SlideShare a Scribd company logo
VoIP Security: An OverviewVoIP Security: An Overview
(2008)(2008)
Meletis BelsisMeletis Belsis
Information Security ConsultantInformation Security Consultant
MPhil / MSc / BScMPhil / MSc / BSc
CWNA/CWSP, C|EH, CCSA, ISO27001LACWNA/CWSP, C|EH, CCSA, ISO27001LA
AgendaAgenda
VoIP Technology
VoIP Complexity
VoIP Threats
Example Attacks
The Hacker’s Toolbox
VoIP Countermeasures
The Company
VoIP TechnologyVoIP Technology
• VoIP is an integral part of modern Enterprises
• VoIP allows the reduction of OpEx by providing PSTN
like services
• Based on open IETF and ITU standards
• Protocols used to support VoIP include
TCP/UDP/IP, DNS,TFTP, DHCP,STUN,HTTP,SIP,RTPTCP/UDP/IP, DNS,TFTP, DHCP,STUN,HTTP,SIP,RTP
• VoIP components include:
Routers, Switches, Firewalls, SIP Servers,
Media Gateways, iPBX, WiFi
VoIP SecurityVoIP Security
“ The flexibility of VoIP comes at a price: added
complexity in securing voice and data. Because
VoIP systems are connected to the data network
and share many of the same hardware and
software components, there are more ways for
intruders to attack a VoIP system than a
conventional voice telephone system or PBX “
NIST: Considerations for Voice over IP SystemsNIST: Considerations for Voice over IP Systems
VoIP Security ComplexityVoIP Security Complexity
• Securing a VoIP network is complex because:
– VoIP inherits the TCP/IP Vulnerabilitiesinherits the TCP/IP Vulnerabilities.
– VoIP uses the corporate networkuses the corporate network to operate. Usually
there is no network separation.
– Applying security may affect other attributes of VoIPaffect other attributes of VoIP
(e.g. Delay, Latency, Jitter).
– VoIP usually uses UDP communicationuses UDP communication and thus may
not be able to operate on networks that use firewalls.
Special proxy techniques like STUNSTUN need to be
applied.
VoIP ThreatsVoIP Threats
• Denial Of ServiceDenial Of Service
– Flood Attacks (i.e Controller Flooding)
– BYE Tear Down
– Registration Reject
– Hold Attack
– Call Reject
• Interception AttacksInterception Attacks
– Call Hijacking
– Registration Hijacking
– Media Session Hijacking
– Server Masquerading
– DNS Poisoning
– Caller ID Spoofing
– VoIP VLAN Hopping
– ARP Spoofing
• Covert ChannelsCovert Channels
• WiFi AttacksWiFi Attacks
SIP
server
SIP
server
Media
proxy
SIP signaling
Media Stream
Sniffing
(D)DoS attack
Wire
tapping
SPIT
VoIP ThreatsVoIP Threats
• VoIP Platforms Vulnerabilities
– CAN-2004-0056CAN-2004-0056: Malformed H.323 packet to exploit
Nortel BCM vulnerabilities
– CAN-2004-0054CAN-2004-0054: Exploits CISCO IOS H.323
implementation
– CVE-2007-4459CVE-2007-4459: Cisco SIP DoS vulnerabilities.
– CVE-2007-6424CVE-2007-6424: Vulnerabilities on the Fonality
Trixbox 2.0 PBX products
– CVE-2007-5361CVE-2007-5361: Vulnerabilities on the Alcatel- Lucent
OmniPCX Enterprise Communication Server.
– CVE-2007-5556CVE-2007-5556: Vulnerabilities on the Avaya VoIP
Handset.
Server MasqueradingServer Masquerading
Vlan HoppingVlan Hopping
SourceSource:: http://www.securityfocus.com/infocus/1892
SIP InjectionSIP Injection
UE’s initial Register Request looks like:
REGISTER SIP: home1.de SIP/2.0
Username=”user Authorization: Digest Username
user_private@home1.de”,
realm=”home1.de”, nonce=” “, uri=”SIP: home1.de”,
response=” “
Malicious Code infected with SQL injection looks like:
REGISTER SIP: home1.de SIP/2.0
Authorization: Digest
Username=”user_private@home1.de;delete table
users”, realm=”home1.de”, nonce=” “, uri=”SIP:
home1.de”, response=” “
Hacker’s ToolboxHacker’s Toolbox
• OrekaOreka : A cross-platform system for recording and retrieving audio
streams
• rtpBreakrtpBreak: detects, reconstructs and analyzes any RTP session through
