SlideShare a Scribd company logo
VoIP Wars: 
Attack of the Cisco Phones 
Compliance, Protection & Business Confidence 
Sense of Security Pty Ltd 
! 
Sydney 
Level 8, 66 King Street 
Sydney NSW 2000 Australia 
Melbourne 
Level 10, 401 Docklands Drv 
Docklands VIC 3008 Australia 
T: 1300 922 923 
T: +61 (0) 2 9290 4444 
F: +61 (0) 2 9290 4455 
info@senseofsecurity.com.au 
www.senseofsecurity.com.au 
ABN: 14 098 237 908 
www.senseofsecurity.com.au © Sense of Security 2013 Page ‹#› – 13-Sep-13
Speaker 
• Fatih Ozavci 
• Senior Security Consultant 
• Interests 
• VoIP 
• Mobile Applications 
• Network Infrastructure 
! 
• Author of Viproy VoIP Penetration Testing Kit 
• Public Speaker 
• Defcon, BlackHat Arsenal, AusCert, Ruxcon 
www.senseofsecurity.com.au © Sense of Security 2014 Page 2 
of 60 – Aug-14
Viproy VoIP Toolkit 
• Viproy is a Vulcan-ish Word that means "Call" 
• Viproy VoIP Penetration and Exploitation Kit 
• Testing modules for Metasploit, MSF license 
• Old techniques, new approach 
• SIP library for new module development 
• Custom header support, authentication support 
• Trust analyser, SIP proxy bounce, MITM proxy, Skinny 
• Modules 
• Options, Register, Invite, Message 
• Brute-forcers, Enumerator 
• SIP trust analyser,SIP proxy, Fake service 
• Cisco Skinny analysers 
• Cisco UCM/UCDM exploits 
www.senseofsecurity.com.au © Sense of Security 2014 Page 3 
of 60 – Aug-14
Agenda 
www.senseofsecurity.com.au © Sense of Security 2014 Page 4 
of 60 – Aug-14 
Hosted VoIP 101 
Network Attacks 
Attacking CUCDM 
Attacking CUCM 
Attacking SIP 
Attacking 
Clients 
Attacking 
Skinny
Hosted VoIP services 
www.senseofsecurity.com.au © Sense of Security 2014 Page 5 
of 60 – Aug-14
Hosted VoIP environment 
• Vendors are Cisco and VOSS Solutions 
• Web based services 
• IP Phone services (Cisco, VOSS* IP Phone XML Services) 
• Tenant client services management (VOSS* Selfcare) 
• Tenant* services management (VOSS* Domain Manager) 
• VoIP services 
• Skinny (SCCP) services for Cisco phones 
• SIP services for other tenant phones 
• RTP services for media streaming 
• PBX/ISDN gateways, network equipment 
! 
* Tenant => Customer of hosted VoIP service 
* VOSS => VOSS Solutions, hosted VoIP provider & Cisco partner 
* VOSS a.k.a Voice Over Super Slick, created by Jason Ostrom 
www.senseofsecurity.com.au © Sense of Security 2014 Page 6 
of 60 – Aug-14
Discovery for hosted VoIP networks 
• Discover VoIP network configuration, design and 
requirements 
• Find Voice VLAN and gain access 
• Gain access using PC port on IP Phone 
• Understand the switching security for: 
• Main vendor for VoIP infrastructure 
• Network authentication requirements 
• VLAN ID and requirements 
• IP Phone management services 
• Supportive services in use 
www.senseofsecurity.com.au © Sense of Security 2014 Page 7 
of 60 – Aug-14
Protected and isolated? 
www.senseofsecurity.com.au © Sense of Security 2014 Page 8 
of 60 – Aug-14
Switching manipulation 
• Attack Types 
• PC Ports of the IP phone and handsets 
• CDP sniffing/spoofing for Voice VLAN 
• DTP and VLAN Trunking Protocol attacks 
• ARP spoofing for MITM attacks 
• DHCP spoofing & snooping 
• Persistent access 
• Tapberry Pi (a.k.a berry-tap) 
• Tampered phone 
• Power over ethernet (PoE) 
• 3G/4G for connectivity 
www.senseofsecurity.com.au © Sense of Security 2014 Page 9 
of 60 – Aug-14
How to make your own Tapberry Pi 
www.senseofsecurity.com.au © Sense of Security 2014 Page 10 
of 60 – Aug-14 
RJ45 Connection Pins
How to make your own Tapberry Pi 
www.senseofsecurity.com.au © Sense of Security 2014 Page 11 
of 60 – Aug-14 
Speaker Power 
Patch the Cat5 cable
Attacking the TFTP server 
• Obtaining configuration files for MAC addresses 
• SEPDefault.cnf, SEPXXXXXXXXXXXX.cnf.xml 
• SIPDefault.cnf, SIPXXXXXXXXXXXX.cnf.xml 
• Identifying SIP, Skinny, RTP and web settings 
• Finding IP phone software and updates 
• Configuration files may contain credentials 
• Digital signature/encryption usage for files 
! 
! 
! 
Tip: TFTPTheft, Metasploit, Viproy TFTP module 
www.senseofsecurity.com.au © Sense of Security 2014 Page 12 
of 60 – Aug-14
Configuration file content 
• <deviceProtocol>SCCP</deviceProtocol>! 
• <sshUserId></sshUserId>! 
• <sshPassword></sshPassword>! 
! 
• <webAccess>1</webAccess>! 
• <settingsAccess>1</settingsAccess>! 
• <sideToneLevel>0</sideToneLevel>! 
• <spanToPCPort>1</spanToPCPort>! 
• <sshAccess>1</sshAccess>! 
! 
• <phonePassword></phonePassword> 
www.senseofsecurity.com.au © Sense of Security 2014 Page 13 
of 60 – Aug-14
Becoming the TFTP server 
• Send fake configurations for 
• HTTP server 
• IP phone management server 
• SIP server and proxy 
• Skinny server 
• RTP server and proxy 
• Deploy SSH public keys for SSH on IP Phones 
• Update custom settings of IP Phones 
• Deploy custom OS update and code execution 
! 
Tip: Metasploit TFTP & FakeDNS servers, Viproxy 
www.senseofsecurity.com.au © Sense of Security 2014 Page 14 
of 60 – Aug-14
Cisco Hosted Collaboration Suite 
• Cisco UC Domain Manager 
• VOSS IP Phone XML services 
• VOSS Self Care customer portal 
• VOSS Tenant services management 
• Cisco UC Manager 
• Cisco Unified Dialed Number Analyzer 
• Cisco Unified Reporting 
• Cisco Unified CM CDR Analysis and Reporting 
! 
• Multiple Vulnerabilities in Cisco Unified 
Communications Domain Manager 
http://tools.cisco.com/security/center/content/ 
CiscoSecurityAdvisory/cisco-sa-20140702-cucdm 
www.senseofsecurity.com.au © Sense of Security 2014 Page 15 
of 60 – Aug-14
VOSS Self Care 
Tenant user services 
• Password & PIN management 
• Voicemail configuration 
• Presence 
• Corporate Directory access 
• Extension mobility 
! 
Weaknesses 
• Cross-site scripting vulnerabilities 
www.senseofsecurity.com.au © Sense of Security 2014 Page 16 
of 60 – Aug-14
Account details stored XSS 
www.senseofsecurity.com.au © Sense of Security 2014 Page 17 
of 60 – Aug-14
VOSS domain manager 
• Tenant administration services 
• User management 
• Location and dial plan management 
• CLI and number translation configuration 
! 
Weaknesses 
• User enumeration 
• Privilege escalation vulnerabilities 
• Cross-site scripting vulnerabilities 
• SQL injections and SOAP manipulations 
www.senseofsecurity.com.au © Sense of Security 2014 Page 18 
of 60 – Aug-14
Errors, Information Leakage 
/emapp/EMAppServlet?device=USER 
! 
! 
! 
! 
/bvsm/iptusermgt/disassociateuser.cgi 
www.senseofsecurity.com.au © Sense of Security 2014 Page 19 
of 60 – Aug-14
Insecure File Upload 
/bvsm/iptbulkadmin 
/bvsm/iptbulkloadmgt/bulkloaduploadform.cgi 
www.senseofsecurity.com.au © Sense of Security 2014 Page 20 
of 60 – Aug-14
Privilege Escalation 
/bvsm/iptusermgt/moduser.cgi (stored XSS, change users’ role) 
/bvsm/iptadminusermgt/adduserform.cgi?user_type=adminuser 
! 
! 
! 
! 
! 
/bvsm/iptnumtransmgt/editnumbertranslationform.cgi?id=1 
