Copyright Security-Assessment.com 2005 Voice over IP What You Don’t Know Can Hurt You by Darren Bilby.

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Secure Mobile IP Communication
CANTO – 2006 Information Security and Voice over IP (VoIP) Robert Potvin, CISSP VP - Strategic Consulting June 21st, 2006.
BAI613 Module 2 - Voice over IP Technology. Module Objectives 1. Describe the benefits of IP Telephony/Packet Telephony/VoIP over traditional telephone.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
Guide to Network Defense and Countermeasures Second Edition
1 Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture Conference ICS – Wireless Group Meeting Tempe, Arizona.
SIP Security & the Future of VoIP Nate Klingenstein APAN 26 Queenstown August 5, ~ndk/apanSIP.pdf.
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Introducing VoIP Networks Chapter 01 Components of a VoIP Network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Voice over Internet Protocol (VoIP) Training and Development.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
COEN 252: Computer Forensics Router Investigation.
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
Securing your IP based Phone System By Kevin Moroz VP Technology Snom Inc.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Copyright Security-Assessment.com 2005 Voice over IP VoIP (In) Security Presented by Darren Bilby NZISF 14 July 2005.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Copyright Security-Assessment.com 2005 VoIP 2 Is free too Expensive? by Darren Bilby and Nick von Dadelszen.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
VoIP Voice over Internet Protocol
MAEDS 45 th Annual Conference October , 2009.
Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
Remote Connectivity and VoIP Hacking
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Voice over IP B 林與絜.
Securing Open Source Enterprise VoIP Christian Stredicke/snom.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
MWIF Confidential MWIF-Arch Security Task Force Task 5: Security for Signaling July 11, 2001 Baba, Shinichi Ready for MWIF Kansas.
Security fundamentals Topic 10 Securing the network perimeter.
Voice Over IP (VoIP): Internet Telephony Dr. Najla Al-nabhan 1.
Chapter 6 Remote Connectivity and VoIP Hacking Last modified
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Voice Over IP (VoIP): Internet Telephony. Chapter Objectives.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Security fundamentals
Fortinet VoIP Security June 2007 Carl Windsor.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
Virtual Private Networks
Working at a Small-to-Medium Business or ISP – Chapter 8
SIX MONTHS INDUSTRIAL TRAINING REPORT
Security of a Local Area Network
Remote Connectivity and VoIP Hacking
Lecture 5: Voice Over IP (VoIP): Internet Telephony
Presentation transcript:

Copyright Security-Assessment.com 2005 Voice over IP What You Don’t Know Can Hurt You by Darren Bilby

Copyright Security-Assessment.com 2005 What is VoIP? Voice over Internet Protocol “A method for taking analog audio signals, like the kind you hear when you talk on the phone, and turning them into digital data that can be transmitted over the Internet. “ Also known as: – Voice over Packet (VoP) – IP Telephony (IPT)

Copyright Security-Assessment.com 2005 VoIP Trends VOIP becoming more popular and will increase in future Many ISPs and Telco’s starting to offer VoIP services Like most other phone calls, it is presumed to be confidential Designed by telephone people with trusted networks in mind

Copyright Security-Assessment.com 2005 Different Types of VoIP There are many different implementations of VoIP: – MSN – Firefly – Skype – Office Phone Replacements – Push to Talk – Ihug Connect – Slingshot iTalk Different technologies, but most of these do not have security built-in.

Copyright Security-Assessment.com 2005 Components of a VoIP Implementation Client Voice Gateway Support Servers – Voic , Proxies, Management Servers

Copyright Security-Assessment.com 2005 VoIP Clients Hard Phone Soft Phone Analog Telephone Adaptor (ATA)

Copyright Security-Assessment.com 2005 Protocols and Acronyms

Copyright Security-Assessment.com 2005 Protocols and Acronyms Signaling Protocol – Create, modify, and terminate sessions with participants – Conferences – Proxies – Authentication Transport Protocol – Actually sends the data

Copyright Security-Assessment.com 2005 Protocols and Acronyms ITU H.323 – One of the earliest sets of VoIP standards – Handles voice, video, and data conferencing – Some limitations, but most VoIP traffic utilises this today Session Initiation Protocol (SIP) – Signaling protocol – RFC 3261 – Currently most favored protocol for new systems Realtime Transport Protocol (RTP/RTCP) – Used for media transfer by other protocols – Fast, scaleable and efficient – RTCP manages the call – RTP is the voice data

Copyright Security-Assessment.com 2005 Protocols and Acronyms SCCP (Skinny) – Cisco signaling and control protocol – Open standard IAX/IAX2 – Signaling and control protocol – Designed by Asterisk open source project – Handles NAT and Firewalls cleanly MGCP (Media Gateway Control Protocol) – Signaling and control protocol – Reduce traffic between gateways

Copyright Security-Assessment.com 2005 Why is VoIP Security a Problem? Pranks Eavesdropping and Recording Phone Calls Track Calls Stealing Confidential Information Modifying Phone Calls Making Free Phone Calls Board Room Bugging Sending Spam

Copyright Security-Assessment.com 2005 VoIP Security Scenarios

Copyright Security-Assessment.com 2005 Scenario 1 – Industrial Information Gathering Employee uses the VOIP network to listen to the managing director’s phone calls Gains access to personal details Forwards information about business deals to competitors

Copyright Security-Assessment.com 2005 Demo Cain – Voice over Misconfigured IP Telephony (Vomit) –

Copyright Security-Assessment.com 2005 Scenario 2 – The Fraud Employee uses ARP redirection in a large office to record all voice conversations Leaves it recording and logging for a week Then uses DTMF decoder to get access to other employees bank details, voice mailboxes etc Phone banking Voice Mail

Copyright Security-Assessment.com 2005 Scenario 3 – The Industrial Spy Evil Russian hacker is hired by a competitor to gain knowledge of business strategies. Hacker sends secretary a link to FunnyGame.exe, pretending to be an associate. Hacker sets boardroom IP phone in speakerphone mode, and calls a phone he controls thus recording boardroom meetings.