heuristics over the UDP network traffic.
• SIPCrackSIPCrack : a SIP protocol login cracker
• SiVusSiVus : A SIP Vulnerability Scanner.
• BYE Teardown:BYE Teardown: disconnect an active VoIP conversation by spoofing the
SIP BYE message from the receiving party
• SipRogueSipRogue :multifunctional SIP proxy that can be inserted between two
talking parties
• RTPInjectRTPInject :attack tool that injects arbitrary audio into established RTP
connections.
• TFTP CrackerTFTP Cracker: A tool to attack VoIP endpoint and copy their
configuration through tftp
• ILTY(I am Listening to You)ILTY(I am Listening to You) : A multi-channel VoIP Sniffer
• Registration AdderRegistration Adder: A tool to allow fake registrations to be send
• VoIP HopperVoIP Hopper: Allows to hope from a normal VLAN to the VoIP Vlan
Hackers ToolboxHackers Toolbox
RTPInject SiVUS Scanner
13
WiFi VoIPWiFi VoIP
NetStumblerNetStumbler
Is used by WarDriversIs used by WarDrivers
to detect unprotectedto detect unprotected
WiFi NetworksWiFi Networks
AirSnortAirSnort
Is widely used to
attack WEP
passwords
VoIP CountermeasuresVoIP Countermeasures
• Network SeparationNetwork Separation : Although dedicated
VoIP VLANs offer a level of security, a dedicate
VoIP network will be more secure.
• SIP EncryptionSIP Encryption: The TLS protocol can be used
to encrypt the SIP messages exchanged
between the nodes. TLS provides only Server
authentication. S/MIME is another option for SIP
encryption.
• RTP EncryptionRTP Encryption: Secure RTP(SRTP) can be
used to encrypt media in a VoIP network
VoIP CountermeasuresVoIP Countermeasures
• ManagementManagement: Avoid using weak management
protocols like Telnet, tftp and SNMP ver 2.
• FirewallsFirewalls: Ensure that VoIP components (i.e.
SIP Proxy, DNS, DHCP, Radius) are logically
located behind VoIP aware firewalls (e.g. CISCO
SIP Extensions for ASA).
• IDS/IPSIDS/IPS : The existent IDS/IPS architecture
can be extended using SIP Aware Sensors
VoIP CountermeasuresVoIP Countermeasures
• Hardening the network EnvironmentHardening the network Environment
– Enforce Security at the Network Equipment:
• Port Security
• DHCP Snooping
• Receive Access Lists
• Enable MAC Filtering
• Define the maximum number of MAC addresses per port.
• Enable 802.1x for VoIP devices
– Use AAA on all VoIP infrastructure Systems
– Disable the PC Port on VoIP phone with multiple ports.
– Harden the OS of the platforms used
• DNZ Zone Transfers
• IP to MAC mappings on DHCP
• Apply Security Patches / Updates
• Disable Telnet and/or r-utilities
• VoIP Honeypots
– VoIP Phones
– Fake SIP Proxies (i.e.
Asterix)
VoIP CountermeasuresVoIP Countermeasures
Extra MaterialExtra Material
Detecting WiFi NetworksDetecting WiFi Networks
20
Detecting WiFi NetworksDetecting WiFi Networks
Bypassing MAC ACLsBypassing MAC ACLs
Being in the MiddleBeing in the Middle
• DNSDNS (modify entries to point all traffic to a hacker's
machine)
• DHCPDHCP (make all traffic go to hackers machine as
default gateway, or change DNS entry to point at
hacker's machine so all names resolve to hacker's
IP address)
• ARPARP (reply with hacker's MAC address, gratuitous
ARPs or regular ARP replies)
• Flood CAMFlood CAM tables in switches to destroy existing
MAC addr/port associations so all traffic is
broadcast out every port, and then use ARP attacks
• Routing protocolsRouting protocols (change routing such that traffic
physically passes through a router/machine
controlled by hacker)
• Spanning tree attacksSpanning tree attacks to change layer 2 forwarding
topology
• Physical insertionPhysical insertion (e.g. PC with dual NIC cards, be it
Ethernet based or WLAN-based)
Questions ?Questions ?