! 
www.senseofsecurity.com.au © Sense of Security 2014 Page 21 
of 60 – Aug-14
IP Phone management 
VOSS IP Phone XML services 
• Shared service for all tenants 
• Call forwarding (Skinny has, SIP has not) 
• Speed dial management 
• Voicemail PIN management 
http://1.2.3.4/bvsmweb/SRV.cgi?device=ID&cfoption=ACT 
www.senseofsecurity.com.au © Sense of Security 2014 Page 22 
of 60 – Aug-14 
Services 
• speeddials 
• changepinform 
• showcallfwd 
• callfwdmenu 
Actions 
• CallForwardAll 
• CallForwardBusy
IP Phone management 
• Authentication and Authorisation free! 
• MAC address is sufficient 
• Jailbreaking tenant services 
! 
• Viproy Modules 
• Call Forwarding 
• Speed Dial 
www.senseofsecurity.com.au © Sense of Security 2014 Page 23 
of 60 – Aug-14
Demonstration of VOSS attacks 
www.senseofsecurity.com.au © Sense of Security 2014 Page 24 
of 60 – Aug-14
Unified Communications 
• Forget TDM and PSTN 
• SIP, Skinny, H.248, RTP, MSAN/MGW 
• Smart customer modems & phones 
! 
• Cisco UCM 
• Linux operating system 
• Web based management services 
• VoIP services (Skinny, SIP, RTP) 
• Essential network services (TFTP, DHCP) 
• Call centre, voicemail, value added services 
www.senseofsecurity.com.au © Sense of Security 2014 Page 25 
of 60 – Aug-14
Discovering VoIP servers 
• Looking for 
• Signalling servers (e.g. SIP, Skinny, H.323, H.248) 
• Proxy servers (e.g. RTP, SIP, SDP) 
• Contact Centre services 
• Voicemail and email integration 
• Call recordings, call data records, log servers 
! 
• Discovering 
• Operating systems, versions and patch level 
• Management services (e.g. SNMP, Telnet, HTTP, SSH) 
• Weak or default credentials 
www.senseofsecurity.com.au © Sense of Security 2014 Page 26 
of 60 – Aug-14
Attacking SIP services 
• Essential analysis 
• Registration and invitation analysis 
• User enumeration, brute force for credentials 
• Discovery for SIP trunks, gateways and trusts 
• Caller ID spoofing (w/wo register or trunk) 
! 
• Advanced analysis 
• Finding value added services and voicemail 
• SIP trust hacking 
• SIP proxy bounce attack 
www.senseofsecurity.com.au © Sense of Security 2014 Page 27 
of 60 – Aug-14
Cisco specific SIP registration 
• Extensions (e.g. 1001) 
• MAC address in Contact field 
• SIP digest authentication (user + password) 
• SIP x.509 authentication 
• All authentication elements must be valid! 
! 
• Good news, we have SIP enumeration inputs! 
Warning: 399 bhcucm "Line not configured” 
Warning: 399 bhcucm "Unable to find device/user in database" 
Warning: 399 bhcucm "Unable to find a device handler for the 
request received on port 52852 from 192.168.0.101” 
Warning: 399 bhcucm "Device type mismatch" 
www.senseofsecurity.com.au © Sense of Security 2014 Page 28 
of 60 – Aug-14
Register and Subscribe 
www.senseofsecurity.com.au © Sense of Security 2014 Page 29 
of 60 – Aug-14 
Register / Subscribe (FROM, TO, Credentials)
Invite, CDR and Billing tests 
www.senseofsecurity.com.au © Sense of Security 2014 Page 30 
of 60 – Aug-14 
Invite / Ack / Re-Invite / Update (FROM, TO, VIA, Credentials)
SIP Proxy Bounce attack 
192.168.1.145 - Sydney 
Production SIP Service 
192.168.1.146 
Melbourne 
192.168.1.202 
Brisbane 
www.senseofsecurity.com.au © Sense of Security 2014 Page 31 
of 60 – Aug-14 
SIP Proxy Bounce Attacks 
• SIP trust relationship hacking 
• Attacking inaccessible servers 
• Attacking the SIP software and protocol 
• Software, Version, Type, Realm
Denial of Service attacks 
192.168.1.145 - Sydney 
Production SIP Service 
192.168.1.146 
Melbourne 
192.168.1.202 
Brisbane 
IP spoofed UDP SIP request 
www.senseofsecurity.com.au © Sense of Security 2014 Page 32 
of 60 – Aug-14 
SIP based DoS attacks 
• UDP vulnerabilities and IP spoofing 
• Too many errors, very very verbose mode 
• ICMP errors 
Alderaan
Hacking SIP trust relationships 
IP spoofed UDP SIP request 
From field has IP and Port 
192.168.1.145 - Sydney 
Production SIP Service 
www.senseofsecurity.com.au © Sense of Security 2014 Page 33 
of 60 – Aug-14 
Send INVITE/MESSAGE requests with 
• IP spoofing (source is Brisbane), 
• from field contains Spoofed IP and Port, 
the caller ID will be your trusted host. 
192.168.1.146 
Melbourne 
192.168.1.202 
Brisbane 
UDP Trust 
Universal 
Trust 
Tatooine
Attacking a client using SIP trust 
192.168.1.145 - Sydney 
Production SIP Service 
www.senseofsecurity.com.au © Sense of Security 2014 Page 34 
of 60 – Aug-14 
IP spoofed UDP SIP request 
From field has bogus characters 
192.168.1.146 
Melbourne 
192.168.1.202 
Brisbane 
UDP Trust 
Universal 
Trust 
Tatooine 
It’s a TRAP! 
Send INVITE/MESSAGE requests with 
• IP spoofing (source is Brisbane), 
• from field contains special number, 
you will have fun or voicemail access.
Toll fraud for CUCM 
• Cisco UCM accepts MAC address as identity 
• No authentication (secure deployment?) 
• Rogue SIP gateway with no authentication 
• Caller ID spoofing with proxy headers 
• Via field, From field 
• P-Asserted-Identity, P-Called-Party-ID 
• P-Preferred-Identity 
• ISDN Calling Party Number, Remote-Party-ID* 
• Billing bypass with proxy headers 
• P-Charging-Vector (Spoofing, Manipulating) 
• Re-Invite, Update (With/Without P-Charging-Vector) 
! 
* https://tools.cisco.com/bugsearch/bug/CSCuo51517 
www.senseofsecurity.com.au © Sense of Security 2014 Page 35 
of 60 – Aug-14
Remote-Party-ID header 
Source: Cisco CUCM SIP Line Messaging Guide 
www.senseofsecurity.com.au © Sense of Security 2014 Page 36 
of 60 – Aug-14
Caller ID spoofing on CUCM 
Remote-Party-ID header 
Remote-Party-ID: <sip:007@1.2.3.4>;party=called;screen=yes;privacy=off 
! 
What for? 
• Caller ID spoofing 
• Billing bypass 
• Accessing voicemail 
• 3rd party operators 
www.senseofsecurity.com.au © Sense of Security 2014 Page 37 
of 60 – Aug-14
Caller ID fraud for all operators? 
• Telecom operators trust source Caller ID 
• One insecure operator to rule them all 
www.senseofsecurity.com.au © Sense of Security 2014 Page 38 
of 60 – Aug-14
Fake Caller ID for messages? 
• Call me back function on voicemail / calls 
• Sending many spoofed messages for DoS 
• Overseas? Roaming? 
• Social engineering (voicemail notification) 
• Value added services 
• Add a data package to my line 
• Subscribe me to a new mobile TV service 
• Reset my password/PIN/2FA 
• Group messages, celebrations 
www.senseofsecurity.com.au © Sense of Security 2014 Page 39 
of 60 – Aug-14
Demonstration of SIP attacks 
www.senseofsecurity.com.au © Sense of Security 2014 Page 40 
of 60 – Aug-14
VoIP client security 
• Different Client Types 
• Mobile, Desktop, Teleconference, Handsets 
• Information Disclosure 
• Unnecessary services and ports (SNMP, FTP) 
• Weak management services (Telnet, SSH, HTTP) 
• Stored credentials and sensitive information 
• Unauthorised Access 
