HackerHalted VoIP Security Uncovered Mark D. Collier Chief Technology Officer SecureLogix Corporation

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
CANTO – 2006 Information Security and Voice over IP (VoIP) Robert Potvin, CISSP VP - Strategic Consulting June 21st, 2006.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
FIREWALLS Chapter 11.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Securing Unified Communications Mor Hezi VP Unified Communications AudioCodes.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.
Network and VoIP Security – More Important Than Ever Mark D. Collier Chief Technology Officer SecureLogix Corporation
System and Network Security Practices COEN 351 E-Commerce Security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Hacking Exposed: VoIP Mark D. Collier Chief Technology Officer
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Hacking Exposed: VoIP Mark D. Collier Chief Technology Officer SecureLogix Corporation
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
COEN 252: Computer Forensics Router Investigation.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
Common Misconceptions Alan D. Percy Director of Market Development The Truth of Enterprise SIP Security.
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
COEN 252 Computer Forensics
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 6: Packet Filtering
Honeypot and Intrusion Detection System
Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Software Security Testing Vinay Srinivasan cell:
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
CHAPTER 9 Sniffing.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Chapter 6 Remote Connectivity and VoIP Hacking Last modified
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Track A: Network Security 9AM-10AM May 6, 2004 Security And Next Generation VoIP George G. McBride Senior Manager, Security Practice Lucent Technologies.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Voice Over IP Security Mark D. Collier Chief Technology Officer SecureLogix Corporation David Endler Director of Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
Chapter 11: It’s a Network
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
Wireless Spoofing Attacks on Mobile Devices
6. Application Software Security
Presentation transcript:

HackerHalted VoIP Security Uncovered Mark D. Collier Chief Technology Officer SecureLogix Corporation

Introduction Gathering Information Attacking the Network Attacking the Application Attacking Vendor Platforms Social Attacks Traditional System Attacks Conclusions and Resources Outline

VoIP systems are vulnerable:  Platforms, networks, and applications are vulnerable  VoIP-specific attacks are becoming more common  Security isn ’ t always a consideration during deployment The threat is increasing:  VoIP deployment is growing  Deployments are critical to business operations  Greater integration with the data network  More attack tools being published  The hacking community is taking notice Introduction Introduction

Internet Connection Internet Voice VLAN Public Voice Network Campus VoIP TDM Trunks TDM Phones IP Phones Data VLAN PCs Most Attacks Originate From The LAN IP PBX CM Gate way DNS CCAdmin TFTP DHCP VM DB

Internet Connection Internet Voice VLAN Public Voice Network SIP Trunks TDM Phones IP Phones Data VLAN PCs Most Attacks Still Originate From The LAN Attacks May Originate From the Public Network IP PBX CM Gate way DNS CCAdmin TFTP DHCP VM DB

First step in gathering information prior to an attack Footprinting does not require network access An enterprise website often contains useful information Google is very good at finding details on the web:  Vendor press releases and case studies  Resumes of VoIP personnel  Mailing lists and user group postings  Web-based VoIP logins Footprinting Gathering Information Footprinting

Footprinting Countermeasures It is difficult to control what is on your enterprise website, but it is a good idea to be aware of what is on it Try to limit amount of detail in job postings Remove technical detail from help desk web pages Be sure to remove any VoIP phones which are visible to the Internet Disable the web servers on your IP phones Gathering Information Footprinting

Process of finding VoIP hosts and running services The first step is gaining access to the network:  Insider access  Malware delivered via , trojan, etc.  Non-secure wireless, modems, etc.  Poorly secured “public” device like a lobby phone  Compromised network device VLANs are pretty easy to overcome  Its possible to hook up a lap top and spoof IP and MAC addresses Scanning Gathering Information Scanning

Once network access is obtained, next step is to scan for VoIP hosts nmap is commonly used for this purpose After hosts are found, scans are used to find running services After hosts are found and ports identified, the type of device can be determined Network stack fingerprinting is a common technique for identifying hosts/devices Scanning Gathering Information Scanning