More Related Content

What's hot

I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
Suhas Desai
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
Dayanand Prabhakar
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
Christopher Duffy
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
Zack Chou
 
How to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFWHow to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFW
Yudi Arijanto
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
Dan York
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP
Fatih Ozavci
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
Vi Tính Hoàng Nam
 
Encrypted Voice Communications
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communications
sbwahid
 
PLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PLNOG14: Fortinet, Carrier and MSSP - Robert DąbrowskiPLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PROIDEA
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
Olle E Johansson
 
Rinicom presentation
Rinicom presentationRinicom presentation
Rinicom presentation
Marco Manso
 
Sangoma SS7 Gateway Training
Sangoma SS7 Gateway TrainingSangoma SS7 Gateway Training
Sangoma SS7 Gateway Training
Empatiq İletişim Teknolojileri AŞ.
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
 
Security Issues In Voip
Security Issues In VoipSecurity Issues In Voip
Security Issues In Voip
Waqas Daar
 
FortiWLC
FortiWLC FortiWLC
Spectralink ip dect-server400_prdctover_final_100213
Spectralink ip dect-server400_prdctover_final_100213Spectralink ip dect-server400_prdctover_final_100213
Spectralink ip dect-server400_prdctover_final_100213
IP10
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Encryption
 
Điện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetĐiện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheet
Nam TruongGiang
 
Vocality_Product_Brochure
Vocality_Product_BrochureVocality_Product_Brochure
Vocality_Product_Brochure
Zoe Yates
 

What's hot (20)

I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
 
How to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFWHow to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFW
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Encrypted Voice Communications
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communications
 
PLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PLNOG14: Fortinet, Carrier and MSSP - Robert DąbrowskiPLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
PLNOG14: Fortinet, Carrier and MSSP - Robert Dąbrowski
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
Rinicom presentation
Rinicom presentationRinicom presentation
Rinicom presentation
 
Sangoma SS7 Gateway Training
Sangoma SS7 Gateway TrainingSangoma SS7 Gateway Training
Sangoma SS7 Gateway Training
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
Security Issues In Voip
Security Issues In VoipSecurity Issues In Voip
Security Issues In Voip
 
FortiWLC
FortiWLC FortiWLC
FortiWLC
 
Spectralink ip dect-server400_prdctover_final_100213
Spectralink ip dect-server400_prdctover_final_100213Spectralink ip dect-server400_prdctover_final_100213
Spectralink ip dect-server400_prdctover_final_100213
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
Điện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetĐiện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheet
 
Vocality_Product_Brochure
Vocality_Product_BrochureVocality_Product_Brochure
Vocality_Product_Brochure
 

Similar to Meletis Belsis - Voip security

VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
Shah Sheikh
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
Togis UAB Ltd
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
Flavio Eduardo de Andrade Goncalves
 
Linux VOIP
Linux VOIP Linux VOIP
Linux VOIP
chanmyaeag
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
Abdullah Shah
 
Voip
VoipVoip
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
Adebayo Ojo
 
VOIP services
VOIP servicesVOIP services
VOIP services
Pankaj Saharan
 
Linux firewall
Linux firewallLinux firewall
Linux firewall
chanmyaeag
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
mashiur
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
eroglu
 