• Password or TFTP attacks, enforced upgrades 
• Weak VoIP Services 
• Clients may accept direct invite, register or notify 
www.senseofsecurity.com.au © Sense of Security 2014 Page 41 
of 60 – Aug-14
Cisco VoIP clients 
• Cisco IP Phones 
• Cisco IP Communicator 
• Cisco Unified Personal Communicator 
• Cisco Webex Client 
• Cisco Jabber services 
• Cisco Jabber Voice/Video 
• IM for 3rd party clients 
• Mobile, desktop, Mac 
• Jabber SDK for web 
Source: www.arkadin.com 
www.senseofsecurity.com.au © Sense of Security 2014 Page 42 
of 60 – Aug-14
Rogue services and DSITM 
• Use ARP/DNS Spoof & VLAN hopping & Manual config 
• Collect credentials, hashes, information 
• Change client's request to add a feature (e.g. Spoofing) 
• Change the SDP features to redirect calls 
• Add a proxy header to bypass billing & CDR 
• Manipulate request at runtime to find BoF vulnerabilities 
• Trigger software upgrades for malwared executables 
www.senseofsecurity.com.au © Sense of Security 2014 Page 43 
of 60 – Aug-14 
Death Star in the Middle
Attacking a client using SIP service 
• Caller ID spoofed messages 
• to install a malicious application or an SSL certificate 
• to redirect voicemails or calls 
• Fake caller ID for Scam, Vishing or Spying 
• Manipulate the content or content-type on messaging 
• Trigger a crash/BoF on the remote client 
• Inject cross-site scripting to the conversation 
! 
• Proxies with TLS+TCP interception and manipulation 
• Viproxy (github.com/fozavci/viproxy) 
• MITMproxy 
www.senseofsecurity.com.au © Sense of Security 2014 Page 44 
of 60 – Aug-14
SMS phishing using SIP messages 
www.senseofsecurity.com.au © Sense of Security 2014 Page 45 
of 60 – Aug-14
Attacking a client using SIP trust 
• SIP server redirects a few fields to client 
• FROM, FROM NAME, Contact 
• Other fields depend on server (e.g. SDP, MIME) 
• Message content 
• Clients have buffer overflow in FROM? 
• Send 2000 chars to test it ! 
• Crash it or execute your shellcode if available 
• Clients trust SIP servers and trust is UDP based 
• Trust hacking module can be used for the trust between 
server and client too. 
• Viproy Penetration Testing Kit SIP Modules 
• Simple fuzz support (FROM=FUZZ 2000) 
• You can modify it for further attacks 
www.senseofsecurity.com.au © Sense of Security 2014 Page 46 
of 60 – Aug-14
Attacking a client using SIP trust 
192.168.1.145 - Sydney 
Production SIP Service 
www.senseofsecurity.com.au © Sense of Security 2014 Page 47 
of 60 – Aug-14 
IP spoofed UDP SIP request 
From field has bogus characters 
192.168.1.146 
Melbourne 
192.168.1.202 
Brisbane 
UDP Trust 
Universal 
Trust 
Tatooine 
Crash! 
Adore iPhone App 
Send INVITE/MESSAGE requests with 
• IP spoofing (source is Brisbane), 
• from field contains exploit, 
the client will be your stormtrooper.
Attacking clients using VoIP 
Video demo for SIP based client attacks 
www.senseofsecurity.com.au © Sense of Security 2014 Page 48 
of 58 – Aug-14 
• Manipulating instant messaging between clients 
• Initiate a call using fake Caller ID 
• Send a fake message from the Operator 
• Send bogus message to crash 
• Send too many calls and create a crash 
!
Attacking Skinny services 
• Cisco Skinny (SCCP) 
• Binary, not plain text 
• Different versions 
• No authentication 
• MAC address is identity 
• Auto registration 
! 
• Basic attacks 
• Register as a phone 
• Disconnect other phones 
• Call forwarding 
• Unauthorised calls 
Source: Cisco 
www.senseofsecurity.com.au © Sense of Security 2014 Page 49 
of 60 – Aug-14
Other Skinny researches 
• Skinny vulnerabilities published 
http://tools.cisco.com/security/center/content/ 
CiscoSecurityAdvisory/cisco-sa-20120229-cucm 
by Felix Lindner 
http://www.cisco.com/c/en/us/support/docs/csa/cisco-sa- 
20100303-cucm.html 
by Sipera VIPER Lab 
• IxVoice SCCP (Skinny) Test Library 
• VIPER UCSniff supports Skinny 
• VIPER LAVA has Skinny support(?) 
! 
VoIP Security not found. Did you mean Jason Ostrom? 
He is not only passionate about VoIP… 
www.senseofsecurity.com.au © Sense of Security 2014 Page 50 
of 60 – Aug-14
Attacking Skinny services 
www.senseofsecurity.com.au © Sense of Security 2014 Page 51 
of 60 – Aug-14
Attacking Skinny services 
Viproy has a Skinny library for easier 
development and sample attack 
modules 
• Skinny auto registration 
• Skinny register 
• Skinny call 
• Skinny call forwarding 
www.senseofsecurity.com.au © Sense of Security 2014 Page 52 
of 60 – Aug-14
Attacking Skinny services 
Everybody can develop a Skinny module now, even Ewoks! ! 
Register Unauthorised Call 
www.senseofsecurity.com.au © Sense of Security 2014 Page 53 
of 60 – Aug-14
Preparing a proper client for Skinny 
• Install Cisco IP Communicator 
• Change the MAC address of Windows 
• Register the software with this MAC 
www.senseofsecurity.com.au © Sense of Security 2014 Page 54 
of 60 – Aug-14
Demonstration of Skinny attacks 
www.senseofsecurity.com.au © Sense of Security 2014 Page 55 
of 60 – Aug-14
Summary 
www.senseofsecurity.com.au © Sense of Security 2014 Page of 60 – Aug-14 
56 
Hosted VoIP 101 
Network Attacks 
Attacking CUCDM 
Attacking CUCM 
Attacking SIP 
Attacking 
Clients 
Attacking 
Skinny
Solutions 
• Install the Cisco security patches 
• From CVE-2014-3277 to CVE-2014-3283, 
CVE-2014-2197, CVE-2014-3300 
• CSCum75078, CSCun17309, CSCum77041, 
CSCuo51517, CSCum76930, CSCun49862 
• Secure network design 
• IP phone services MUST be DEDICATED, not SHARED 
• Secure deployment with PKI 
• Authentication with X.509, software signatures 
• Secure SSL configuration 
• Secure protocols 
• Skinny authentication, SIP authentication 
• HTTP instead of TFTP, SSH instead of Telnet 
www.senseofsecurity.com.au © Sense of Security 2014 Page 57 
of 60 – Aug-14
References 
• Viproy Homepage and Documentation 
http://www.viproy.com 
! 
• Attacking SIP servers using Viproy VoIP Kit 
https://www.youtube.com/watch?v=AbXh_L0-Y5A 
! 
• VoIP Pen-Test Environment – VulnVoIP 
http://www.rebootuser.com/?cat=371 
! 
• Credits and thanks go to… 
Sense of Security Team, Jason Ostrom, Mark Collier, 
Paul Henry, Sandro Gauci 
www.senseofsecurity.com.au © Sense of Security 2014 Page 58 
of 60 – Aug-14
Questions ? 
www.senseofsecurity.com.au © Sense of Security 2014 Page 59 
of 60 – Aug-14
Thank you 
Recognised as Australia’s fastest growing information security and 
risk management consulting firm through the Deloitte Technology 
Fast 50 & BRW Fast 100 programs 
Head office is level 8, 66 King Street, Sydney, NSW 2000, Australia. 
Owner of trademark and all copyright is Sense of Security Pty Ltd. 
Neither text or images can be reproduced without written 
permission. 
T: 1300 922 923 
T: +61 (0) 2 9290 4444 
F: +61 (0) 2 9290 4455 
info@senseofsecurity.com.au 
www.senseofsecurity.com.au 
www.senseofsecurity.com.au © Sense of Security 2014 Page of 60 60 – Aug-14