Scanning Tools Gathering Information Scanning

Scanning Some Well Known Ports SIP enabled devices will usually respond on UDP/TCP ports 5060 and 5061 H.323 devices use multiple ports, including TCP 1720, UDP 1719 SCCP phones (Cisco) use UDP/TCP Unistim (nortel) uses UDP/TCP 5000 MGCP devices use UDP 2427 Sometimes you might see UDP or TCP port (VXWORKS remote debugging!) Gathering Information Scanning

Use firewalls and Intrusion Prevention Systems (IPSs) to detect and block scans Using non-Internet routable IP addresses will prevent external scans VLANs can be used to partition the network Disable unnecessary ports and services on hosts Enable logging if possible Scanning Countermeasures Gathering Information Scanning

Involves testing open ports and services on hosts to gather more information Includes running tools to determine if open services have known vulnerabilities Also involves scanning for VoIP-unique information such as phone numbers Includes gathering information from TFTP servers and SNMP Enumeration Gathering Information Enumeration

Enumeration Vulnerability Scanning Tools Gathering Information Enumeration

Enumeration Vulnerability Scanning Tools Gathering Information Enumeration

Enumeration Directory Scanning Gathering Information Enumeration

Enumeration SNMP SNMP is enabled by default on most IP PBXs and IP phones If you know the device type, you can use snmpwalk with the appropriate OID You can find the OID using Solarwinds MIB Default “passwords”, called community strings, are common Gathering Information Enumeration

Enumeration TFTP Almost all phones use TFTP to download their configuration files The TFTP server is rarely well protected If you know or can guess the name of a configuration or firmware file, you can download it without even specifying a password The files are downloaded in the clear and can be easily sniffed Configuration files have usernames, passwords, IP addresses, etc. in them Gathering Information Enumeration

Enumeration Countermeasures Gathering Information Enumeration Disable unnecessary services Enable logging Upgrade your applications and make sure you continually apply patches Some firewalls and IPSs can detect and mitigate vulnerability scans Use authentication or TLS when using SIP Consider more secure alternatives to TFTP Disable SNMP if not needed. Change community strings.

The VoIP network and supporting infrastructure are vulnerable to attacks VoIP media/audio is particularly susceptible to any DoS attack which introduces latency and jitter Attacks against supporting infrastructure services, such as DHCP, TFTP, DNS, are also possible Any direct attack against a network element (IP PBX, switch, router, gateway, etc.) can affect VoIP service Network DoS Attacking The Network Network DoS

Some types of floods are:  UDP floods  TCP SYN floods  ICMP and Smurf floods  Worm and virus oversubscription side effect  QoS manipulation  Application flooding (INVITE floods, REGISTER floods) Shared links with large amounts of traffic are especially vulnerable Network DoS Flooding Attacks Attacking The Network Network DoS

VoIP systems rely heavily on supporting services such as DHCP, DNS, TFTP, etc. DHCP exhaustion is an example, where a hacker uses up all the IP addresses, denying service to VoIP phones DNS cache poisoning involves tricking a DNS server into using a fake DNS response Network DoS Supporting Infrastructure Attacks Attacking The Network Network DoS

Use QoS to give priority to media and signaling Use rate limiting in network switches A firewall or IPS can be used to detects and blocks attacks Some vendors have DoS support in their products (in newer versions of software) Host based IPS software also provides this capability Maintain patches Configure DHCP servers only lease addresses to known MAC addresses Network DoS Countermeasures Attacking The Network Network DoS

VoIP signaling, media, are vulnerable to eavesdropping Network Eavesdropping Attacking The Network Eavesdropping

Use encryption:  Many vendors offer encryption for signaling  Use the Transport Layer Security (TLS) for signaling  Many vendors offer encryption for media  Use Secure Real-time Transport Protocol (SRTP)  Use ZRTP  Use proprietary encryption if you have to Network Eavesdropping Countermeasures Attacking The Network Eavesdropping

The VoIP network is vulnerable to Man-In-The-Middle (MITM) attacks, allowing:  Eavesdropping on the conversation  Causing a DoS condition  Altering the conversation by omitting, replaying, or inserting media  Redirecting calls Attacks include:  Network-level interception  Application-level interception (registration hijacking) Network Interception Attacking The Network Network Interception

