The Black Bag Security  Review Dan York, CISSP Emerging Telephony 2007
The Story of SysAdmin Steve Part 1
Once upon a time...
big company
smaller company
promotion
IT
phones, too!
new VoIP system
net head
V
Voice
SIP
open standard
Security Isn’t Possible
education
IP-PBX SIP Service Provider LAN Internet PSTN
cheap
merged
quit
?
new IT staff
Juvenile Joe
BOFH
read e-mail
monitor
comment
playground
exploit chaos
fun
ultimate truism
voice = packets
packets = bits
bits can be manipulated
“ VoIP security tools”
tools, tools, tools
voipsa.org
hackingvoip.com
sectools.org
tools, tools, tools
good
evil
test/defend
attack
perspective
white hat
black hat
wireshark the tool formerly known as Ethereal
 
cain & abel
RTP
WAV
MP3s
iPod
2-hour commute
corporate conversations
personal iPod
corporate conversations
personal iPod
(scared yet?)
conversations
PIN
voicemail PINs
banking PINs
DTMF decoder
(fun stuff, eh?)
Teleworker Ted
envy
grudge
hang up Ted
cell phone
devious
mix in new background
amusement park
screaming kids
dog
Ted’s dog
endless barking
no clue
Process Paul
new rules
worked late
wife
female
no clue
???
insecure firewall
family
SIP softphone
free long distance
(toll fraud)
Board conf calls
revenues in the tank
acquisition
only hope
IT outsourced
job
(Uh-oh)
war
SIP trunk
unencrypted
sniff CID
lawyers
CFO
SIP Redirect
random extension
shipping
HR
labs
kitchen
?
acquire?
@#$@?%$!
SysAdmin Steve
fix it
DoS
BYE
hang up CEO
set reload
erase SIP registration
busy
packet flood
degrade
cell phones
acquire?
@#$@?%$!
SysAdmin Steve
fix it
3 strikes
investigation
truth
discovered
heart attack
SIP trunk
unencrypted
corporate conversations
public Internet
clear
call records
public Internet
cleartext
(not good)
plan
Fire Joe!
defense in depth
layers
encryption
voice
call control
LAN
SIP trunk
clueless
new provider
call accounting
IP network
VLANs
IDS/IPS
monitoring
rate throttling
secure perimeter
firewall traversal
firmware
o/s patches
disable services
die, default passwords, die, die, die
layers
secure VoIP
caveat
internal
disgruntled
x%?
compromised servers
spyware
unsecured WiFi
(checked your parking lot lately?)
offline analysis
SIP trunk
$$$
security
(differentiator?)
Botnet Bob
zombies
fun
profit
Criminal Chris
espionage
identity theft
human replay attack
Spammer Sue
SPIT
1,000s of calls
“ significant event”
Congressman
mistress
public official
porn line
identity theft
13-yr-old
podcast
Wall Street Journal
“ VOIP IS INSECURE!”
moral
VoIP *can* be secure
work
plan
questions
education
good news
voipsa.org
VOIPSA Threat Taxonomy
VOIPSA  Best Practices
VOIPSEC  mailing list
blueboxpodcast.com
 
(if you’re not reading them, be aware the attackers ARE!)
defense in depth
layers and layers
voice
call control
SIP trunks
management interfaces / APIs
PSTN interfaces
PSTN
voip = IP + PSTN
it’s the network, stupid
IP network
voice = packets
packets = bits
bits can be manipulated
VoIP *can* be secure
work
plan
SysAdmin Steve?
happily ever after?
acquisition?
job?
CIO?
another story
To be continued...
The End (or is it the beginning?)
Please practice safe VoIP!
Q&eh? www.voipsa.org www.voipsa.org/blog www.blueboxpodcast.com www.disruptivetelephony.com www.mitel.com
Thank you (Please practice safe VoIP!)

More Related Content

PPT
identity theft
PDF
Facebook Password Sniper
DOCX
Qué es relata ( antes renata)
PDF
Indital SS catalog
PDF
Biophoton.doc [modo de compatibilidad]
PDF
Ceny a obsah dodávateľského prieskumu
PDF
Promoción de lectura
identity theft
Facebook Password Sniper
Qué es relata ( antes renata)
Indital SS catalog
Biophoton.doc [modo de compatibilidad]
Ceny a obsah dodávateľského prieskumu
Promoción de lectura

Viewers also liked (18)