More Related Content

PPTX
Ports and protocols
siva rama
 
PPT
ipv6 ppt
Shiva Kumar
 
PDF
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
 
PPTX
A very good introduction to IPv6
Syed Arshad
 
PPTX
VoIP – vulnerabilities and attacks
n|u - The Open Security Community
 
PPTX
Tcp IP Model
Ankur Kumar
 
PPTX
Network address translation
Karppinen Ngoc Anh
 
PPT
Ipv4 ppt
Sonal Chandel
 
Ports and protocols
siva rama
 
ipv6 ppt
Shiva Kumar
 
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
 
A very good introduction to IPv6
Syed Arshad
 
VoIP – vulnerabilities and attacks
n|u - The Open Security Community
 
Tcp IP Model
Ankur Kumar
 
Network address translation
Karppinen Ngoc Anh
 
Ipv4 ppt
Sonal Chandel
 

What's hot (20)

PPT
Vlan
sanss40
 
PPTX
Network address translation
Mohak Kaushik
 
PDF
rtpengine - Media Relaying and Beyond
Andreas Granig
 
PPTX
Session initiation-protocol
Santhosh Somu
 
PPTX
TCP/IP 3-way Handshake
Alok Tripathi
 
PPTX
What is Ethernet
Simplilearn
 
PPTX
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
DOCX
Cisco router configuration tutorial
IT Tech
 
PPTX
What is VoIP and How it works?
broadconnect
 
PPTX
Ipv6 the next generation protocol
PRADEEP Cheekatla
 
PPTX
Subnetting Presentation
Touhidul Fahim
 
PPT
network Addressing
Tauseef khan
 
PPTX
IPv4
Dhiraj Mishra
 
PPTX
Multiprotocol label switching (mpls) - Networkshop44
Jisc
 
PPTX
Wireless network
Devyani Vaidya
 
PPTX
Mobile internet presentation
Raynardo Hassanally
 
PPT
Ip address and subnetting
IGZ Software house
 
PPTX
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
PPTX
Dhcp
Chinmoy Jena
 
PDF
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
 
Vlan
sanss40
 
Network address translation
Mohak Kaushik
 
rtpengine - Media Relaying and Beyond
Andreas Granig
 
Session initiation-protocol
Santhosh Somu
 
TCP/IP 3-way Handshake
Alok Tripathi
 
What is Ethernet
Simplilearn
 
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
Cisco router configuration tutorial
IT Tech
 
What is VoIP and How it works?
broadconnect
 
Ipv6 the next generation protocol
PRADEEP Cheekatla
 
Subnetting Presentation
Touhidul Fahim
 
network Addressing
Tauseef khan
 
Multiprotocol label switching (mpls) - Networkshop44
Jisc
 
Wireless network
Devyani Vaidya
 
Mobile internet presentation
Raynardo Hassanally
 
Ip address and subnetting
IGZ Software house
 
TCP/IP and UDP protocols
Dawood Faheem Abbasi
 
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
 
Ad

Viewers also liked (6)

PDF
VoIP Wars : Return of the SIP
Fatih Ozavci
 
PDF
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
 
PDF
VoIP Wars: The Phreakers Awaken
Fatih Ozavci
 
PDF
Hacking SIP Like a Boss!
Fatih Ozavci
 
PDF
Think Like a Hacker - Database Attack Vectors
Mark Ginnebaugh
 
PDF
Backtrack syllabus
napoleon182
 
VoIP Wars : Return of the SIP
Fatih Ozavci
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
 