The most common network-level MITM attack is ARP poisoning Involves tricking a host into thinking the MAC address of the attacker is the intended address There are a number of tools available to support ARP poisoning:  Cain and Abel  ettercap  Dsniff  hunt Network Interception ARP Poisoning Attacking The Network Network Interception

Network Interception Countermeasures Attacking The Network Network Interception Some countermeasures for ARP poisoning are:  Static OS mappings  Switch port security  Proper use of VLANs  Signaling encryption/authentication  ARP poisoning detection tools, such as arpwatch

Fuzzing describes attacks where malformed packets are sent to a VoIP system in an attempt to crash it Research has shown that VoIP systems, especially those employing SIP, are vulnerable to fuzzing attacks Fuzzing Attacking The Application Fuzzing

There are many public domain tools available for fuzzing:  Protos suite  Asteroid  Fuzzy Packet  NastySIP Fuzzing Public Domain Tools Attacking The Application Fuzzing  Scapy  SipBomber  SFTF  SIP Proxy  SIPp  SIPsak There are some commercial tools available:  Beyond Security BeStorm  Codenomicon  MuSecurity Mu-4000 Security Analyzer  Security Innovation Hydra

Make sure your vendor has tested their systems for fuzzing attacks An VoIP-aware firewall or IPS can monitor for and block fuzzing attacks Consider running your own tests Fuzzing Countermeasures Attacking The Application Fuzzing

Several tools are available to generate floods at the application layer:  rtpflood – generates a flood of RTP packets  inviteflood – generates a flood of SIP INVITE requests  regflood – generates a flood of SIP REGISTER requests  CRCXflood – generates a flood of MGCP connection requests  SiVuS – a tool which a GUI that enables a variety of flood- based attacks Virtually every device we tested was susceptible to these attacks Attacking The Application Application Floods Application Flood-Based DoS

There are several countermeasures you can use for flood- based DoS:  Use VLANs to separate networks  Use TCP and TLS for SIP connections  Use rate limiting in switches  Enable authentication for requests  Use SIP firewalls/IPSs to monitor and block attacks Flood-Based DoS Countermeasures Attacking The Application Application Floods

In SIP and RTP, there are a number of attacks possible, which exploit the protocols:  Registration removal/addition  Registration hijacking  Redirection attacks  Session teardown  SIP phone reboot  RTP insertion/mixing Attacking The Application Sig/Media Manipulation Signaling/Media Manipulation

Some countermeasures for signaling and media manipulation include:  Use digest authentication where possible  Use TCP and TLS where possible  Use SIP-aware firewalls/IPSs to monitor for and block attacks  Use audio encryption to prevent RTP injection/mixing Attacking The Application Sig/Media Manipulation Signaling/Media Manipulation Countermeasures

The major vendors, including Nortel, Cisco, and Avaya all offer strong security Some default configurations are not as secure as they should be The major vendor systems are vulnerable to the types of attacks described so far The major vendors offer additional security measures – but it is up to the customer to use them Attacking The Platforms Attacking The Platform

The CS1000 is Nortel’s enterprise class PBX Uses VxWorks or RHEL 4 as the operating system Uses Nortel’s proprietary UNIStim protocol for signaling. Can use H.323 and SIP Nortel has the expected set of ports open on their systems Nortel uses TFTP and SNMP Nortel IP Line Fundamentals and Nortel IP Phone Fundamentals are great resources Nortel CS1000 Attacking The Platform Nortel

Nortel Advisories/Exploits Attacking The Platform Nortel Advisories:  CS1000 ELAN Remote Denial of Service Vulnerability  Nortel UNIStim IP Softphone Buffer-Overflow  Nortel IP Phone forced re-authentication  Nortel IP Phone Surveillance Mode Exploit tools:  dial  terminateConnection  pickupPickup  changeDisplay

The Avaya Communication Manager is Avaya’s enterprise- class offering Avaya uses Linux and VxWorks as the underlying operating system on many components Uses H.323 with proprietary extensions for signaling. Can use SIP Avaya has the expected set of ports open on their systems Avaya uses TFTP and SNMP Some great information on their website support.avaya.com/security/ Avaya Communication Manager Attacking The Platform Avaya

