24
© Sense of Security 2007 www.senseofsecurity.com 1 AusCERT - May 2007 VoIP: Attacks & Countermeasures in the Corporate World VoIP: Attacks & Countermeasures in the Corporate World

Voip Security 2007 v1 0 Final 090724001214 Phpapp01

Embed Size (px)

Citation preview

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 1/24

© Sense of Security 2007 www.senseofsecurity.com1 AusCERT - May 2007

VoIP:

Attacks & Countermeasuresin the Corporate World

VoIP:

Attacks & Countermeasuresin the Corporate World

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 2/24

© Sense of Security 2007 www.senseofsecurity.com2 AusCERT - May 2007

VoIP Security

Agenda

• Introduction

• Typical VoIP Network Architecture

• Anatomy of VoIP Attacks

• Demo of a few VoIP Attacks

• Countermeasures

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 3/24

© Sense of Security 2007 www.senseofsecurity.com3 AusCERT - May 2007

VoIP Security

Introduction

• Historically trends and advances in IT outpace securityrequirements. e.g. 802.11 Wireless. VoIP is the same.

• Tools are becoming more readily available.

• Many of the threats against VoIP are the same threatsinherited from the data networking world.

e.g. eavesdropping, mitm, replay etc.

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 4/24

© Sense of Security 2007 www.senseofsecurity.com4 AusCERT - May 2007

VoIP Security

Key Threats

• Denial of Service

– attacks against availability

• Eavesdropping

- unauthorised interception of voice packets

• Impersonation

– masquerading as a handset or a piece of VoIP infrastructure

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 5/24

© Sense of Security 2007 www.senseofsecurity.com5 AusCERT - May 2007

VoIP Security

Disclaimer

The techniques demonstrated are not vendor specific.

Our attacks are against an “out of the box” or “default”implementation of VoIP.

We are not responsible for what you do with the tools andtechniques demonstrated!

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 6/24

© Sense of Security 2007 www.senseofsecurity.com6 AusCERT - May 2007

VoIP Security

Typical Cisco VoIP Implementation

UTILSTAT

DUPLEX

SPEED

SYSTEM

RPS

CATALYST 35503

4

5

6

7

8

9

10

11

12

1

2

15

16

17

18

19

20

21

22

23

24

13

14

1 2

Cisco Call Manager 

v4.X

IP Phone #1

x 1000

IP Phone #3

x 3000

IP Phone #2

x 2000

Voice

VLAN 6

Data

VLAN 2

1 2  ABC 

3 DEF 

4 5  JKL 6 MNOGHI 

7 8 TUV 

9WXYZ  PQRS 

* 0 

OPER# 

?

+-

7941SERIESCISCOIPPHONE

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 7/24

© Sense of Security 2007 www.senseofsecurity.com7 AusCERT - May 2007

VoIP Security

Anatomy of Attack – Impersonation

• Step 1: Determine MAC address of handset

• Step 2: Change MAC address on PC

• Step 3: Use Softphone to make a call as that extension

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 8/24

© Sense of Security 2007 www.senseofsecurity.com8 AusCERT - May 2007

VoIP Security

Anatomy of Attack - Eavesdropping

• Step 1: Gather initial information

• Step 2: Get access to voice VLAN

• Step 3: Locate phone targets

• Step 4: Execute ARP poisoning attack and record voice call

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 9/24

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 10/24

© Sense of Security 2007 www.senseofsecurity.com10 AusCERT - May 2007

VoIP Security

• Plug into the PC port and sniff!

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 11/24

© Sense of Security 2007 www.senseofsecurity.com11 AusCERT - May 2007

VoIP Security

Get on the Voice Network

• Use the info we have gathered to get on the Voice VLAN.

• Configure the network adapter to tag all ethernet frameswith the voice VLAN.

• Voila! We are on the voice VLAN.

• Now we can attack any system on the voice network.