VoIP Wars: The Phreakers Awaken
Fatih Ozavci
 
Hacking SIP Like a Boss!
Fatih Ozavci
 
Think Like a Hacker - Database Attack Vectors
Mark Ginnebaugh
 
Backtrack syllabus
napoleon182
 
Ad

Similar to VoIP Wars: Attack of the Cisco Phones (20)

PDF
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
 
PDF
DEFCON 23 - Fatih Ozavci - the art of voip workshop
Felipe Prado
 
PDF
Defcon 21-ozavci-vo ip-wars-return-of-the-sip by pseudor00t
pseudor00t overflow
 
PDF
Departed Communications: Learn the ways to smash them!
Fatih Ozavci
 
PPT
Meletis Belsis - Voip security
Meletis Belsis MPhil/MRes/BSc
 
PDF
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius
 
PDF
Identity Services Engine Overview and Update
Cisco Canada
 
PDF
Scanning The Intertubes For Voip
Sandro Gauci
 
PDF
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
Fatih Ozavci
 
PDF
Secure calling for IP telephony - webinar 2016, English
Askozia
 
PPTX
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days
 
PDF
VoIP security
Mile Blenton
 
PPTX
Netas Nova Cyber Security Product Family
Cagdas Tanriover
 
PPTX
Building Up Network Security: An Introduction
Global Knowledge Training
 
PPTX
VoIP Security 101 what you need to know
Eric Klein
 
PPTX
Number one-issue-voip-today-fraud
Flavio Eduardo de Andrade Goncalves
 
PDF
Ccnp iscw lab guide
VNG
 
PPT
ETel2007: The Black Bag Security Review (VoIP Security)
Dan York
 
PDF
Deployment of cisco_iron_portweb_security_appliance
Alfredo Boiero Sanders
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Priyanka Aash
 
DEFCON 23 - Fatih Ozavci - the art of voip workshop
Felipe Prado
 
Defcon 21-ozavci-vo ip-wars-return-of-the-sip by pseudor00t
pseudor00t overflow
 
Departed Communications: Learn the ways to smash them!
Fatih Ozavci
 
Meletis Belsis - Voip security
Meletis Belsis MPhil/MRes/BSc
 
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius
 
Identity Services Engine Overview and Update
Cisco Canada
 
Scanning The Intertubes For Voip
Sandro Gauci
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
Fatih Ozavci
 
Secure calling for IP telephony - webinar 2016, English
Askozia
 
Positive Hack Days. Gritsai. VOIP insecurities workshop
Positive Hack Days
 
VoIP security
Mile Blenton
 
Netas Nova Cyber Security Product Family
Cagdas Tanriover
 
Building Up Network Security: An Introduction
Global Knowledge Training
 
VoIP Security 101 what you need to know
Eric Klein
 
Number one-issue-voip-today-fraud
Flavio Eduardo de Andrade Goncalves
 
Ccnp iscw lab guide
VNG
 
ETel2007: The Black Bag Security Review (VoIP Security)
Dan York
 
Deployment of cisco_iron_portweb_security_appliance
Alfredo Boiero Sanders
 

More from Fatih Ozavci (13)

PDF
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Fatih Ozavci
 
PDF
Viproy ile VoIP Güvenlik Denetimi
Fatih Ozavci
 
PDF
Mahremiyetinizi Koruyun
Fatih Ozavci
 
PDF
NGN ve VoIP Ağları Güvenlik Denetimi
Fatih Ozavci
 
PDF
Metasploit Framework ile Exploit Gelistirme
Fatih Ozavci
 
PDF
MBFuzzer : MITM Fuzzing for Mobile Applications
Fatih Ozavci
 
PDF
Hacking Trust Relationships Between SIP Gateways
Fatih Ozavci
 
PDF
Metasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
Fatih Ozavci
 
PDF
Bilgi Guvenligi Temel Kavramlar
Fatih Ozavci
 
PDF
Mahremiyet Ekseninde Ozgur Yazilimlar
Fatih Ozavci
 
PDF
Ozgur Yazilimlar ile Saldiri Yontemleri
Fatih Ozavci
 
PDF
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
Fatih Ozavci
 
PDF
Metasploit Framework ile Güvenlik Denetimi
Fatih Ozavci
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Fatih Ozavci
 
Viproy ile VoIP Güvenlik Denetimi
Fatih Ozavci
 
Mahremiyetinizi Koruyun
Fatih Ozavci
 
NGN ve VoIP Ağları Güvenlik Denetimi
Fatih Ozavci
 
Metasploit Framework ile Exploit Gelistirme
Fatih Ozavci
 
MBFuzzer : MITM Fuzzing for Mobile Applications
Fatih Ozavci
 
Hacking Trust Relationships Between SIP Gateways
Fatih Ozavci
 
Metasploit Framework - Giris Seviyesi Guvenlik Denetim Rehberi
Fatih Ozavci
 
Bilgi Guvenligi Temel Kavramlar
Fatih Ozavci
 
Mahremiyet Ekseninde Ozgur Yazilimlar
Fatih Ozavci
 
Ozgur Yazilimlar ile Saldiri Yontemleri
Fatih Ozavci
 
Ozgur Yazilimlar ile VoIP Guvenlik Denetimi
Fatih Ozavci
 
Metasploit Framework ile Güvenlik Denetimi
Fatih Ozavci
 

Recently uploaded (20)

PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Doc9.....................................
SofiaCollazos
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Software Development Company | KodekX
KodekX
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 

