hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih



Similar documents
How To Fix A Hard Phone Bug

Dustin D. Trammell Security Research BreakingPoint Systems, Inc. Computer Academic Underground

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

A Reality Check on Security in VoIP

Securing Enterprise VoIP. VoIP Vulnerabilities Patrick Young CEO Arlinx Inc.

VoIP Security regarding the Open Source Software Asterisk

Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation

NEW!!! Industry s only Comprehensive VoIP Security Boot Camp

Conducting an IP Telephony Security Assessment

Basic Vulnerability Issues for SIP Security

Best Practices for Securing IP Telephony

How to make free phone calls and influence people by the grugq

An outline of the security threats that face SIP based VoIP and other real-time applications

Enumerating and Breaking VoIP

VOICE OVER IP SECURITY

TECHNICAL CHALLENGES OF VoIP BYPASS

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

VoIP. Overview. Jakob Aleksander Libak Introduction Pros and cons Protocols Services Conclusion

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Hacking VoIP Exposed. David Endler, TippingPoint Mark Collier, SecureLogix

Securing SIP Trunks APPLICATION NOTE.

Storming SIP Security

Voice over IP Security

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Ingate Firewall/SIParator SIP Security for the Enterprise

Transparent weaknesses in VoIP

Voice Over IP (VoIP) Denial of Service (DoS)

VOIP TELEPHONY: CURRENT SECURITY ISSUES

VoIP Security: How Secure is Your IP Phone?

Security issues in Voice over IP: A Review

Threat Mitigation for VoIP

Black Box Analysis and Attacks of Nortel VoIP Implementations

Introduction to VoIP Technology

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Formación en Tecnologías Avanzadas

SS7 & LTE Stack Attack

Voice Over IP. Priscilla Oppenheimer

An Introduction to VoIP Protocols

VoIP Phreaking Introduction to SIP Hacking. Hendrik Scholz 22C3, Berlin, Germany

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

Voice over IP (VoIP) Vulnerabilities

VOIP SECURITY ISSUES AND RECOMMENDATIONS

VOIP Security Essentials. Jeff Waldron

EE4607 Session Initiation Protocol

White paper. SIP An introduction

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

Intrusion Prevention: The Future of VoIP Security

CVOICE Exam Topics Cisco Voice over IP Exam # /14/2005

Challenges and opportunities for Open Source solutions

VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

Multi-layered Security Solutions for VoIP Protection

VoIP Wars: Destroying Jar Jar Lync

Evaluation of Security for a H.323-based VoIP Emulated Architecture

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Security Best Practices for Enterprise VoIP. Preventing Attacks and Managing Risk

Security behind the dial tone. VoIP Security Threats, Vulnerabilities, Countermeasures, and Best Practices

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SIP and VoIP 1 / 44. SIP and VoIP

A Comparative Study of Signalling Protocols Used In VoIP

Configuration Guide for Cisco Unified Communications Environments

Cisco ASA 5500 Series Unified Communications Deployments

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

Voice Over IP and Firewalls

Voice over IP Basics for IT Technicians

Who is Watching You? Video Conferencing Security

CE Advanced Network Security VoIP Security

Knowledgebase Solution

Ram Dantu. VOIP: Are We Secured?

VoIP Security. Title: Something Old (H.323), Something New (IAX), Something Hallow (Security), & Something Blue (VoIP Administrators)

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Network Attacks. Common Network Attacks and Exploits

VIDEOCONFERENCING. Video class

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

VoIP Security, an overview of the Threat Landscape

Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0

Troubleshooting Voice Over IP with WireShark

Master Kurs Rechnernetze Computer Networks IN2097

Secure Voice over IP (VoIP) Networks

Application Note. Onsight Connect Network Requirements v6.3

Unit 23. RTP, VoIP. Shyam Parekh

CHAPTER 1 INTRODUCTION

Indepth Voice over IP and SIP Networking Course

Chapter 2 PSTN and VoIP Services Context

Recommended IP Telephony Architecture

The #1 Issue on VoIP, Fraud!

Transcription:

luiz eduardo cissp, ceh, cwne, gcih

who am I? networking guy security guy employed by Aruba Networks wlan network for defcon, blackhat & ccc regular speaker at cons founder, dc55.org and...

agenda intro voip a, b, c... protocols architectures attacks vowlan tools conclusion

before we start...

intro voip not that new... being developed since the early 90s why voip? save $ pstn integration save $ why voip security? people USE IT (regardless if they know/want to or not) because iphreakers are out there & technology is accessable (just like back in the day) security practices are undergoing development sometimes security isn t top priority

voip a, b, c... voip : voice over internet protocol endpoint : softphone/ hardphone call : has a signaling and a media channel poe : anyone? pstn : public switched telephone network gateway = a bridge between two different voice network types directory services = translates an alias to an endpoint device

protocols / signaling sip: session initiation protocol tcp/udp ports 5060/5061 sccp: skinny client control protocol tcp 2000/2001 rtcp: real-time transfer control protocol dynamic udp mgcp: media gateway control protocol udp 2427/2727 for pstn integration

protocols/ media rtp: real-time transport protocol udp 5004 (it s got problems with nat-t, so use STUN) srtp: secure rtp, uses AES

h.323 Some kind of high powered mutant never even considered for mass production. Too weird to live, and too rare to die ok, it did go to mass production, but, from what movie is this quote from?

