VoIP Forensics. Vasilis Katos. Democritus University of Thrace, Greece



Similar documents
Democritus University of Thrace University Campus, Kimmeria, Xanthi 67100, Greece. University of the Aegean Karlovassi GR-83200, Samos, Greece

The SPHINX Enigma in Critical VoIP Infrastructures: Human or Botnet?

Holistic Information Security: Human Factor and Behavior Prediction using Social Media

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

How to make free phone calls and influence people by the grugq

Enumerating and Breaking VoIP

Grandstream Networks, Inc. GXP2130/2140/2160 Auto-configuration Plug and Play

Using IP Networks for voice and video: benefits and challenges

SIP Trunking. Service Guide. Learn More: Call us at

Monitoring SIP Traffic Using Support Vector Machines

SPAM over Internet Telephony (SPIT) und Abwehrmöglichkeiten

CS 356 Lecture 16 Denial of Service. Spring 2013

Voice over IP Fundamentals

Finding VoIP vulnerabilities while you sleep

TSIN02 - Internetworking

An outline of the security threats that face SIP based VoIP and other real-time applications

Application Note. Onsight Connect Network Requirements V6.1

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

PREVENTING SPIT WITH NAIVE BAYES IN VOIP COMMUNICATION

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

Threat Analysis of the Session Initiation Protocol Regarding Spam

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 TEL: # 340

A Call Conference Room Interception Attack and its Detection

Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling

SOFTPHONE SUPPORT General Information Guide Release 1.0

Session Initiation Protocol and Services

Security of VoIP. Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks

Three-Way Calling using the Conferencing-URI

Managing Risks at Runtime in VoIP Networks and Services

A Lightweight Countermeasure to Cope with Flooding Attacks Against Session Initiation Protocol

The #1 Issue on VoIP, Fraud!

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud Supervisor: Prof.Dr. Shawkat K.Guirguis

Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology

Configuring SIP Mobility for CounterPath Bria on the NetVanta 7100 and NetVanta UC Server Systems

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.

Keywords: VoIP calls, packet extraction, packet analysis

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models

EE4607 Session Initiation Protocol

DOMIQ, SIP and Mobotix cameras

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

VoIP telephony over internet

Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation

Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network

SIP ALG - Session Initiated Protocol Applications- Level Gateway

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

Formación en Tecnologías Avanzadas

ASTERISK. Goal. Prerequisites. Asterisk IP PBX Configuration

Exploiting the dark triad for national defense capabilities. Dimitris Gritzalis

Denial of Services on SIP VoIP infrastructures

SIP: Protocol Overview

Ecessa Proxy VoIP Manual

New method for evaluating anti-spit in VoIP networks

Broadband Phone Gateway BPG510 Technical Users Guide

Multimedia Conferencing with SIP

internet technologies and standards

NCAS National Caller ID Authentication System

MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

Multimedia Communication in the Internet. SIP Security Threads. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS 1

Hacking Trust Relationships of SIP Gateways

Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment

Transparent weaknesses in VoIP

SIP Security Status Quo and Future Issues Jan Seedorf

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

A Comprehensive study on tracking VoIP Caller

Broadband Telephony. Terminal Equipment Requirements and Specifications

VoIP & Internet Telephony

Evaluating DoS Attacks Against SIP-Based VoIP Systems

Evaluation of Security for a H.323-based VoIP Emulated Architecture

TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series

Unregister Attacks in SIP

Black Hat Briefings 2007 Las Vegas. White Paper on Vulnerabilities in Dual-mode/Wi-Fi Phones

SIP Essentials Training

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

OSSIR, November /45

Presenter. Zane Ryan. Director Dot Force

For internal circulation of BSNL only

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

Internet Services & Protocols Multimedia Applications, Voice over IP

V2W security - defense mechanisms against SIP DDoS flood

VoIP Security Threats and Vulnerabilities

Session 1: Standardization and Regulation Emergency Call Standardization

DDoS Attack Traceback

Internet Services & Protocols Multimedia Applications, Voice over IP

EAGLE EYE IP TAP. 1. Introduction

UIP1868P User Interface Guide

VOIP SECURITY ISSUES AND RECOMMENDATIONS

CE Advanced Network Security VoIP Security

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Voice over IP Security

SIP Security in IP Telephony

VoIP fraud methods used on the Internet today

Première conférence publique à Paris le 21 mars VOIP Security Sjur Usken and Ben Reardon

PIKA µfirewall Cloud Management Guide

Technical Communication 1201 Norphonic emergency rugged telephone on Alcatel-Lucent OmniPCX Enterprise

Prevention of Anomalous SIP Messages

Configure your 3CX in our IP telephone service.

