際際滷

際際滷Share a Scribd company logo
VOIP SECURITY IS DEAD!
George Wahome
Who am I?
 Information & Network Security Consultant
 BSc. Computer Science & Technology
 C|EH, CISA, CCNA Security, etc..
 Projects: 15+ across over 9+ countries and
sites in Africa.LinkedIn can list the rest
Security and Privacy of our Voice Communication is Neglected !!!
Borderless, Connected and Communicating through VoIP
Q & A
How it is..
 Using IP for voice calls is awesome, cheap and
easy to deploy
 As long as it is not broken, dont fix it!!
 VoIP Servers are deployed with misconfigurations
 Users put weak passwords for their extensions
 Ex. FreePBX has 1M systems and 20,000 monthly
installs
Impact  Examples of companies
LOSS : 2M
DETECT: 1 Month
LOSS : 4M
DETECT: Upon Billing
LOSS : 8M
DETECT: 2 Months (Billing)
LOSS : 12M in 48 hours
DETECT: 1 Week
LOSS : 8M in 4 Days
DETECT: Alert from
Service Provider
1
2
3 4
5
Rule of the Thumb
 Rule: Anything connected to the
internet can get hacked
 If you dont pay attention to
security you will get what you
deserve!!
 Motivation: Money is to be made and/or get a free
service across international boundaries with virtually
no repercussions for the culprits
VoIP Architecture
 Online VoIP
Provider
 VoIP Self
Hosting
 ISP Hosted
VoIP
What can be done?
 Disruption of operations
 Harassment of individuals
 Spoof - Steal minutes/ access so as to resell it and make money
(toll fraud)
 Generate traffic to a premium number to make money
 Social engineer systems or agents; Make calls & trick users into
calling back and giving personal information
 Merchandize services e.g. SPAM over Internet Telephony (SPIT)
 Listen to and record key conversations & video sessions
(Eavesdropping)
 Modify/ manipulate conversations to embarrass, annoy, trick
users etc.
DEMO
We will Demo.
 Targets Recon; Foot printing & Enumeration
 Locate valid SIP extensions
 Crack Ext passwords (Bruteforce)
 Compromise Call Manager (Command-line)
 Caller ID Spoofing
 Eavesdropping (voice mail) & Traffic Monitoring
 Access web administration interface
 MiMT - Call Recording & Listening
Targets Landscape
 VoIP Server
(Virtual) + 5 VoIP
Phones
Mitigations
 Use of TLS + SRTP
 Hardening of VoIP Server
 Implement Perimeter Security + ACL
 Users to put non-default PIN for Login ID and
Voicemail access
Q & A

More Related Content

Voip (In)Security - AfricaHackOn v2

  • 1. VOIP SECURITY IS DEAD! George Wahome
  • 2. Who am I? Information & Network Security Consultant BSc. Computer Science & Technology C|EH, CISA, CCNA Security, etc.. Projects: 15+ across over 9+ countries and sites in Africa.LinkedIn can list the rest
  • 3. Security and Privacy of our Voice Communication is Neglected !!! Borderless, Connected and Communicating through VoIP
  • 5. How it is.. Using IP for voice calls is awesome, cheap and easy to deploy As long as it is not broken, dont fix it!! VoIP Servers are deployed with misconfigurations Users put weak passwords for their extensions Ex. FreePBX has 1M systems and 20,000 monthly installs
  • 6. Impact Examples of companies LOSS : 2M DETECT: 1 Month LOSS : 4M DETECT: Upon Billing LOSS : 8M DETECT: 2 Months (Billing) LOSS : 12M in 48 hours DETECT: 1 Week LOSS : 8M in 4 Days DETECT: Alert from Service Provider 1 2 3 4 5
  • 7. Rule of the Thumb Rule: Anything connected to the internet can get hacked If you dont pay attention to security you will get what you deserve!! Motivation: Money is to be made and/or get a free service across international boundaries with virtually no repercussions for the culprits
  • 8. VoIP Architecture Online VoIP Provider VoIP Self Hosting ISP Hosted VoIP
  • 9. What can be done? Disruption of operations Harassment of individuals Spoof - Steal minutes/ access so as to resell it and make money (toll fraud) Generate traffic to a premium number to make money Social engineer systems or agents; Make calls & trick users into calling back and giving personal information Merchandize services e.g. SPAM over Internet Telephony (SPIT) Listen to and record key conversations & video sessions (Eavesdropping) Modify/ manipulate conversations to embarrass, annoy, trick users etc.
  • 10. DEMO
  • 11. We will Demo. Targets Recon; Foot printing & Enumeration Locate valid SIP extensions Crack Ext passwords (Bruteforce) Compromise Call Manager (Command-line) Caller ID Spoofing Eavesdropping (voice mail) & Traffic Monitoring Access web administration interface MiMT - Call Recording & Listening
  • 12. Targets Landscape VoIP Server (Virtual) + 5 VoIP Phones
  • 13. Mitigations Use of TLS + SRTP Hardening of VoIP Server Implement Perimeter Security + ACL Users to put non-default PIN for Login ID and Voicemail access
  • 14. Q & A