VoIP Wars: Attack of the Cisco Phones

  • 1. VoIP Wars: Attack of the Cisco Phones Compliance, Protection & Business Confidence Sense of Security Pty Ltd ! Sydney Level 8, 66 King Street Sydney NSW 2000 Australia Melbourne Level 10, 401 Docklands Drv Docklands VIC 3008 Australia T: 1300 922 923 T: +61 (0) 2 9290 4444 F: +61 (0) 2 9290 4455 [email protected] www.senseofsecurity.com.au ABN: 14 098 237 908 www.senseofsecurity.com.au © Sense of Security 2013 Page ‹#› – 13-Sep-13
  • 2. Speaker • Fatih Ozavci • Senior Security Consultant • Interests • VoIP • Mobile Applications • Network Infrastructure ! • Author of Viproy VoIP Penetration Testing Kit • Public Speaker • Defcon, BlackHat Arsenal, AusCert, Ruxcon www.senseofsecurity.com.au © Sense of Security 2014 Page 2 of 60 – Aug-14
  • 3. Viproy VoIP Toolkit • Viproy is a Vulcan-ish Word that means "Call" • Viproy VoIP Penetration and Exploitation Kit • Testing modules for Metasploit, MSF license • Old techniques, new approach • SIP library for new module development • Custom header support, authentication support • Trust analyser, SIP proxy bounce, MITM proxy, Skinny • Modules • Options, Register, Invite, Message • Brute-forcers, Enumerator • SIP trust analyser,SIP proxy, Fake service • Cisco Skinny analysers • Cisco UCM/UCDM exploits www.senseofsecurity.com.au © Sense of Security 2014 Page 3 of 60 – Aug-14
  • 4. Agenda www.senseofsecurity.com.au © Sense of Security 2014 Page 4 of 60 – Aug-14 Hosted VoIP 101 Network Attacks Attacking CUCDM Attacking CUCM Attacking SIP Attacking Clients Attacking Skinny
  • 5. Hosted VoIP services www.senseofsecurity.com.au © Sense of Security 2014 Page 5 of 60 – Aug-14
  • 6. Hosted VoIP environment • Vendors are Cisco and VOSS Solutions • Web based services • IP Phone services (Cisco, VOSS* IP Phone XML Services) • Tenant client services management (VOSS* Selfcare) • Tenant* services management (VOSS* Domain Manager) • VoIP services • Skinny (SCCP) services for Cisco phones • SIP services for other tenant phones • RTP services for media streaming • PBX/ISDN gateways, network equipment ! * Tenant => Customer of hosted VoIP service * VOSS => VOSS Solutions, hosted VoIP provider & Cisco partner * VOSS a.k.a Voice Over Super Slick, created by Jason Ostrom www.senseofsecurity.com.au © Sense of Security 2014 Page 6 of 60 – Aug-14
  • 7. Discovery for hosted VoIP networks • Discover VoIP network configuration, design and requirements • Find Voice VLAN and gain access • Gain access using PC port on IP Phone • Understand the switching security for: • Main vendor for VoIP infrastructure • Network authentication requirements • VLAN ID and requirements • IP Phone management services • Supportive services in use www.senseofsecurity.com.au © Sense of Security 2014 Page 7 of 60 – Aug-14
  • 8. Protected and isolated? www.senseofsecurity.com.au © Sense of Security 2014 Page 8 of 60 – Aug-14
  • 9. Switching manipulation • Attack Types • PC Ports of the IP phone and handsets • CDP sniffing/spoofing for Voice VLAN • DTP and VLAN Trunking Protocol attacks • ARP spoofing for MITM attacks • DHCP spoofing & snooping • Persistent access • Tapberry Pi (a.k.a berry-tap) • Tampered phone • Power over ethernet (PoE) • 3G/4G for connectivity www.senseofsecurity.com.au © Sense of Security 2014 Page 9 of 60 – Aug-14
  • 10. How to make your own Tapberry Pi www.senseofsecurity.com.au © Sense of Security 2014 Page 10 of 60 – Aug-14 RJ45 Connection Pins
  • 11. How to make your own Tapberry Pi www.senseofsecurity.com.au © Sense of Security 2014 Page 11 of 60 – Aug-14 Speaker Power Patch the Cat5 cable
  • 12. Attacking the TFTP server • Obtaining configuration files for MAC addresses • SEPDefault.cnf, SEPXXXXXXXXXXXX.cnf.xml • SIPDefault.cnf, SIPXXXXXXXXXXXX.cnf.xml • Identifying SIP, Skinny, RTP and web settings • Finding IP phone software and updates • Configuration files may contain credentials • Digital signature/encryption usage for files ! ! ! Tip: TFTPTheft, Metasploit, Viproy TFTP module www.senseofsecurity.com.au © Sense of Security 2014 Page 12 of 60 – Aug-14
  • 13. Configuration file content • <deviceProtocol>SCCP</deviceProtocol>! • <sshUserId></sshUserId>! • <sshPassword></sshPassword>! ! • <webAccess>1</webAccess>! • <settingsAccess>1</settingsAccess>! • <sideToneLevel>0</sideToneLevel>! • <spanToPCPort>1</spanToPCPort>! • <sshAccess>1</sshAccess>! ! • <phonePassword></phonePassword> www.senseofsecurity.com.au © Sense of Security 2014 Page 13 of 60 – Aug-14
  • 14. Becoming the TFTP server • Send fake configurations for • HTTP server • IP phone management server • SIP server and proxy • Skinny server • RTP server and proxy • Deploy SSH public keys for SSH on IP Phones • Update custom settings of IP Phones • Deploy custom OS update and code execution ! Tip: Metasploit TFTP & FakeDNS servers, Viproxy www.senseofsecurity.com.au © Sense of Security 2014 Page 14 of 60 – Aug-14
  • 15. Cisco Hosted Collaboration Suite • Cisco UC Domain Manager • VOSS IP Phone XML services • VOSS Self Care customer portal • VOSS Tenant services management • Cisco UC Manager • Cisco Unified Dialed Number Analyzer • Cisco Unified Reporting • Cisco Unified CM CDR Analysis and Reporting ! • Multiple Vulnerabilities in Cisco Unified Communications Domain Manager http://tools.cisco.com/security/center/content/ CiscoSecurityAdvisory/cisco-sa-20140702-cucdm www.senseofsecurity.com.au © Sense of Security 2014 Page 15 of 60 – Aug-14
  • 16. VOSS Self Care Tenant user services • Password & PIN management • Voicemail configuration • Presence • Corporate Directory access • Extension mobility ! Weaknesses • Cross-site scripting vulnerabilities www.senseofsecurity.com.au © Sense of Security 2014 Page 16 of 60 – Aug-14
  • 17. Account details stored XSS www.senseofsecurity.com.au © Sense of Security 2014 Page 17 of 60 – Aug-14
  • 18. VOSS domain manager • Tenant administration services • User management • Location and dial plan management • CLI and number translation configuration ! Weaknesses • User enumeration • Privilege escalation vulnerabilities • Cross-site scripting vulnerabilities • SQL injections and SOAP manipulations www.senseofsecurity.com.au © Sense of Security 2014 Page 18 of 60 – Aug-14
  • 19. Errors, Information Leakage /emapp/EMAppServlet?device=USER ! ! ! ! /bvsm/iptusermgt/disassociateuser.cgi www.senseofsecurity.com.au © Sense of Security 2014 Page 19 of 60 – Aug-14
  • 20. Insecure File Upload /bvsm/iptbulkadmin /bvsm/iptbulkloadmgt/bulkloaduploadform.cgi www.senseofsecurity.com.au © Sense of Security 2014 Page 20 of 60 – Aug-14
  • 21. Privilege Escalation /bvsm/iptusermgt/moduser.cgi (stored XSS, change users’ role) /bvsm/iptadminusermgt/adduserform.cgi?user_type=adminuser ! ! ! ! ! /bvsm/iptnumtransmgt/editnumbertranslationform.cgi?id=1 ! www.senseofsecurity.com.au © Sense of Security 2014 Page 21 of 60 – Aug-14
