastructure services (DHCP, DNS, etc.) provide critical services for the VOIP systems Delay, bandwidth, and packet delivery are dictated by these systems Quality of Service (QoS) Service Level Agreements (SLA) Provides compartmentalization of information systems

Provides conversion of calls between the data network and the Public Switched Telephone Network (PTSN) Primarily uses trunks for PSTN connectivity Can be used to relay call signaling to Internet VOIP providers Can provide VOIP termination from systems on the Internet

Performs the functions of a traditional PBX and is the core of the VOIP system Maps internal extensions Routes calls to VOIP gateways, internal extensions, or external numbers Tracks call utilization Controls call flow on the network Cisco Call Manager uses Skinny Client Control Protocol (SCCP) for signaling between the Call Manager and phones The Call Manager is an application sitting on a traditional Microsoft Windows or Linux platform

The VOIP phone provides the user the entry point into the phone system Uses various access medias Wired Wireless Softphone Encodes voice communications using a codec for encoding and compression Contacts the Call Manager for configuration and management Initial configuration via TFTP Reliant on the Call Manager for functionality

Denial of Service (DoS) Eavesdropping Interception/Modification

DoSattacks are common Unintentional DoS(most common) General Worm/Malware Intentional Insider Intentional Outside Signs of a DoSAttack Poor network performance beyond VOIP Inability to make calls Phone service suddenly stops Massive traffic flows IPS/IDS alerts

Flooding Traditional attacks such as SYN Flooding, Malformed packets, etc Distributed Denial of Service Attack using Botnet to attack public facing services Weaknesses in the network infrastructure equipments underlying operating system or configuration Mis-configured systems that communicate on the network Goal is to make voice quality so low it is unusable Defenses Network segmentation Implementing QoS Hardening infrastructure to NSA or CIS standards Keeping network Infrastructure patched Proactive network monitoring and management

QoSprovides network based traffic prioritization used to give VoIP precedence Attackers can abuse this functionality to give bogus attack traffic priority Manipulating Differentiated Services Control Point (DSCP) bits Producing bogus RTP, SCCP, SIP, or other traffic that may be protected by VOIP systems Goal to render QoSineffective and lessen the resources needed for the attack Defenses Network segmentation QoS trust mechanisms Proactive network monitoring and management

Attacks against network services used in VOIP DHCP Exhaustion Requesting DHCP addresses until none remain Attacks Against DNS DNS poisoning, UDP flooding, or other attacks Compromise network infrastructure Device Access Exploit routing protocols Implement Access Control Lists Goal is to render the network infrastructure unable to support VOIP applications Defenses Use DCHP Snooping (Cisco) Harden DNS Servers Harden network infrastructure according to NSA or CIS guidelines Use secure routing protocols and practices

Vulnerable to many of the same attacks as the routing and switching infrastructure Additional vulnerabilities Flooding SIP requests to user resources or tie up PSTN trunks Flooding SIP requests to tie up resources Goal is to make the PSTN inaccessible to the voice network Defenses Network segmentation Infrastructure hardening Proactive monitoring and management

Vulnerable to network, OS, and application level DoS attacks DoS vulnerabilities include Flooding attacks discussed for infrastructure Single packet attacks Weaknesses in the Call Manager software or OS Flooding registration requests Goal is to render the Call Manager unable to service calls Defenses Patch management for Call Manager servers Network Segmentation Network Intrusion Prevention System (NIPS) Host-Based Intrusion Prevention (HIPS)

VOIP phones are vulnerable to many of the same attacks as the RSI & CM Unique vulnerabilities Registration attacks DHCP exhaustion Phone configuration weaknesses Goal is to render the phone inoperable Defenses Network segmentation Strong phone authentication Harden network infrastructure

VOIP networks are inherently easier to eavesdrop on than traditional phone systems Traditional techniques used to sniff networks can be used to intercept conversations Attacks can be executed in a switched environment to intercept conversations Trivial for insiders in an IT group to intercept conversations Numerous threats exist from eavesdropping Espionage Extortion/Blackmail Unauthorized information disclosure Wiretapping and unauthorized employee monitoring

IT network administrators have easy access to tap traffic undetected Using managed switch functionality (SPAN, RSPAN) Insert sniffer on device in the normal traffic flow Tools such as Wireshark, Cain & Able, and various other sniffing tools exist that reassemble traffic flow Goal to monitor network conversations as they traverse the network Defenses Background checks on potential IT staff Traditional counter intelligence methods Encrypting VOIP communications If eavesdropping is suspected by IT, communicate items out of band Perform regular 3 rd party audits of IT

An outside attacker must first gain access to the network to intercept traffic Unsecured wireless access points Remote Access (VPN, SSL, Dial-up) Compromised system Physical access to the facility Malicious software Interesting traffic is intercepted Segment sniffing SPAN ports ARP cache poisoning, ARP flooding, & DNS poisoning can be used to sniff in a switched network

Goal is to covertly gather VOIP traffic for analysis Private information/espionage Helpdesk password changes Call/number harvesting Decode Dual Tone Multi-Frequency (DTMF) tones Credit card, Social security numbers, Voicemail password Defenses Network segmentation Encryption of VOIP traffic Using network infrastructure features such as DHCP snooping, ARP protection, MAC limits, and other protection mechanisms Harden infrastructure according to NSA or CIS guidelines Defense-in-depth security program