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 12/24

© Sense of Security 2007 www.senseofsecurity.com12 AusCERT - May 2007

UTIL

STAT

DUPLEX

SPEED

SYSTEM

RPS

CATALYST 35503

4

5

6

7

8

9

10

11

12

1

2

15

16

17

18

19

20

21

22

23

24

13

14

1 2

VoIP Security

MITM Attack – ARP Theory

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 13/24

© Sense of Security 2007 www.senseofsecurity.com13 AusCERT - May 2007

Attackers PC

IP: 10.6.0.40

MAC: D

VoIP Security

MITM Attack - ARP Poisoning Theory

UTIL

STAT

DUPLEX

SPEED

SYSTEM

RPS

CATALYST 35503

4

5

6

7

8

9

10

11

12

1

2

15

16

17

18

19

20

21

22

23

24

13

14

1 2

IP Phone #3

IP: 10.6.0.30

MAC: C

IP Phone #2

IP: 10.6.0.20

MAC: B

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 14/24

© Sense of Security 2007 www.senseofsecurity.com14 AusCERT - May 2007

VoIP Security

MITM Attack – Execution

• Start Cain & Abel and configure ARP poisoning.• Cain & Abel also has the capability to record a call.

• Sit back and wait!

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 15/24

© Sense of Security 2007 www.senseofsecurity.com15 AusCERT - May 2007

VoIP Security

Game Over!

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 16/24

© Sense of Security 2007 www.senseofsecurity.com16 AusCERT - May 2007

VoIP Security

Some Attack Possibilities..

• Telephone banking / Voicemail PIN disclosure

• Insertion of audio into conversation

• Real-time voicemail capture

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 17/24

© Sense of Security 2007 www.senseofsecurity.com17 AusCERT - May 2007

VoIP Security

Compromising the PIN

• Telephone banking requires a user to enter a customernumber and PIN using the touchpad.

• Each number pressed sends a unique tone which is

interpreted by the end system.

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 18/24

© Sense of Security 2007 www.senseofsecurity.com18 AusCERT - May 2007

VoIP Security

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 19/24

© Sense of Security 2007 www.senseofsecurity.com19 AusCERT - May 2007

VoIP Security

• But which buttons were pressed?

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 20/24

© Sense of Security 2007 www.senseofsecurity.com20 AusCERT - May 2007

VoIP Security

Countermeasures

Cisco Switch:• Enable DHCP Snooping

• Enable Dynamic ARP Inspection

• Enable IP Sourceguard• Enable Port Security

• Implement VLAN ACLs

• Implement 802.1x

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 21/24

© Sense of Security 2007 www.senseofsecurity.com21 AusCERT - May 2007

VoIP Security

Countermeasures (cont.d)

Cisco Call Manager: (Not without some side effects!)• Disable Settings button on phone

• Disable Span to PC port

• Disable Gratuitous ARP• Disable PC Voice VLAN Access

• Configure Signaling & Media Encryption!

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 22/24

© Sense of Security 2007 www.senseofsecurity.com22 AusCERT - May 2007

VoIP Security

How Real is the Threat in Australia?

• One Australian organisation suffers a major telephone hack

each and every day.

• AusCERT Computer Crime and Security Survey 2006 showsaverage value of loss of over $60,000.

• The largest phone hack on record is $1.7M.• 97% not reported due to risk of adverse publicity.

• Threat to phone service - how would your business cope

without phones for an entire day?• Telstra, Optus and Macquarie Telecom have written to

clients warning of the dangers and confirming the customeris liable.

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 23/24

© Sense of Security 2007 www.senseofsecurity.com23 AusCERT - May 2007

VoIP Security

Conclusion

• Most current implementations of VoIP are insecure.• VoIP can be secured with the right know how.

• The only way to know if your implementation is secure is

to have it audited by independent experts.

8/4/2019 Voip Security 2007 v1 0 Final 090724001214 Phpapp01

http://slidepdf.com/reader/full/voip-security-2007-v1-0-final-090724001214-phpapp01 24/24

© Sense of Security 2007 www.senseofsecurity.com24 AusCERT - May 2007

VoIP Security

Questions?

Contact:

Jason Edelstein

T: +61 2 9290 4441

E: [email protected]

www.senseofsecurity.com.au