Avaya Advisories/Exploits Attacking The Platform Avaya Advisories:  Apache HTTP Server 2.2.6, and 'mod_status' Cross-Site Scripting Vulnerability  PHP Chunk_Split() Function Integer Overflow Vulnerability  Apache Mod_AutoIndex.C Undefined Charset Cross- Site Scripting Vulnerability Exploits:  Vnak  H22regreject

The Cisco Unified Call Manager is Cisco’s enterprise class offering Version 4.1 is based on Windows. Versions 5.x and 6.x are based on Linux Uses SCCP (skinny) for signaling. Also uses H.323 and MGCP and can use SIP Cisco has the expected set of ports open on their systems Cisco TFTP and SNMP A Must Read Document is the Solution Reference Network Design (SRND) for Voice communications Cisco Unified Call Manager Attacking The Platform Avaya

Cisco integrates media gateway functionality into routers Cisco media gateways use MGCP or H.323 MGCP uses UDP port 2427 and is susceptible to a range of attacks including DoS H.323 is susceptible to a range of attacks including toll fraud, which is not visible to the Call Manager Attacks against media gateways can affect all external traffic and/or generate large amounts of toll fraud Attacking The Platform Cisco Cisco Media Gateways

Cisco Advisories/Exploits Attacking The Platform Cisco Advisories:  CUCM SQL Injection and Cross-Site Scripting Vulnerabilities  CUCM and Openser SIP Remote Unauthorized Access Vulnerability  CUCM Remote Denial of Service and Buffer Overflow Vulnerabilities  CUCM CTL Provider Heap Buffer Overflow Vulnerability

Voice SPAM refers to bulk, automatically generated, unsolicited phone calls Similar to telemarketing, but occurring at the frequency of SPAM Not an issue yet, but will become prevalent when:  The network makes it very inexpensive or free to generate calls  Attackers have access to VoIP networks that allow generation of a large number of calls It is easy to set up a voice SPAM operation, using Asterisk, tools like “spitter”, and free VoIP access Voice SPAM Social Attacks Voice SPAM

Some potential countermeasures for voice SPAM are:  Authenticated identity movements, which may help to identify callers  Legal measures Enterprise voice SPAM filters:  Black lists/white lists  Approval systems  Audio content filtering  Turing tests Voice SPAM Countermeasures Social Attacks Voice SPAM

VoIP Phishing Similar to phishing, but with a phone number delivered though or voice When the victim dials the number, the recording requests entry of personal information Social Attacks Phishing

VoIP Phishing Countermeasures Traditional spam/phishing countermeasures come in to play here. Educating users is a key Social Attacks Phishing

Legacy systems still account for approximately 90% of enterprise handsets Legacy public trunks still account for approximately 99% of public access Legacy issues are still common and many do not “go away” with VoIP Common issues include:  Unauthorized and poorly secured modems  Toll fraud Traditional System Attacks

Unauthorized modems are very common Users connect analog lines to PCs with modems and have unmonitored access to the Internet Poorly secured, authorized modems are also common Many critical PBXs are managed via modems Traditional System Attacks Modem Issues Traditional System Attacks

Despite lower rates, toll fraud remains a major issue, especially for international calls Toll fraud does not go away with VoIP As covered earlier, toll fraud can actually be easier to enact with VoIP systems Traditional System Attacks Toll Fraud Traditional System Attacks

Class restrictions in PBXs can help, but are unique to each system Firewalls such as those provided by the SecureLogix ETM System can detect and mitigate these attacks Traditional System Attacks Countermeasures Traditional System Attacks

The most prevalent threats to VoIP deployments today are denial of service, and hacking of the underlying and supporting infrastructure The major IP PBX vendors can be secured, but security has to be considered during deployments It’s important to consider your existing network security posture first before adding VoIP components A VoIP security assessment and penetration test will help identify vulnerabilities Don’t ignore legacy threats – they are much more common than VoIP threats right now Conclusions

Conclusions Some Resources