Session Initiation Protocol (SIP) Chapter 5

Spam over SIP. Sebastian Domancich. Helsinki University of Technology, Finland

Transcription:

VoIP Forensics Vasilis Katos Democritus University of Thrace, Greece 1

The team Lilian Mitrou, University of The Aegean Athens University of Economics and Business Ioannis Psaroudakis, Democritus Univ. of Thrace

Metadata Time stamp (carbon dating) author (anthropology) Geo Location ( geographic location)

a few thousand years later

Monitoring (a.k.a. surveillance)

Legislation EU Directive 2006/24/EC Data Retention Directive Serious Crime What data? Traffic and location data Unsuccessful call attempts *NO* content Who shall retain the data? ISPs, telecoms,?

Impact

Session Initiation Protocol (SIP)

SIP Header 1/2 Time 2013-05-01 23:35:57.978170 Internet Protocol Version 4, Src: 5.54.64.210 (5.54.64.210), Dst: 192.xxx.xxx.37 (192.xxx.xxx.37) Session Initiation Protocol Request-Line: INVITE sip:71150@sip.duth.gr SIP/2.0 Message Header Via: SIP/2.0/UDP 5.54.64.210:61624;branch=z9hG4bK-d8754z- 320fc157e67ba641-1---d8754z-;rport Contact: <sip:402@5.54.64.210:61624> To: "71150"<sip:71150@sip.duth.gr> From: "jpsaroud windows"<sip:402@sip.xxxx.gr>;tag=3f498445 Call-ID: MmFmYWFjNTk1ZTQzOTdhM2JiODJiNDAyZGNkOTRiZmU. CSeq: 1 INVITE User-Agent: eyebeam release 1102q stamp 51814 Session Description Protocol Owner/Creator, Session Id (o): - 5 2 IN IP4 5.54.64.210

SIP Header 2/2 Owner Network Type: IN Owner Address Type: IP4 Owner Address: 5.54.64.210 Session Name (s): CounterPath eyebeam 1.5 Connection Information (c): IN IP4 5.54.64.210 Connection Network Type: IN Connection Address Type: IP4 Connection Address: 5.54.64.210 Media Attribute (a): alt:1 4 : UhYE2Wox slbn3klo 5.54.64.210 24784 Media Attribute (a): alt:2 3 : R828U4V/ lw4glyqm 10.10.10.1 24784 Media Attribute (a): alt:3 2 : M4f701Fm 5Gw9wOoX 192.168.61.1 24784 Media Attribute (a): alt:4 1 : BndXE2LR CPxnI5x9 192.168.111.1 24784 Info: Request: INVITE sip:71150@sip.xxxx.gr, with session description

The testbed

The analysis framework

Legitimate User user agent string Number of SIP messages 772 2164 Value Artifact Authenticated User 3CXPhone for iphone 1.1.5 Acrobits SIPIS (http://www.acrobits.cz) 30 Acrobits Softphone/5.3.2 13949 C470IP/022270000000 C610 4739 IP/42.050.00.000.000 215 CSipSimple_GT-I9100-15/r1916 3319 Intracom/Intracom-1.63.A 3CX Softphone for Iphone or IPad 604@sip.xxx.xxx.gr Softphone for Devices e51@83.xxx.xxx.194 Softphone for Devices. Version 5.3.2 is for Iphone or Ipad. e51@83.xxx.xxx.194 Siemens Gigaset IP phone ssip@83.xxx.xxx.194 model C470 sp1@83.xxx.xxx.194 Siemens Gigaset IP phone model C470 lin@83.xxx.xxx.194 SipSimple softphone for Android running in Samsung I9100 Galaxy S II smartphone. 756@sip.xxx.gr Netfaster IAD router 1.63 firmware with SIP Analog Telephone Adaptor 402@sip.xxx.gr

Legitimate User register process Timestamp Source IP User Agent SIP ContactNumber of SIP messages 3/13/13 8:23 X9.210.204.5X 3CXPhone for iphone 1.1.5 <sip:401@192.168.2.102:5065> 3/12/13 22:57 X9.210.21.3X 3CXPhone for iphone 1.1.5 <sip:401@192.168.2.101:5065> 3/15/13 22:13 X4.225.194.9X Acrobits Softphone/5.3.2 <sip:e51@192.168.0.128:5090> 3/11/13 8:45 X4.225.194.9X C470IP/022270000000 <sip:ssip@192.168.0.2:5060> 3/15/13 0:05 X4.68.112.21X C470IP/022270000000 <sip:mam@192.168.1.72:5062> 3/11/13 8:43 X4.68.71.1X C470IP/022270000000 <sip:mam@192.168.1.72:5062> <sip:756@x6.12.185.16x:5060;> 3/17/13 17:03 X6.12.185.16X CSipSimple_GT-I9100-15/r1916 <sip:756@192.168.0.125:5060>

