VoIP in Flow A Beginning



Similar documents
Moving Target Reference Implementation

Exploring the Interactions Between Network Data Analysis and Security Information/Event Management

Contracting Officer s Representative (COR) Interactive SharePoint Wiki

How To Use Elasticsearch

VoIP Conferencing. The latest in IP technologies deliver the next level of service innovation for better meetings. Global Collaboration Services

2012 CyberSecurity Watch Survey

How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions

Network Analysis with isilk

Network Monitoring for Cyber Security

Cyber Intelligence Workforce

Abuse of CPE Devices and Recommended Fixes

Monitoring Trends in Network Flow for Situational Awareness

Application Note. Onsight Connect Network Requirements v6.3

Applying Software Quality Models to Software Security

Extending AADL for Security Design Assurance of the Internet of Things

MS Skype for Business and Lync. Integration Guide

TLS and SRTP for Skype Connect. Technical Datasheet

Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0

Application Note. Onsight Connect Network Requirements V6.1

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Paving the Way to Next Generation Media and Signaling VoIP Gateways

TALKSWITCH VOIP NETWORK TROUBLESHOOTING GUIDE

$100 SiLK Network Flow Sensor

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Voice Over IP. Priscilla Oppenheimer

Cisco Expressway IP Port Usage for Firewall Traversal. Cisco Expressway X8.1 D December 2013

A Systematic Method for Big Data Technology Selection

TECHNICAL CHALLENGES OF VoIP BYPASS

Technical Configuration Notes

Indepth Voice over IP and SIP Networking Course

SIP Security Controllers. Product Overview

RTP Performance Enhancing Proxy

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 4.1 for use with SKYPE SIP Trunking. SIP CoE

Dialogic Brooktrout SR140 Fax Software with Broadvox GO! SIP Trunking Service

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Nokia E65 Internet calls

Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0

IMPORTANT NOTE. Dialogic Brooktrout SR140 Fax Software with T38Fax.com SIP Trunking Service. Installation and Configuration Integration Note

An Introduction to VoIP Protocols

CyberData VoIP V2 Speaker with VoIP Clock Kit Configuration Guide for OmniPCX Enterprise

Unit 23. RTP, VoIP. Shyam Parekh

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions

FortiVoice. Version 7.00 VoIP Configuration Guide

Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga

Encapsulating Voice in IP Packets

Application Note. Onsight TeamLink And Firewall Detect v6.3

Penetration Testing Tools

Basic Vulnerability Issues for SIP Security

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office Issue 1.0

A Comparative Study of Signalling Protocols Used In VoIP

Release Notes for NeoGate TE X

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

Acano solution. Third Party Call Control Guide. March E

UCi2i Video Conference Endpoint Firewall Requirements. UCi2i Video Conference Endpoint Firewall Requirements

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0

VoIP Network Configuration Guide

SIP Trunking Manual Technical Support Web Site: (registration is required)

Abstract. Avaya Solution & Interoperability Test Lab

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

BigConnect v1.x. Software Guide

Copyright ZYCOO All Rights Reserved 1 / 8

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0

CT LANforge-FIRE VoIP Call Generator

SIP Trunking using the EdgeMarc Network Services Gateway and the Mitel 3300 ICP IP-PBX

LifeSize Transit Deployment Guide June 2011

Technical Bulletin 25751

CERT Virtual Flow Collection and Analysis

Broadvox SIP Trunk Setup

Connecting with Vonage

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

UCi2i Video Conference Endpoint Firewall Requirements

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0

Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer

SIP Trunking: Enabling Wideband Audio for the Enterprise

SIP Trunking Quick Reference Document

White paper. SIP An introduction

VIDEOCONFERENCING. Video class

Supply-Chain Risk Management Framework

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online

Creating your own service profile for SJphone

StarLeaf Network Guide

VOIP NETWORK CONFIGURATION GUIDE RELEASE 6.10

Introducing Cisco Voice and Unified Communications Administration Volume 1

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

Technical Configuration Notes

Troubleshooting Voice Over IP with WireShark

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Transcription:

VoIP in Flow A Beginning Nathan Dell CERT/NetSA 2013 Carnegie Mellon University

Legal Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN AS-IS BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted below. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. DM-0000773 2

Outline General Principals to Finding and Understanding VoIP in flow Analysis of VoIP Real Time Communications Lab Example of Data Exfiltration 3

General Principals Finding VoIP Standard VoIP have well known ports and protocols SIP uses port 5060, secure SIP uses port 5061 SCCP uses port 2000, secure SCCP uses port 2443 H. 323 uses port 1720 for call set up Finding Real Time traffic (phone call) Session generated port pair for real time traffic (RTP, RTCP) Work backwards follow VoIP signaling SIP Phone are required to periodically register with the registration server Find the a particular end port and pull traffic until you see a phone call 4

General Principals Finding VoIP None standard VoIP have unique signaling protocols and ports Skype Authentication and signaling over port 80 or 443 (TLS) Use common network elements to locate traffic Authentication Server is a static IP Razer Comm Gaming VoIP Software Authentication Ports 443 (TLS) Use UDP Port 2000 for media sessions Does not operate in peer-to-peer method uses a transcoder through a single IP 5