VOIP security
VOIP securityVOIP security
VOIP security
Rohit Gurjar
 
voip elements by Karan singh cypher
voip elements by Karan singh cypher voip elements by Karan singh cypher
voip elements by Karan singh cypher
Karan Maker
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
Sean Flores
 
Voippresentation
VoippresentationVoippresentation
Voippresentation
eliran2
 
voip gateway
 voip gateway voip gateway
voip gateway
Nayomi Ranamuka
 
VOIP Pros & Cons
VOIP Pros & ConsVOIP Pros & Cons
VOIP Pros & Cons
Zakaria Hasan
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
Bangladesh Network Operators Group
 
VOIP
VOIPVOIP
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
Iazon Danelia
 

Similar to Meletis Belsis - Voip security (20)

VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
 
Linux VOIP
Linux VOIP Linux VOIP
Linux VOIP
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Voip
VoipVoip
Voip
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
Linux firewall
Linux firewallLinux firewall
Linux firewall
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
VOIP security
VOIP securityVOIP security
VOIP security
 
voip elements by Karan singh cypher
voip elements by Karan singh cypher voip elements by Karan singh cypher
voip elements by Karan singh cypher
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
Voippresentation
VoippresentationVoippresentation
Voippresentation
 
voip gateway
 voip gateway voip gateway
voip gateway
 
VOIP Pros & Cons
VOIP Pros & ConsVOIP Pros & Cons
VOIP Pros & Cons
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
 
VOIP
VOIPVOIP
VOIP
 
Vo ip sip
Vo ip sipVo ip sip
Vo ip sip
 

More from Meletis Belsis MPhil/MRes/BSc

Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management ModelMeletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
Meletis Belsis MPhil/MRes/BSc
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 

More from Meletis Belsis MPhil/MRes/BSc (6)

Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Meletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management ModelMeletis Belsis - Workflow based Incident Management Model
Meletis Belsis - Workflow based Incident Management Model
 
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
Meletis Belsis - THE MULTIMEDIA APPROACH: AN EXTRA LAYER OF DEFENCE IN THE EN...
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 

Recently uploaded

Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Thiên Đường Tình Yêu
 
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
taqyea
 
Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
byubyu7
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
ubufe
 
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
taqyea
 
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办���
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
taqyea
 
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
taqyea
 
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
taqyea
 
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
taqyea
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
taqyea
 
cyber-security-training-presentation-q320.ppt
cyber-security-training-presentation-q320.pptcyber-security-training-presentation-q320.ppt
cyber-security-training-presentation-q320.ppt
LiamOConnor52
 
Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)
Kashyap J
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
Serva AppLabs
 
Book dating , international dating phgra
Book dating , international dating phgraBook dating , international dating phgra
Book dating , international dating phgra
thomaskurtha9
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
ffg01100
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
taqyea
 
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur
 
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
taqyea
 

Recently uploaded (20)

Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
 
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
一比一原版(oregon毕业证书)俄勒冈大学毕业证如何办理
 
Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
 
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
 
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
一比一原版(ubc毕业证书)英属哥伦比亚大学毕业证如何办理
 
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
 
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
一比一原版(ic毕业证书)英国帝国理工学院毕业证如何办理
 
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
 
一比一原版(aber毕业证)亚伯大学毕业证如��办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
 
cyber-security-training-presentation-q320.ppt
cyber-security-training-presentation-q320.pptcyber-security-training-presentation-q320.ppt
cyber-security-training-presentation-q320.ppt
 
Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
 
Book dating , international dating phgra
Book dating , international dating phgraBook dating , international dating phgra
Book dating , international dating phgra
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
一比一原版(ucb毕业证书)英国伯明翰大学学院毕业证如何办理
 
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears
 
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
一比一原版(kcl毕业证书)英国伦敦国王学院毕业证如何办理
 