  • 22. IP Phone management VOSS IP Phone XML services • Shared service for all tenants • Call forwarding (Skinny has, SIP has not) • Speed dial management • Voicemail PIN management http://1.2.3.4/bvsmweb/SRV.cgi?device=ID&cfoption=ACT www.senseofsecurity.com.au © Sense of Security 2014 Page 22 of 60 – Aug-14 Services • speeddials • changepinform • showcallfwd • callfwdmenu Actions • CallForwardAll • CallForwardBusy
  • 23. IP Phone management • Authentication and Authorisation free! • MAC address is sufficient • Jailbreaking tenant services ! • Viproy Modules • Call Forwarding • Speed Dial www.senseofsecurity.com.au © Sense of Security 2014 Page 23 of 60 – Aug-14
  • 24. Demonstration of VOSS attacks www.senseofsecurity.com.au © Sense of Security 2014 Page 24 of 60 – Aug-14
  • 25. Unified Communications • Forget TDM and PSTN • SIP, Skinny, H.248, RTP, MSAN/MGW • Smart customer modems & phones ! • Cisco UCM • Linux operating system • Web based management services • VoIP services (Skinny, SIP, RTP) • Essential network services (TFTP, DHCP) • Call centre, voicemail, value added services www.senseofsecurity.com.au © Sense of Security 2014 Page 25 of 60 – Aug-14
  • 26. Discovering VoIP servers • Looking for • Signalling servers (e.g. SIP, Skinny, H.323, H.248) • Proxy servers (e.g. RTP, SIP, SDP) • Contact Centre services • Voicemail and email integration • Call recordings, call data records, log servers ! • Discovering • Operating systems, versions and patch level • Management services (e.g. SNMP, Telnet, HTTP, SSH) • Weak or default credentials www.senseofsecurity.com.au © Sense of Security 2014 Page 26 of 60 – Aug-14
  • 27. Attacking SIP services • Essential analysis • Registration and invitation analysis • User enumeration, brute force for credentials • Discovery for SIP trunks, gateways and trusts • Caller ID spoofing (w/wo register or trunk) ! • Advanced analysis • Finding value added services and voicemail • SIP trust hacking • SIP proxy bounce attack www.senseofsecurity.com.au © Sense of Security 2014 Page 27 of 60 – Aug-14
  • 28. Cisco specific SIP registration • Extensions (e.g. 1001) • MAC address in Contact field • SIP digest authentication (user + password) • SIP x.509 authentication • All authentication elements must be valid! ! • Good news, we have SIP enumeration inputs! Warning: 399 bhcucm "Line not configured” Warning: 399 bhcucm "Unable to find device/user in database" Warning: 399 bhcucm "Unable to find a device handler for the request received on port 52852 from 192.168.0.101” Warning: 399 bhcucm "Device type mismatch" www.senseofsecurity.com.au © Sense of Security 2014 Page 28 of 60 – Aug-14
  • 29. Register and Subscribe www.senseofsecurity.com.au © Sense of Security 2014 Page 29 of 60 – Aug-14 Register / Subscribe (FROM, TO, Credentials)
  • 30. Invite, CDR and Billing tests www.senseofsecurity.com.au © Sense of Security 2014 Page 30 of 60 – Aug-14 Invite / Ack / Re-Invite / Update (FROM, TO, VIA, Credentials)
  • 31. SIP Proxy Bounce attack 192.168.1.145 - Sydney Production SIP Service 192.168.1.146 Melbourne 192.168.1.202 Brisbane www.senseofsecurity.com.au © Sense of Security 2014 Page 31 of 60 – Aug-14 SIP Proxy Bounce Attacks • SIP trust relationship hacking • Attacking inaccessible servers • Attacking the SIP software and protocol • Software, Version, Type, Realm
  • 32. Denial of Service attacks 192.168.1.145 - Sydney Production SIP Service 192.168.1.146 Melbourne 192.168.1.202 Brisbane IP spoofed UDP SIP request www.senseofsecurity.com.au © Sense of Security 2014 Page 32 of 60 – Aug-14 SIP based DoS attacks • UDP vulnerabilities and IP spoofing • Too many errors, very very verbose mode • ICMP errors Alderaan
  • 33. Hacking SIP trust relationships IP spoofed UDP SIP request From field has IP and Port 192.168.1.145 - Sydney Production SIP Service www.senseofsecurity.com.au © Sense of Security 2014 Page 33 of 60 – Aug-14 Send INVITE/MESSAGE requests with • IP spoofing (source is Brisbane), • from field contains Spoofed IP and Port, the caller ID will be your trusted host. 192.168.1.146 Melbourne 192.168.1.202 Brisbane UDP Trust Universal Trust Tatooine
  • 34. Attacking a client using SIP trust 192.168.1.145 - Sydney Production SIP Service www.senseofsecurity.com.au © Sense of Security 2014 Page 34 of 60 – Aug-14 IP spoofed UDP SIP request From field has bogus characters 192.168.1.146 Melbourne 192.168.1.202 Brisbane UDP Trust Universal Trust Tatooine It’s a TRAP! Send INVITE/MESSAGE requests with • IP spoofing (source is Brisbane), • from field contains special number, you will have fun or voicemail access.
  • 35. Toll fraud for CUCM • Cisco UCM accepts MAC address as identity • No authentication (secure deployment?) • Rogue SIP gateway with no authentication • Caller ID spoofing with proxy headers • Via field, From field • P-Asserted-Identity, P-Called-Party-ID • P-Preferred-Identity • ISDN Calling Party Number, Remote-Party-ID* • Billing bypass with proxy headers • P-Charging-Vector (Spoofing, Manipulating) • Re-Invite, Update (With/Without P-Charging-Vector) ! * https://tools.cisco.com/bugsearch/bug/CSCuo51517 www.senseofsecurity.com.au © Sense of Security 2014 Page 35 of 60 – Aug-14
  • 36. Remote-Party-ID header Source: Cisco CUCM SIP Line Messaging Guide www.senseofsecurity.com.au © Sense of Security 2014 Page 36 of 60 – Aug-14
  • 37. Caller ID spoofing on CUCM Remote-Party-ID header Remote-Party-ID: <sip:[email protected]>;party=called;screen=yes;privacy=off ! What for? • Caller ID spoofing • Billing bypass • Accessing voicemail • 3rd party operators www.senseofsecurity.com.au © Sense of Security 2014 Page 37 of 60 – Aug-14
  • 38. Caller ID fraud for all operators? • Telecom operators trust source Caller ID • One insecure operator to rule them all www.senseofsecurity.com.au © Sense of Security 2014 Page 38 of 60 – Aug-14
  • 39. Fake Caller ID for messages? • Call me back function on voicemail / calls • Sending many spoofed messages for DoS • Overseas? Roaming? • Social engineering (voicemail notification) • Value added services • Add a data package to my line • Subscribe me to a new mobile TV service • Reset my password/PIN/2FA • Group messages, celebrations www.senseofsecurity.com.au © Sense of Security 2014 Page 39 of 60 – Aug-14
  • 40. Demonstration of SIP attacks www.senseofsecurity.com.au © Sense of Security 2014 Page 40 of 60 – Aug-14
  • 41. VoIP client security • Different Client Types • Mobile, Desktop, Teleconference, Handsets • Information Disclosure • Unnecessary services and ports (SNMP, FTP) • Weak management services (Telnet, SSH, HTTP) • Stored credentials and sensitive information • Unauthorised Access • Password or TFTP attacks, enforced upgrades • Weak VoIP Services • Clients may accept direct invite, register or notify www.senseofsecurity.com.au © Sense of Security 2014 Page 41 of 60 – Aug-14