Copyright Security-Assessment.com 2005 Scenario 4 – Hacking Phones with IE Phones are standard IP devices – HTTP, Telnet, SNMP There are vulnerabilities in these devices Password security Hacker scans the Internet looking for vulnerable phones Hacker then uses the phones to call 0900 numbers which she gets paid for

Copyright Security-Assessment.com 2005 Demo

Copyright Security-Assessment.com 2005 Okay… So How Do We Secure It? Secure the Devices Network Segregation Encrypt the Traffic Intrusion Detection

Copyright Security-Assessment.com 2005 Secure the Devices

Copyright Security-Assessment.com 2005 Secure the Devices Don’t expose anything to the Internet that doesn’t need to be! Patch and secure VoIP servers Patch phones Train your telephony staff in security practice This is a really bad idea!

Copyright Security-Assessment.com 2005 Network Segregation

Copyright Security-Assessment.com 2005 Network Segregation Problem: Malicious devices can sniff voice traffic ↓ Use switches ↓ Hacker can use ARP redirection or MAC overflow to turn switch into HUB ↓ Use separate Voice and Data VLANS – Management overhead ↓ Put a HUB in the phone ↓ Now we can’t VLAN ↓ Make phone smarter, teach it about VLAN’s ↓ Hacker can now attack any VLAN from his phone port. But safe from remote attackers

Copyright Security-Assessment.com 2005 Network Segregation

Copyright Security-Assessment.com 2005 Network Segregation Try to stop malicious connections to your network – Disable switch ports not in use – Restrict access to switch by MAC address – Implement Sticky MAC All have management overhead and are not really secure

Copyright Security-Assessment.com 2005 Network Segregation Firewalls, Routers and Smart Switches Use Voice VLAN Only allow the required traffic from one interface to another Reduce DoS risk Integrated solutions eg Cisco

Copyright Security-Assessment.com 2005 Encrypt the Traffic

Copyright Security-Assessment.com 2005 Encrypt the Traffic Wrap an insecure protocol in a secure one – IPSEC – Other VPN Use a secure protocol – Secure Call Setup eg SIP TLS – SRTP – Cisco designed protocol for encrypting RTP traffic

Copyright Security-Assessment.com 2005 SRTP - Secure Real-time Transport Protocol RTP/RTCP extension End to End Designed by Cisco IETF RFC 3711 Adds – Confidentiality (AES128) – Message authentication (HMAC-SHA1) – Replay protection Doesn’t effect compression or QoS Scales well

Copyright Security-Assessment.com 2005 Encryption Requires Authentication SRTP Does not define authentication – Pre Shared Keys – Custom SIP headers – MIKEY (Multimedia Internet KEYing) – Certificates preloaded on phones

Copyright Security-Assessment.com 2005 SRTP – Can I Use It? Currently known support by Sipura, Zultys, Avaya and Cisco Cisco support on Call Manager 4.0 Currently only high end phones 7940, 7960 and 7970

Copyright Security-Assessment.com 2005 Intrusion Detection

Copyright Security-Assessment.com 2005 Intrusion Detection Benefits of VLAN – IDS monitoring can be accurate – Very limited traffic on the network ARP Inspection at a minimum

Copyright Security-Assessment.com 2005 Securing VoIP Summary Secure Phones and Management Devices Segregate your network using VLANs and firewalls Only buy devices that support SRTP and push your vendors for support Use Intrusion Detection where possible Consider VoIP security overhead before deciding

Copyright Security-Assessment.com 2005 Other VoIP Issues

Copyright Security-Assessment.com 2005 Other VoIP Issues - Caller ID Spoofing CID is often used for authentication – Voic systems Makes social engineering a lot easier But, high barrier to entry: – Access to direct connection with Telco eg E1 – Access to misconfigured VoIP provider Multiple companies are now offering caller ID spoofing: - CovertCall- PI Phone - Star38- Us Tracers - Camophone- Telespoof

Copyright Security-Assessment.com 2005 Skype

Copyright Security-Assessment.com 2005 Other VoIP Issues - Skype Proprietary VOIP system for calls over the Internet Free and simple to use Developed by the creators of KaZaA NAT and Firewall traversal File transfer

Copyright Security-Assessment.com 2005 Other VoIP Issues - Skype Ref: "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol“ Salman A. Baset and Henning Schulzrinne

Copyright Security-Assessment.com 2005 Skype Security Concerns Claims AES 128bit encryption - unverifiable Skype may have the ability to decrypt all voice traffic Same developers as KaZaA, known for spyware Cannot stop client becoming a Supernode Client allows file transfer, even through firewalls, an access path for malicious code, information leakage Client can update itself automatically

Copyright Security-Assessment.com 2005 Good Sites For Learning More Some good links for learning more about VoIP – Voip-Info.org – VoP Security – Cain and Abelhttp:// – Vomit