An attacker must have access to the network & the Call Manager Using an exploit Username or password guess Methods to Eavesdrop Redirect calls through bogus VOIP proxy Review Call Manager logs to view source and destination of calls View other call log information Goal is to gather basic usage patterns and manipulate phone behavior Defenses Patch management of the Call Manager Host & Network based IPS Network segmentation

Eavesdropping from the inside network facing interface is a key target If the VOIP gateway terminates call from the Internet, those calls can be easily intercepted Goal is to intercept call from the primary network exit point to the PTSN Defenses Identical to RSI Additionally if calls are allowed from the Internet, VPN should be used to secure communications

The configuration of the phone is sent via TFTP which transmits configuration information in clear text Identify Call Manager Identify phone extension Gather detailed configuration information Phone configuration information can be used to retrieve dialing information Goal is to gather phone configuration information and view calling behavior Defenses Use Transport Layer Security (TLS) or other cryptography for phone to call manager connectivity Network segmentation

Interception of VOIP traffic can be used to launch a Man-In-The- Middle (MITM) attack Attacker relays traffic between victim and itself Repackages traffic and forwards it to the destination This can be used to manipulate voice traffic Replay, insert, or omit voice conversations Redirect calls to a different destination Directing traffic to a non-existent destination Goal is to manipulate traffic without the users knowledge Defenses Use Transport Layer Security (TLS) or other cryptography for phone to call manager connectivity Harden network infrastructure to NSA or CIS standards Use switch features such as ARP inspection, DHCP spoofing, and MAC address control

If an attacker can control the VOIP gateway they can; Redirect calls going to the PSTN to alternate numbers Redirect or monitor inbound calls Manipulate Caller ID information Bypass Call Manager defined dialing rules If the gateway is accessible from the Internet, mis-configured access rules can allow attackers to route calls through the PSTN Goal is to control the flow of voice traffic to and from the PSTN Defenses Harden VOIP gateways Monitor gateways for abuse Network segmentation Don t allow connections from the Internet without VPN

The Call Manager is the nerve center for the VOIP network and the most valuable target for an attacker Provides phone management Provides call routing Provides call rules Provides call accounting Unique Security Issues The Call Manager is dependent on the host OS security & its subcomponents Some VOIP vendors do not release critical patches at the same time as the operating system vendor Limits to the system hardening that can be performed Control of the Call Manager can be gained through exploiting the operating system, applications, or configuration Software vulnerabilities Weak configurations

The Call Manager can be manipulated to Direct calls both inside and outside of the network Control phone configuration Bypass call rules Manipulate call accounting Change security parameters Goal is to have control of the VOIP system Defenses Patch management Host & Network Based Intrusion Prevention Network Segmentation Proactive network monitoring and management

Fraud Theft of Service Espionage Sabotage Extortion

Manipulation of phone system for verifications to provide bogus authorization or reversed to get consumer information Credit card approval Wire transfer approval Vendor fraud Manipulation of Caller ID Support traditional fraud (boiler rooms) Securities fraud Manipulate outbound calling Direct calls to 900 numbers Gather consumer information though eavesdropping

Open VOIP gateways with ports open to the Internet Hackers locate through scanning Direct calls through your gateway and PSTN Create extensions that are not logged in the accounting system Obscure source of call Employee long distance abuse Facilitating insider trading Insider resell of long distance using remote access

Wiretapping with the purpose of intercepting calls to provide a competitive advantage for an outside organization Tapping VIP phones Getting access to VIP voicemail Tapping helpdesk or IT lines for further system access Providing unauthorized access to conference call bridges through Call Manager manipulation Using call history to profile the organization Masking extensions to facilitate social engineering

Using DoSattacks to drop phones at critical times Launch DoS during disaster against first responders DoS attack for phone intensive organizations Drop phones in commodities trading Disgruntled employees Manipulate QoS settings to provide poor call quality Create scripts to randomly assign extensions Redirect inbound or outbound calls Malware based DoS from general malice

Use of information gathered from eavesdropping Phone records Conversations Voicemail Threats of DoSattack if a ransom is not paid Major threat for commodities trading organizations Call centers can lose millions during down time Use by disgruntled IT staff with access to these systems System can be used to make ransom requests that are difficult to trace

SPAM Over Internet Telephony Integrating VOIP into Traditional Crime Physical/Electronic Attacks

The expansion of VOIP will lead to gateway to gateway calling over the Internet Reduces long distance cost to the cost of bandwidth Long distance calling will be the same price as an email SPAM over Internet Telephony will explode as email SPAM has with email High volume of telemarketing calls Filtering mechanisms will have to be implemented

Mobility of VOIP technology can allow highly mobile call centers Use of compromised networks for boiler room operations Rapid setup/tear down with Internet access being the only requirement Use of VPN and VOIP by organized crime for secure communications Use of compromised networks for high profile activities Compromise of VOIP networks and resell of phone service for illicit use Use of system hopping to thwart law enforcement

Combing physical and electronic attacks to facilitate high profile crime For example we ll consider a robbery Five minutes before robbery a DoSattack is launched against the Video over IP camera system All calls to 911 or security are directed to a confederate in a van outside with an IP phone that is configured as an extension on the company s phone system connected via wireless access points Inbound calls to security are directed to the confederate as well All calls from security are configured to call a phantom extension

VOIP Technology can provide many positive benefits for organizations, but the risks must be evaluated Before implementing VOIP Perform a risk assessment Design security into your deployment plan Use defense-in-depth Develop a strategy for monitoring and management