  • 42. Cisco VoIP clients • Cisco IP Phones • Cisco IP Communicator • Cisco Unified Personal Communicator • Cisco Webex Client • Cisco Jabber services • Cisco Jabber Voice/Video • IM for 3rd party clients • Mobile, desktop, Mac • Jabber SDK for web Source: www.arkadin.com www.senseofsecurity.com.au © Sense of Security 2014 Page 42 of 60 – Aug-14
  • 43. Rogue services and DSITM • Use ARP/DNS Spoof & VLAN hopping & Manual config • Collect credentials, hashes, information • Change client's request to add a feature (e.g. Spoofing) • Change the SDP features to redirect calls • Add a proxy header to bypass billing & CDR • Manipulate request at runtime to find BoF vulnerabilities • Trigger software upgrades for malwared executables www.senseofsecurity.com.au © Sense of Security 2014 Page 43 of 60 – Aug-14 Death Star in the Middle
  • 44. Attacking a client using SIP service • Caller ID spoofed messages • to install a malicious application or an SSL certificate • to redirect voicemails or calls • Fake caller ID for Scam, Vishing or Spying • Manipulate the content or content-type on messaging • Trigger a crash/BoF on the remote client • Inject cross-site scripting to the conversation ! • Proxies with TLS+TCP interception and manipulation • Viproxy (github.com/fozavci/viproxy) • MITMproxy www.senseofsecurity.com.au © Sense of Security 2014 Page 44 of 60 – Aug-14
  • 45. SMS phishing using SIP messages www.senseofsecurity.com.au © Sense of Security 2014 Page 45 of 60 – Aug-14
  • 46. Attacking a client using SIP trust • SIP server redirects a few fields to client • FROM, FROM NAME, Contact • Other fields depend on server (e.g. SDP, MIME) • Message content • Clients have buffer overflow in FROM? • Send 2000 chars to test it ! • Crash it or execute your shellcode if available • Clients trust SIP servers and trust is UDP based • Trust hacking module can be used for the trust between server and client too. • Viproy Penetration Testing Kit SIP Modules • Simple fuzz support (FROM=FUZZ 2000) • You can modify it for further attacks www.senseofsecurity.com.au © Sense of Security 2014 Page 46 of 60 – Aug-14
  • 47. Attacking a client using SIP trust 192.168.1.145 - Sydney Production SIP Service www.senseofsecurity.com.au © Sense of Security 2014 Page 47 of 60 – Aug-14 IP spoofed UDP SIP request From field has bogus characters 192.168.1.146 Melbourne 192.168.1.202 Brisbane UDP Trust Universal Trust Tatooine Crash! Adore iPhone App Send INVITE/MESSAGE requests with • IP spoofing (source is Brisbane), • from field contains exploit, the client will be your stormtrooper.
  • 48. Attacking clients using VoIP Video demo for SIP based client attacks www.senseofsecurity.com.au © Sense of Security 2014 Page 48 of 58 – Aug-14 • Manipulating instant messaging between clients • Initiate a call using fake Caller ID • Send a fake message from the Operator • Send bogus message to crash • Send too many calls and create a crash !
  • 49. Attacking Skinny services • Cisco Skinny (SCCP) • Binary, not plain text • Different versions • No authentication • MAC address is identity • Auto registration ! • Basic attacks • Register as a phone • Disconnect other phones • Call forwarding • Unauthorised calls Source: Cisco www.senseofsecurity.com.au © Sense of Security 2014 Page 49 of 60 – Aug-14
  • 50. Other Skinny researches • Skinny vulnerabilities published http://tools.cisco.com/security/center/content/ CiscoSecurityAdvisory/cisco-sa-20120229-cucm by Felix Lindner http://www.cisco.com/c/en/us/support/docs/csa/cisco-sa- 20100303-cucm.html by Sipera VIPER Lab • IxVoice SCCP (Skinny) Test Library • VIPER UCSniff supports Skinny • VIPER LAVA has Skinny support(?) ! VoIP Security not found. Did you mean Jason Ostrom? He is not only passionate about VoIP… www.senseofsecurity.com.au © Sense of Security 2014 Page 50 of 60 – Aug-14
  • 51. Attacking Skinny services www.senseofsecurity.com.au © Sense of Security 2014 Page 51 of 60 – Aug-14
  • 52. Attacking Skinny services Viproy has a Skinny library for easier development and sample attack modules • Skinny auto registration • Skinny register • Skinny call • Skinny call forwarding www.senseofsecurity.com.au © Sense of Security 2014 Page 52 of 60 – Aug-14
  • 53. Attacking Skinny services Everybody can develop a Skinny module now, even Ewoks! ! Register Unauthorised Call www.senseofsecurity.com.au © Sense of Security 2014 Page 53 of 60 – Aug-14
  • 54. Preparing a proper client for Skinny • Install Cisco IP Communicator • Change the MAC address of Windows • Register the software with this MAC www.senseofsecurity.com.au © Sense of Security 2014 Page 54 of 60 – Aug-14
  • 55. Demonstration of Skinny attacks www.senseofsecurity.com.au © Sense of Security 2014 Page 55 of 60 – Aug-14
  • 56. Summary www.senseofsecurity.com.au © Sense of Security 2014 Page of 60 – Aug-14 56 Hosted VoIP 101 Network Attacks Attacking CUCDM Attacking CUCM Attacking SIP Attacking Clients Attacking Skinny
  • 57. Solutions • Install the Cisco security patches • From CVE-2014-3277 to CVE-2014-3283, CVE-2014-2197, CVE-2014-3300 • CSCum75078, CSCun17309, CSCum77041, CSCuo51517, CSCum76930, CSCun49862 • Secure network design • IP phone services MUST be DEDICATED, not SHARED • Secure deployment with PKI • Authentication with X.509, software signatures • Secure SSL configuration • Secure protocols • Skinny authentication, SIP authentication • HTTP instead of TFTP, SSH instead of Telnet www.senseofsecurity.com.au © Sense of Security 2014 Page 57 of 60 – Aug-14
  • 58. References • Viproy Homepage and Documentation http://www.viproy.com ! • Attacking SIP servers using Viproy VoIP Kit https://www.youtube.com/watch?v=AbXh_L0-Y5A ! • VoIP Pen-Test Environment – VulnVoIP http://www.rebootuser.com/?cat=371 ! • Credits and thanks go to… Sense of Security Team, Jason Ostrom, Mark Collier, Paul Henry, Sandro Gauci www.senseofsecurity.com.au © Sense of Security 2014 Page 58 of 60 – Aug-14
  • 59. Questions ? www.senseofsecurity.com.au © Sense of Security 2014 Page 59 of 60 – Aug-14
  • 60. Thank you Recognised as Australia’s fastest growing information security and risk management consulting firm through the Deloitte Technology Fast 50 & BRW Fast 100 programs Head office is level 8, 66 King Street, Sydney, NSW 2000, Australia. Owner of trademark and all copyright is Sense of Security Pty Ltd. Neither text or images can be reproduced without written permission. T: 1300 922 923 T: +61 (0) 2 9290 4444 F: +61 (0) 2 9290 4455 [email protected] www.senseofsecurity.com.au www.senseofsecurity.com.au © Sense of Security 2014 Page of 60 60 – Aug-14