Meletis Belsis - Voip security

  • 1. VoIP Security: An OverviewVoIP Security: An Overview (2008)(2008) Meletis BelsisMeletis Belsis Information Security ConsultantInformation Security Consultant MPhil / MSc / BScMPhil / MSc / BSc CWNA/CWSP, C|EH, CCSA, ISO27001LACWNA/CWSP, C|EH, CCSA, ISO27001LA
  • 2. AgendaAgenda VoIP Technology VoIP Complexity VoIP Threats Example Attacks The Hacker’s Toolbox VoIP Countermeasures The Company
  • 3. VoIP TechnologyVoIP Technology • VoIP is an integral part of modern Enterprises • VoIP allows the reduction of OpEx by providing PSTN like services • Based on open IETF and ITU standards • Protocols used to support VoIP include TCP/UDP/IP, DNS,TFTP, DHCP,STUN,HTTP,SIP,RTPTCP/UDP/IP, DNS,TFTP, DHCP,STUN,HTTP,SIP,RTP • VoIP components include: Routers, Switches, Firewalls, SIP Servers, Media Gateways, iPBX, WiFi
  • 4. VoIP SecurityVoIP Security “ The flexibility of VoIP comes at a price: added complexity in securing voice and data. Because VoIP systems are connected to the data network and share many of the same hardware and software components, there are more ways for intruders to attack a VoIP system than a conventional voice telephone system or PBX “ NIST: Considerations for Voice over IP SystemsNIST: Considerations for Voice over IP Systems
  • 5. VoIP Security ComplexityVoIP Security Complexity • Securing a VoIP network is complex because: – VoIP inherits the TCP/IP Vulnerabilitiesinherits the TCP/IP Vulnerabilities. – VoIP uses the corporate networkuses the corporate network to operate. Usually there is no network separation. – Applying security may affect other attributes of VoIPaffect other attributes of VoIP (e.g. Delay, Latency, Jitter). – VoIP usually uses UDP communicationuses UDP communication and thus may not be able to operate on networks that use firewalls. Special proxy techniques like STUNSTUN need to be applied.
  • 6. VoIP ThreatsVoIP Threats • Denial Of ServiceDenial Of Service – Flood Attacks (i.e Controller Flooding) – BYE Tear Down – Registration Reject – Hold Attack – Call Reject • Interception AttacksInterception Attacks – Call Hijacking – Registration Hijacking – Media Session Hijacking – Server Masquerading – DNS Poisoning – Caller ID Spoofing – VoIP VLAN Hopping – ARP Spoofing • Covert ChannelsCovert Channels • WiFi AttacksWiFi Attacks SIP server SIP server Media proxy SIP signaling Media Stream Sniffing (D)DoS attack Wire tapping SPIT
  • 7. VoIP ThreatsVoIP Threats • VoIP Platforms Vulnerabilities – CAN-2004-0056CAN-2004-0056: Malformed H.323 packet to exploit Nortel BCM vulnerabilities – CAN-2004-0054CAN-2004-0054: Exploits CISCO IOS H.323 implementation – CVE-2007-4459CVE-2007-4459: Cisco SIP DoS vulnerabilities. – CVE-2007-6424CVE-2007-6424: Vulnerabilities on the Fonality Trixbox 2.0 PBX products – CVE-2007-5361CVE-2007-5361: Vulnerabilities on the Alcatel- Lucent OmniPCX Enterprise Communication Server. – CVE-2007-5556CVE-2007-5556: Vulnerabilities on the Avaya VoIP Handset.
  • 9. Vlan HoppingVlan Hopping SourceSource:: http://www.securityfocus.com/infocus/1892
  • 10. SIP InjectionSIP Injection UE’s initial Register Request looks like: REGISTER SIP: home1.de SIP/2.0 Username=”user Authorization: Digest Username user_private@home1.de”, realm=”home1.de”, nonce=” “, uri=”SIP: home1.de”, response=” “ Malicious Code infected with SQL injection looks like: REGISTER SIP: home1.de SIP/2.0 Authorization: Digest Username=”user_private@home1.de;delete table users”, realm=”home1.de”, nonce=” “, uri=”SIP: home1.de”, response=” “
