SlideShare a Scribd company logo
1 of 27
Download to read offline
Your Hosts
Markus Ehlers Oliver Wittig
Agenda
•Typical threads in VoIP
•Physical access thread
•What can the vendor do
•Secure Calling in AskoziaPBX
Possible attack points in VoIP
Router
+
Firewall
IP phone
Soft clients
Phone application
+
Web portal
How to find vulnerable devices?
Typical threats in VoIP
Spam over Internet Telephony
Broadcast of messages via VoIP
Eavesdropping
Secretly listening to private conversations
Service Abuse
VoIP fraud
Denial of Service attacks
Attempts to prevent legitimate use

of services
Physical Access
IP phones as entry point into the network
Spam over Internet Telephony
Problem
• Bulk unsolicited, automatically dialled, pre-
recorded phone calls using VoIP protocols
• The spammer attempts to initiate a voice
session and then relays a pre-recorded
message if the receiver answers.
Measures
• Only accept SIP invites from trusted hosts
(SIP registrar)
• Encrypt SIP credentials (SIP over TLS)
• Enforce client cert authentication at SIP
server
Eavesdropping
Problem
• Capturing and Decoding VoIP Traffic on
the network
• Tools like Wireshark can decode RTP
streams into playable audio format
Measures
• Always encrypt RTP packets (SRTP)
Service Abuse
Problem
• Automatic dialling of toll numbers and long
distance
• Set up of blind transfer and erase setting
server URL of a hacked device
• Call forwarding from one toll number to a
second doubles the “income”
Measures
• Secure web server (HTTPS) or switch it off
completely
• Deploy phone in user mode and use a
strong admin mode password
• Always put a router between phone and
the Internet
Physical access to the network
Problem
• An IP phone is a possible entrance gate
into the corporate network
• Network switch can enable illicit access for
unauthorised devices
Measures
• Snom phones support 802.1x
• IEEE 802.1X is an IEEE Standard for port-
based Network Access Control (PNAC). It
is part of the IEEE 802.1 group of
networking protocols.
• It provides an authentication mechanism
to devices wishing to attach to a LAN or
WLAN.
802.1x the big fear / effort
Problem
• port authentication sounds easy
• do not confuse it with MAB
• do not expect its all like Wifi or PCs
• certificate bases authentication involves
• staging or automatic rollout
• revocation / replacing / updating of
certificates
Measures
• build a skilled team
• network, switches
• radius guest and productive
• provisioning guest and productive
• sit together and plan realistically
• security audit needs
• technical draw backs
Denial of Service attacks
Problem
• A denial-of-service (DoS) attack is a cyber-
attack where the perpetrator seeks to
make a machine or network resource
(services) unavailable to its intended
users.
• DoS is typically accomplished by flooding
the targeted machine or resource with
superfluous requests in an attempt to
overload systems.
Measures
• Snom has secured its redirection server
against possible DoS attacks
• Service provider need to take necessary
measures to ensure the availability of their
service
What can the vendor do?
A hack that isn’t a hack
• Snom’s security measures are sufficient to avoid a hack
• In a SoHo / do it yourself environment, if users disregard warnings and
security advice, it is their responsibility.
• Almost every phone used in a business environment is auto-
provisioned, i.e. all necessary passwords are set automatically with
the initial deployment of the phone.
• But….whats once on the www stays there forever.
External security audit
• Manipulation of a phone in the local network, possible by cross site
scripting vulnerabilities
• Path traversal filter bypass
• URLs “../“ could access hidden folders
• VPN profile enabled to run malware on phone
• Bypass of authentication and gain of admin rights
• when restrict_uri_queries and use_hidden_tags were set to “off”
Actions taken
• All detected security leaks have been closed, provided with a firmware
update
• Best practise guide was provided, as some users disregard alerts and
notifications
http://wiki.snom.com/FAQ/How_do_I_secure_my_phone
Further enhancements in security
• Factory installed SHA-256 certificates on the phones
• Got rid of weak ciphers (TLS), according to Mozilla.org best practises
• Disabled SSLv3 to avoid POODLE (Padding Oracle On Downgraded
Legacy Encryption)
• Regular updates of root file system with latest security patches
New devices from Snom
Snom new D300 series
High resolution screens
Improved audio quality
2nd screen for fkey labelling
Bluetooth built-in + USB
Font embedded icons
Features depending on model
D305/315 D345 D375
New D745 model
Dual high-resolution displays
8x4 configurable, self-labelling, multicolored LED keys
Gigabit switch
USB port
Wideband audio
12 SIP identities
Secure Calling in Askozia
Secure Calling in Askozia
Secure Calling in Askozia
Secure Calling in Askozia
Secure Calling in Askozia
Secure Calling in Askozia
Questions?
Time to wake up!
markus.ehlers@askozia.com

More Related Content

What's hot

Information Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgInformation Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgEric Vanderburg
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurityehsangha
 
Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Fatih Ozavci
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopPriyanka Aash
 
