Chapter 6 Remote Connectivity and VoIP Hacking Last modified 3-19-09.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Internet Security CSCE 813 Network Access Layer Security Protocols.
WAN Technologies Dial-up modem connections Cheap Slow
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
K. Salah 1 Chapter 28 VoIP or IP Telephony. K. Salah 2 VoIP Architecture and Protocols Uses one of the two multimedia protocols SIP (Session Initiation.
COEN 252: Computer Forensics Router Investigation.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
NetComm Wireless VPN Functionality Feature Spotlight.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Copyright Security-Assessment.com 2005 VoIP 2 Is free too Expensive? by Darren Bilby and Nick von Dadelszen.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Software Security Testing Vinay Srinivasan cell:
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
Tunneling and Securing TCP Services Nathan Green.
Remote Connectivity and VoIP Hacking
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Communication Methods
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Protocols and the TCP/IP Suite Overview and Discussion
Virtual Private Networks
Remote Connectivity and VoIP Hacking
Virtual Private Networks (VPN)
Presentation transcript:

Chapter 6 Remote Connectivity and VoIP Hacking Last modified

Virtual Private Network (VPN) Hacking

Virtual Private Network (VPN) A VPN connects two computers securely over an insecure network (usually the Internet), using tunneling Internet Physical connection Logical connection

Tunneling An Ethernet frame is encapsulated in an IP packet, so it can be sent over the Internet –It can be done with other protocols too Usually the frame is also encrypted, so that only the intended recipient can read it The end result is like you used a long cable to connect the two computers

Cost Savings You could use a T-1 line or a POTS phone call with a modem, to make a secure connection between two computers But a VPN is much cheaper, requiring only an Internet connection at each end

VPN Standards The modern way –IP Security (IPSec) and the Layer 2 Tunneling Protocol (L2TP) Older techniques –Point-to-Point Tunneling Protocol (PPTP) Microsoft proprietary –Layer 2 Forwarding (L2F) An obsolete Cisco protocol For more details, see link Ch 611

Breaking Microsoft PPTP Microsoft's secure authentication protocol, MS- CHAP, uses LM Hashes –Easily cracked with Ophcrack Session keys and encryption are poorly implemented and vulnerable to attacks The control channel is open to snooping and denial of service PPTP clients could act as a backdoor into the network –See links Ch 612 & 613

Fixing PPTP Microsoft patched PPTP in Win NT Service Pack 4 by using MS-CHAPv2 –And it's really much better (link Ch 614) Win 2000 and later also offer IPSec and L2TP, which is safer –"In our opinion, IPSec is too complex to be secure" -- Schneier and Ferguson (link Ch 615) –But it's the best IP security available now

Google Hacking for VPN Search for filetype:pcf Stored profile settings for the Cisco VPN client You get encrypted passwords in this file –I truncated the hash in this example

Cracking VPN Password with Cain It cracked instantly for me –Password removed from figure The encryption is easily reversed –Link Ch 625, 627

Attacking IKE IPSec VPNs use Internet Key Exchange (IKE) to establish the session The faster, less secure, "Aggressive mode" IKE is vulnerable to an offline brute force attack Tool: IKECrack (link Ch 626)

Voice Over IP (VoIP) Attacks

Voice over IP (VoIP) Voice on an IP Network Most VoIP solutions rely on multiple protocols, at least one for signaling and one for transport of the encoded voice traffic The two most common signaling protocols are H.323 and Session Initiation Protocol (SIP) –Their role is to manage call setup, modification, and closing

H.323 H.323 is a suite of protocols –Defined by the International Telecommunication Union (ITU –The deployed base is larger than SIP –Encoding is ASN.1 – different than text, a bit like C++ Data Structures (link Ch 618) –Designed to make integration with the public switched telephone network (PSTN) easier

Session Initiation Protocol (SIP) The Internet Engineering Task Force (IETF) protocol People are migrating from H.323 to SIP Used to signal voice traffic, and also other data like instant messaging (IM) Similar to the HTTP protocol The encoding is text (UTF8) SIP uses port 5060 (TCP/UDP) for communication

Real-time Transport Protocol (RTP) Transports the encoded voice traffic Control channel for RTP is provided by the Real-time Control Protocol (RTCP) Consists mainly of quality of service (QoS) information (delay, packet loss, jitter, and so on) –Timing is more critical for VoIP than other IP traffic

Most Common VoIP Attacks Denial of Service –Send a lot of SIP INVITE packets, initiating calls –Flood a phone with unwanted IP traffic Spoofing the CLID (Caller ID) –Swatting is a popular and dangerous attack, spoofing caller ID and calling police (link Ch 619) Injecting data into an established call

Most Common VoIP Attacks Altering the phone's configuration –Connect to the phone via Telnet or HTTP –Sometimes no password is needed –Or upload malicious code with your own DHCP and TFTP servers When a phone boots, it can upload updated firmware with TFTP

Most Common VoIP Attacks Attacking though services linked to VoIP –Advanced voic –Instant messaging –Calendar services –User management Attacks may use XSS (cross-site scripting), client-side JavaScript alteration, SQL injection, and so on

Most Common VoIP Attacks Accessing repository of recorded calls Making free calls through a company's VoIP-to-PSTN gateway

Interception Attack Sniff the IP Packets –With ARP poisoning Attacker is set to route traffic, but not decrement the TTL

Captured RTP Traffic It's compressed with a codec Common codecs – G.711 (uses up a lot of bandwidth) –G.729 (uses less bandwidth)

VOMIT vomit - voice over misconfigured internet telephones –Converts G.711 to WAV –It works because many IP phones don't or can't encrypt traffic –Link Ch 620 Scapy is an even better tool, plays traffic from eth0 right out the speakers –Link Ch 621

Interception Countermeasures Turn on the security features available for your phones, such as encryption They are often left turned off, to get higher quality or just through laziness

VoIP Projects Project 16: VoIP –Set up a free Windows-based VoIP server –Install a free software phone –Sniff RTP streams with Wireshark and replay them Project 17: Fuzzing X-Lite with VoIPer Project 18: SIPVicious scanning 3CX and Asterix PBX Servers