  • 11. Hacker’s ToolboxHacker’s Toolbox • OrekaOreka : A cross-platform system for recording and retrieving audio streams • rtpBreakrtpBreak: detects, reconstructs and analyzes any RTP session through heuristics over the UDP network traffic. • SIPCrackSIPCrack : a SIP protocol login cracker • SiVusSiVus : A SIP Vulnerability Scanner. • BYE Teardown:BYE Teardown: disconnect an active VoIP conversation by spoofing the SIP BYE message from the receiving party • SipRogueSipRogue :multifunctional SIP proxy that can be inserted between two talking parties • RTPInjectRTPInject :attack tool that injects arbitrary audio into established RTP connections. • TFTP CrackerTFTP Cracker: A tool to attack VoIP endpoint and copy their configuration through tftp • ILTY(I am Listening to You)ILTY(I am Listening to You) : A multi-channel VoIP Sniffer • Registration AdderRegistration Adder: A tool to allow fake registrations to be send • VoIP HopperVoIP Hopper: Allows to hope from a normal VLAN to the VoIP Vlan
  • 13. 13 WiFi VoIPWiFi VoIP NetStumblerNetStumbler Is used by WarDriversIs used by WarDrivers to detect unprotectedto detect unprotected WiFi NetworksWiFi Networks AirSnortAirSnort Is widely used to attack WEP passwords
  • 14. VoIP CountermeasuresVoIP Countermeasures • Network SeparationNetwork Separation : Although dedicated VoIP VLANs offer a level of security, a dedicate VoIP network will be more secure. • SIP EncryptionSIP Encryption: The TLS protocol can be used to encrypt the SIP messages exchanged between the nodes. TLS provides only Server authentication. S/MIME is another option for SIP encryption. • RTP EncryptionRTP Encryption: Secure RTP(SRTP) can be used to encrypt media in a VoIP network
  • 15. VoIP CountermeasuresVoIP Countermeasures • ManagementManagement: Avoid using weak management protocols like Telnet, tftp and SNMP ver 2. • FirewallsFirewalls: Ensure that VoIP components (i.e. SIP Proxy, DNS, DHCP, Radius) are logically located behind VoIP aware firewalls (e.g. CISCO SIP Extensions for ASA). • IDS/IPSIDS/IPS : The existent IDS/IPS architecture can be extended using SIP Aware Sensors
  • 16. VoIP CountermeasuresVoIP Countermeasures • Hardening the network EnvironmentHardening the network Environment – Enforce Security at the Network Equipment: • Port Security • DHCP Snooping • Receive Access Lists • Enable MAC Filtering • Define the maximum number of MAC addresses per port. • Enable 802.1x for VoIP devices – Use AAA on all VoIP infrastructure Systems – Disable the PC Port on VoIP phone with multiple ports. – Harden the OS of the platforms used • DNZ Zone Transfers • IP to MAC mappings on DHCP • Apply Security Patches / Updates • Disable Telnet and/or r-utilities
  • 17. • VoIP Honeypots – VoIP Phones – Fake SIP Proxies (i.e. Asterix) VoIP CountermeasuresVoIP Countermeasures
  • 22. Being in the MiddleBeing in the Middle • DNSDNS (modify entries to point all traffic to a hacker's machine) • DHCPDHCP (make all traffic go to hackers machine as default gateway, or change DNS entry to point at hacker's machine so all names resolve to hacker's IP address) • ARPARP (reply with hacker's MAC address, gratuitous ARPs or regular ARP replies) • Flood CAMFlood CAM tables in switches to destroy existing MAC addr/port associations so all traffic is broadcast out every port, and then use ARP attacks • Routing protocolsRouting protocols (change routing such that traffic physically passes through a router/machine controlled by hacker) • Spanning tree attacksSpanning tree attacks to change layer 2 forwarding topology • Physical insertionPhysical insertion (e.g. PC with dual NIC cards, be it Ethernet based or WLAN-based)