Top Banner
Copyright Security-Assessment.com 2004 Security-Assessment .com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby
15

Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Dec 29, 2015

Download

Documents

Adam Johnston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Hacking VoIP

Is your Conversation confidential?

by Nick von Dadelszen and Darren Bilby

Page 2: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

VoIP Trends

• VOIP becoming more popular and will increase in future

• Many ISPs and Teleco’s starting to offer VoIP services

• Like most other phone calls, it is presumed to be confidential

Page 3: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Types of Phones

• SoftPhone

• HardPhone

Page 4: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Typical VoIP Architecture

Page 5: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Attacks Against VoIP

• Multiple attack avenues:

– Standard traffic capture attacks

– Bootp attacks

– Phone-based vulnerabilities

– Management interface attacks

Page 6: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Consequences of Attacks

• Consequences of VoIP attacks include:

– Listening or recording phone calls

– Injecting content into phone calls

– Spoofing caller ID

– Crashing phones

– Denying phone service

– VoIP Spamming

Page 7: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

VoIP Protocols

• H.323

– Earlier protocol used, though still used today

– Provides for encryption and authentication of data

• SIP

– Digest authentication based on HTTP, but many times not enabled

– No encryption

• MGCP

– Relies on IPSEC for security, but most current phones don’t support IPSEC

Page 8: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Use of VLANS

• Cisco recommends separate VLANs for data and voice traffic

• To ease implementation, many phones allow sharing of network connections with desktop PCs

• VoIP allows the use of SoftPhones installed on desktop PCs

• Therefore cannot separate voice traffic from the rest of the network

Page 9: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Capturing VoIP Data

• Ethereal has built-in support for some VoIP protocols

• Has the ability to capture VoIP traffic

• Can dump some forms of VoIP traffic directly to WAV files.

Page 10: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Page 11: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Page 12: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Audio Capture

Page 13: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Other Tools

• Vomit

– Injects wave files into VoIP conversations

• Tourettes

– Written by a staff member of a customer for fun

– Injects random swear words into a conversation

Page 14: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Example Phone Exploit

• CAN-2002-0769

• Cisco ATA-186 Web interface could reveal sensitive information

• Sending a POST request consisting of one byte to the HTTP interface of the adapter reveals the full configuration of the phone, including administrator password

• IP Phones – Another thing to patch!

Page 15: Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.

Copyright Security-Assessment.com 2004

Security-Assessment.com

Caller ID Spoofing

• Caller ID is based on a Calling Party Number (CPN)

• This is always sent when a call is placed

• A privacy flag tells the receiver whether to show the number or not

• Have always been able to spoof Caller ID but needed expensive PBX equipment to do so.

• With VoIP PBX software, spoofing is easier

• Has repercussions for phone authentication