PDF
PDF
Programa. Foro para la igualdad 2014 - octubre
KEY
Open source enterprise search and retrieval platform
PPTX
Oscar david toro
PDF
Rafael Carranza: La Batalla de Yungay. 1939.
PDF
54. Euskal Soziometroa -Bakea eta Bizikidetza / Sociometro Vasco 54 -Paz y Co...
PDF
Precios reducidos
PDF
Edisi nasional1710
PPTX
Quién da mas
PDF
Sommerbuchtipps Ihrer Buchhandlung - Nordbuch Marketing
PDF
Guidebook+for+erasmus.doc
DOC
Sobre el planeta del principito
PPTX
fiesta del albariño maria sofia sp
PDF
HorizonsVol20Iss1_Online_spreads
PPSX
Presentacion Plan de Unidad
PDF
Rsgn 2128-2014-minedu
PPT
Inc29 13-i
PDF
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Programa. Foro para la igualdad 2014 - octubre
Open source enterprise search and retrieval platform
Oscar david toro
Rafael Carranza: La Batalla de Yungay. 1939.
54. Euskal Soziometroa -Bakea eta Bizikidetza / Sociometro Vasco 54 -Paz y Co...
Precios reducidos
Edisi nasional1710
Quién da mas
Sommerbuchtipps Ihrer Buchhandlung - Nordbuch Marketing
Guidebook+for+erasmus.doc
Sobre el planeta del principito
fiesta del albariño maria sofia sp
HorizonsVol20Iss1_Online_spreads
Presentacion Plan de Unidad
Rsgn 2128-2014-minedu
Inc29 13-i
Reports on Fairness aware and privacy preserving friend matching protocol in ...
Ad

Similar to ETel2007: The Black Bag Security Review (VoIP Security) (20)

PPT
VoIP Security
PPT
Voippresentation
PDF
Voip (In)Security - AfricaHackOn v2
PPT
Meletis Belsis - Voip security
PDF
It’s time to boost VoIP network security
PDF
VoIP security
PPT
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
PPTX
Positive Hack Days. Gritsai. VOIP insecurities workshop
PPTX
SMB Communications - is VoIP secure?
PPT
Cd213 percy-audiocodes
PDF
Voice over IP
PPTX
Protect your IPPBX against VOIP attacks
PDF
SIP, Unified Communications (UC) and Security
PPTX
An approach to mitigate DDoS attacks on SIP.pptx
PPT
Voice Over IP Overview w/Secuirty
PPT
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
PPTX
Netas Nova Cyber Security Product Family
PPT
Common VoIP Security Issues and Solutions
PPT
Generic Voice Security Issues
VoIP Security
Voippresentation
Voip (In)Security - AfricaHackOn v2
Meletis Belsis - Voip security
It’s time to boost VoIP network security
VoIP security
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
Positive Hack Days. Gritsai. VOIP insecurities workshop
SMB Communications - is VoIP secure?
Cd213 percy-audiocodes
Voice over IP
Protect your IPPBX against VOIP attacks
SIP, Unified Communications (UC) and Security
An approach to mitigate DDoS attacks on SIP.pptx
Voice Over IP Overview w/Secuirty
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Netas Nova Cyber Security Product Family
Common VoIP Security Issues and Solutions
Generic Voice Security Issues
Ad

More from Dan York (15)

PDF
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
PDF
SIPNOC 2014 - Is It Time For TLS for SIP?
PPTX
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
PDF
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
PDF
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
PDF
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
PDF
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
PDF
How IPv6 Will Kill Telecom - And What We Need To Do About It
PDF
ClueCon2009: The Security Saga of SysAdmin Steve
PDF
SIP Trunking & Security in an Enterprise Network
PDF
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
PDF
IP Telephony Security 101
PDF
Recording Remote Hosts/Interviews with VoIP/Skype
PDF
Hacking and Attacking VoIP Systems - What You Need To Know
PPT
BLISS Problem Statement and Motivation
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
SIPNOC 2014 - Is It Time For TLS for SIP?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
How IPv6 Will Kill Telecom - And What We Need To Do About It
ClueCon2009: The Security Saga of SysAdmin Steve
SIP Trunking & Security in an Enterprise Network
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
IP Telephony Security 101
Recording Remote Hosts/Interviews with VoIP/Skype
Hacking and Attacking VoIP Systems - What You Need To Know
BLISS Problem Statement and Motivation

Recently uploaded (20)

PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
Training Program for knowledge in solar cell and solar industry
MuleSoft-Compete-Deck for midddleware integrations
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Early detection and classification of bone marrow changes in lumbar vertebrae...
Module 1 Introduction to Web Programming .pptx
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Comparative analysis of machine learning models for fake news detection in so...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Advancing precision in air quality forecasting through machine learning integ...
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV

ETel2007: The Black Bag Security Review (VoIP Security)