h.323 signaling h.235 (security) h.225 + q.931 (management) RTCP media audio/ video: RTP

codecs too many... seriously... http://www.voip-info.org/wiki-codecs

architectures intelligent endpoints i.e: h.323, sip device control i.e: sccp, mgcp p2psip hybrid

attacks knowing your enemy... network/ voip attacks according to cia triad vowlan social threats

footprinting samspade google + google hacking ending-up on the company s website job-listings, switchboard phone number, etc... www.hackingvoip.com nmap (what option should be used?) what for??

enumeration, what is out there? names extensions configuration use netcat... sip is similar to http filenames can give out important info config files can give out MORE important info and, never forget SNMP...

so... what are the 3 well-known security principles? confidentiality integrity availability

confidentiality attacks eavesdropping problem: it s sniffable, recordable, redirectable (possible) solution: encryption for the media channel enumeration problem: send messages to the servers (i.e. sip via nc) / configuration transferred by tftp/ftp, filenames (possible) solution: encryption for the signaling channel / protocol change

integrity attacks caller-id spoofing problem: easily spoofable/ not always checked / systems rely on caller-id for authentication (i.e. cellphone voicemail) (possible) solution: not trust caller-id(s) signaling manipulation problem: malicious signal injection / call redirection/ call teardown/ endpoint freak-out (possible) solution: encryption for the signal channel / change protocol to use authentication

availability attacks... amplification attacks problem: smurf-attack like problems (possible) solution: use of authenticated protocols/ rate-limit /shapping protocol fuzzing problem: some of the stacks on endpoints (mainly hardphones) are somehow imature / phones reboot/ freeze, etc... (possible) solution: open-source soft phones and hard phone firmware, check forums/ mailing lists

...availability attacks flooding problem: send lots of voip signaling packets or simple network packets (i.e: tcp syn) / device crash/ call quality problems, etc... (possible) solution: protect/ firewall the voip infrastructure, rate-limit / shaping signaling manipulation (again) problem: malicious signal injection / call redirection/ call teardown/ endpoint freak-out (again) (possible) solution: encryption for the signal channel / change protocol to use authentication (again)

vowlan

vowlan wlan problems are the same voip problems don t change either combine both... and... but, people are gonna use it... why? $$ and many options (dual-mode phones/ pdas / even softphones) people love cellphones, but not the bill concerns: QoS being addressed in 802.11e and management frame security/encryption 802.11? (anyone?)

vowlan identity awareness is key service delivery based on who, what, when, where and how Identity aware I am Matt Green, the employee Device aware I am Matt Green with a laptop with no viruses or worms Traffic aware and QoS I am Matt Green with a laptop using a soft phone with QoS Time aware I am Matt Green with a laptop using a soft phone with QoS at 1:40 pm Location aware I am Matt Green with a laptop using a soft phone with QoS at 1:40 p.m. in the clinic

social threats spit spam over internet telephony impersonation (phone) sometimes contacts are obtained by account harvesting, enumeration different from spam, interrupts the user immediately voiphishing collect people s information (HOW?) mitm eavesdropping impersonation again (email) ok, ok, but HOW??? or trixbox + social engineering

tools eavesdropping: wireshark, cain & abel, vomit, directory enumeration: sipcrack, enumiax, sipscan caller-id spoofing: most softphones, spoofcard.com (some providers allow pstn access based on caller id) signaling manipulation: sip-redirectrtp + rtpproxy (for mitm) flooding: scapy, inviteflood, iaxflood, udpflood, rtpflood fuzzing: PROTOS (for SIP, HTTP, SNMP), ohrwum - rtp, fuzzy packet rtp w/ arp poisoner, etc amplification: scapy or any packet (re)player forced call teardown: most are sip bye injection tools

conclusion/ use protection when possible, secure the voip network infrastructure and the bounderies via security policies encryption (and try to make it based on voip The Solution mechanisms) authentication (where you can) protocol challenges (things are improving, but ) don't trust caller-id(s) traffic shapping zfone and let s not forget, privacy...

quem quer dinheeeiro? sip ports? sccp? (not the certification, the protocol) old name for wireshark? opensource tool shown on Matrix Reloaded? what tool was used to exploit the system? on Matrix 1, what s Neo s apartment number? what s the name of the famous hacker quarterly magazine?

)(@#)@(^&@^# comments/ questions? obrigado! luiz eduardo luiz [at] arubanetworks.com