Legitimate User INVITE request in media SDP attributes Timestamp Source IP User Agent 3/11/13 16:33 X9.210.182.12X 1/5/13 23:35 X3.212.132.15X SDP Connection Info SDP Media Attributes 3CXPhone for iphone 1.1.5 192.168.2.101 rtcp:4001 IN IP4 192.168.2.101 eyebeam release 1102q stamp 51814 X3.212.132.15X Media Attribute (a): alt:1 4 : UhYE2Wox slbn3klo 5.54.64.210 24784 Media Attribute (a): alt:2 3 : R828U4V/ lw4glyqm 10.10.10.1 24784 Media Attribute (a): alt:3 2 : M4f701Fm 5Gw9wOoX 192.168.61.1 24784 Media Attribute (a): alt:4 1 : BndXE2LR CPxnI5x9 192.168.111.1 24784 3/15/13 9:37 X4.65.125.23X Telephone 1.0.4 192.168.178.22 rtcp:4001 IN IP4 192.168.178.22

Private LAN disclosure from SIP messages

Malicious or non legitimate users SipVicious User-agent: friendly-scanner, OPTIONS sip:100@8x.xxx.xxx.23 INVITE sip:5221@192.xxx.xxx.38 SipCli INVITE sip:0972592646879@192.xxx.xxx.38 Private IP from SDP owner header excessive spoofing User-agent:OcaXowTU4mYZ2m9

Legitimate users

Malicious users

Conclusions A wealth of volatile traffic data can be used for identifying entities participating in VoIP communication Forensic readiness Data retention scope? Applications result to increased complexity The CEO golf effect Information leaks?

References 1. Bo-Lin W., A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence, Digital Investigation, vol. 8, no. 1, pp. 56-67, 2011. 2. Dritsas, S., Tsoumas, B., Dritsou, V., Konstantopoulos, P., Gritzalis, D., OntoSPIT: SPIT Management through Ontologies, Computer Communications, vol. 32, no. 2, pp. 203-212, 2009. 3. François, J., State, R., Engel, T., Festor, O., "Digital forensics in VoIP networks, in Proc. of the IEEE International Workshop on Information Forensics and Security, pp. 1-6, 2010. 4. Gritzalis, D., Katos, V., Katsaros, P., Soupionis, Y., Psaroudakis, J., Mentis, A., The Sphinx enigma in critical VoIP infrastructures: Human or botnet?, in Proc. of the 4 th International Conference on Information, Intelligence, Systems and Applications, IEEE Press, 2013. 5. Gritzalis, D., Marias, G., Rebahi, Y., Soupionis, Y., Ehlert, S., SPIDER: A platform for managing SIP-based spam over Internet Telephony, Journal of Computer Security, vol. 19, no. 5, pp. 835-867, 2011. 6. Hsien-Ming, H., Yeali, S., Meng, C.-C., Collaborative scheme for VoIP traceback, Digital Investigation, vol. 7, nos. 3 4, pp. 185-195, April 2011. 7. I-Long, Lin, Yun-Sheng, Y. "VoIP Digital Evidence Forensics Standard Operating Procedure", International Journal of Research and Reviews in Computer Science, vol. 2, no. 1, pp. 22-38, 2011. 8. Irwin, D., Slay, J., "Extracting Evidence Related to VoIP Calls", Advances in Digital Forensics VII, IFIP AICT 361, pp. 221-228, 2011. 9. Stachtiari, E., Soupionis, Y., Katsaros, P., Mentis, A., Gritzalis D., Probabilistic model checking of CAPTCHA admission control for DoS resistant anti-spit protection, in Proc. of the 7 th International Workshop on Critical Information Infrastructures Security, pp. 143-154, Springer (LNCS 7722), Norway, 2012. 10. Soupionis, Y., Gritzalis, D., Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony, Computers & Security, vol. 29, nο. 5, pp. 603-618, 2010. 11. Soupionis, Y. Tountas, G., Gritzalis, D., Audio CAPTCHA for SIP-based VoIP, in Proc. of the 24 th International Information Security Conference, pp. 25-38, Springer (IFIP AICT 297), 2009.