General Principals Understand VoIP Understanding the function of common VoIP network elements can help you understand observed VoIP traffic Redirect server allows phone call forwarding Transcoder Allow phone with unsupported codex the ability to communicate Mixer Combines two audio streams into a single audio stream User Agents - entities within the VoIP network in a client server mode that act on the behalf of users (phone, PC, Conference Bridge) Location Server Maintain location of connected phones 6

SIP Redirect Server Call Forwarding 3 5 6 4 7 1 S2 14 S1 13 2,8 DNS Request/Response 15 9 12 10 17 11 16 7

SIP Redirect Flow Call Forwarding sip dip sport dport Pro Packets Bytes Sensor Type 10.55.22.1 10.55.31.1 17756 5060 17 26 10062 S1 OUT 55.55.1.2 15.78.8.9 37895 53 17 1 88 S2 OUT 15.78.8.9 55.55.1.2 53 37895 17 1 245 S2 IN 55.55.1.2 66.66.3.4 24868 5060 6 15 5175 S2 OUT 66.66.3.4 55.55.1.2 5060 24868 6 10 3450 S2 IN 55.55.1.2 16.58.43.6 37895 53 17 1 88 S2 OUT 16.58.43.6 55.55.1.2 53 37895 17 1 245 S2 IN 55.55.1.2 77.77.5.6 13467 5060 6 34 12852 S2 OUT 77.77.5.6 55.55.1.2 5060 13467 6 24 8328 S2 IN 10.55.31.1 10.55.22.1 5060 17756 6 34 13158 S1 IN 10.55.22.1 77.77.5.6 47598 35878 17 4876 277932 S1 OUT 55.55.1.2 77.77.5.6 47598 35878 17 4876 277932 S2 OUT 77.77.5.6 55.55.1.2 33572 47598 17 1625 92644 S2 IN 55.55.1.2 10.55.22.1 33572 47598 17 1625 92644 S1 IN 10.55.22.1 10.55.31.1 34527 5060 17 7 2275 S1 OUT 55.55.1.2 77.77.5.6 12354 5060 6 15 2646 S2 OUT 77.77.5.6 55.55.1.2 5060 12354 6 6 2088 S2 IN 10.55.31.1 10.55.22.1 5060 34527 17 8 2784 S1 IN 8

Real Time Communications Two use cases for packet generation: On demand - noise is registered on the input devices (i.e microphone) then packaged and sent Software continuously generate packets regardless of input, providing flow obfuscation Typically session generated port pair is used Some software allows you specify port ranges RTP should be even, RTCP next open odd port Some software use dedicated ports for communication 9

Noise Generated Packets With a low idle time out on the flow sensor you can see: General meter of the conversation Who talks when and for how long No Noise = No Packets Timing Packets How Long - Time 10

Noise Generated Packets Out Bound No Noise = No Packets Timing Packets Conversation Meter 2 People 3rd person joins call Timing Packets Inbound 11

Software Generated Packets No break in the conversation regardless of human interaction Software packets appear to be uniformed Out Bound Traffic No Pattern, obfuscated Timing Packets 12

Data Exfiltration Lab Work Flow 13

Lab: Data Exfiltration - Data to Sound def to sound(infile, outfile): samplefreq = 8000 denominator = 8 frequencies = (262, 294, 330, 350, 392, 440, 494, 523, 587, 659, 698, 784, 880, 988, 1047, 1175) size = os.path.getsize(infile) fmt = FormatChunk() fmt.size = 0x10 fmt.formattag = 1 fmt.channels = 1 fmt.bitspersample = 16 fmt.samplespersec = samplefreq fmt.avgbytespersec = fmt.samplespersec * fmt.bitspersample / 8 fmt.blockalign = 4 amplitude = 3000 length = (3*denominator + size) * fmt.samplespersec / denominator * fmt.channels * fmt.bitspersample / 8 https://code.google.com/p/data-sound-poc/ A file is already in a digital format but it must be passed through a VoIP network Convert the digital format (.txt) into audio format (.wav) Think Fax/Modem 14

Compression is Important halfbytesamplelength = fmt.samplespersec / denominator data) j = 0 while True: data = infh.read(1) if data == "": break (m,) = struct.unpack("b", a = m & 0xF b = m >> 4 To extract 23 Bytes it takes 5.87 second sound bite 136.8 KB.wav file To extract CERT Resilience Management Module or 52,691 Bytes 1H 49M sound bite 201MB.wav file frequencies[halfbyte] for halfbyte in (a,b): frequency = https://code.google.com/p/data-sound-poc/ 15

Data Exfiltration - Flow Without good compression flow long The flow very uniformed, set frequency and timing The flow is unidirectional Software generated packets obfuscated this flow, instead you will find bidirectional flow 16

Summary Understanding the network function of a object can help you understand observer flow data Many comment elements between VoIP deployments (Proxy, Redirect, Voice Mail, Transcoder, etc.) Their two use cases for real time communication On demand generation noise = packets Software generated packets - endless packets Data Exfiltration Unidirectional flow, unless software generated packets Weak Compression will create long flows On demand VoIP will look like SW VoIP 17

Future Work Prove that there are only two use cases for real time communications Software Generated Discover observable features On demand Generation Developing a comprehensive list of observable features Cross section those features with flow idle time out Example: If you want the ability to observer feature X you will need an idle time of Y 18

Questions/comments? 2013 Carnegie Mellon University