Exploiting appliances presentation v1.1-vids-removed
Exploiting appliances   presentation  v1.1-vids-removedExploiting appliances   presentation  v1.1-vids-removed
Exploiting appliances presentation v1.1-vids-removedNCC Group
 
Security Benefits of Firewall Protection
Security Benefits of Firewall ProtectionSecurity Benefits of Firewall Protection
Security Benefits of Firewall Protectiondavid rom
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Positive Hack Days
 
Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoCWesley Li
 
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...Askozia
 
Voippresentation
VoippresentationVoippresentation
Voippresentationeliran2
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate PresentationRohit Kumar
 
Peters foods presentation 04 12
Peters foods presentation 04 12Peters foods presentation 04 12
Peters foods presentation 04 12ashleyiras
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringSam Bowne
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosPriyanka Aash
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
SphereShield for Zoom - Compliance and Security
SphereShield for Zoom - Compliance and SecuritySphereShield for Zoom - Compliance and Security
SphereShield for Zoom - Compliance and SecurityYoav Crombie
 

What's hot (20)

Information Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgInformation Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric Vanderburg
 
Outpost networksecurity
Outpost networksecurityOutpost networksecurity
Outpost networksecurity
 
Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Exploiting appliances presentation v1.1-vids-removed
Exploiting appliances   presentation  v1.1-vids-removedExploiting appliances   presentation  v1.1-vids-removed
Exploiting appliances presentation v1.1-vids-removed
 
Workspace Technology
Workspace TechnologyWorkspace Technology
Workspace Technology
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
WiFi security
WiFi security WiFi security
WiFi security
 
Security Benefits of Firewall Protection
Security Benefits of Firewall ProtectionSecurity Benefits of Firewall Protection
Security Benefits of Firewall Protection
 
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
Privacy and Security in the Internet of Things / Конфиденциальность и безопас...
 
Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoC
 
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
How to connect external IP phones with AskoziaPBX through VPN - webinar 2016,...
 
Voippresentation
VoippresentationVoippresentation
Voippresentation
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Peters foods presentation 04 12
Peters foods presentation 04 12Peters foods presentation 04 12
Peters foods presentation 04 12
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
SphereShield for Zoom - Compliance and Security
SphereShield for Zoom - Compliance and SecuritySphereShield for Zoom - Compliance and Security
SphereShield for Zoom - Compliance and Security
 

Viewers also liked

10 reasons for your costumers for choosing Askozia - webinar 2017, English
10 reasons for your costumers for choosing Askozia - webinar 2017, English10 reasons for your costumers for choosing Askozia - webinar 2017, English
10 reasons for your costumers for choosing Askozia - webinar 2017, EnglishAskozia
 
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...Askozia
 
5 Benefits of Telecommuting
5 Benefits of Telecommuting5 Benefits of Telecommuting
5 Benefits of Telecommutingpascom
 
What is VoIP
What is VoIPWhat is VoIP
What is VoIPpascom
 
Benefits of VoIP
Benefits of VoIPBenefits of VoIP
Benefits of VoIPpascom
 
Wie der Wechsel von ISDN auf VoIP gelingen kann - Webinar 2016, deutsch
Wie der Wechsel von ISDN auf VoIP gelingen kann - Webinar 2016, deutschWie der Wechsel von ISDN auf VoIP gelingen kann - Webinar 2016, deutsch
Wie der Wechsel von ISDN auf VoIP gelingen kann - Webinar 2016, deutschAskozia
 
SIP-Relaismodule mit AskoziaPBX - Webinar 2016, deutsch
SIP-Relaismodule mit AskoziaPBX - Webinar 2016, deutschSIP-Relaismodule mit AskoziaPBX - Webinar 2016, deutsch
SIP-Relaismodule mit AskoziaPBX - Webinar 2016, deutschAskozia
 
ionas Business-Server mit integrierter AskoziaPBX - Webinar 2016, deutsch
ionas Business-Server mit integrierter AskoziaPBX - Webinar 2016, deutschionas Business-Server mit integrierter AskoziaPBX - Webinar 2016, deutsch
ionas Business-Server mit integrierter AskoziaPBX - Webinar 2016, deutschAskozia
 
Forgotten Benefits of VoIP
Forgotten Benefits of VoIPForgotten Benefits of VoIP
Forgotten Benefits of VoIPpascom
 
pascom Corporate Profile
pascom Corporate Profilepascom Corporate Profile
pascom Corporate Profilepascom
 
Essential VoIP Features InfoGraphic
Essential VoIP Features InfoGraphicEssential VoIP Features InfoGraphic
Essential VoIP Features InfoGraphicpascom
 
mobydick and beroNet UC Solutions
mobydick and beroNet UC Solutionsmobydick and beroNet UC Solutions
mobydick and beroNet UC Solutionspascom
 
10 Gründe für AskoziaPBX für Unternehmen - Webinar 2017, deutsch
10 Gründe für AskoziaPBX für Unternehmen - Webinar 2017, deutsch10 Gründe für AskoziaPBX für Unternehmen - Webinar 2017, deutsch
10 Gründe für AskoziaPBX für Unternehmen - Webinar 2017, deutschAskozia
 
CL_Times_Newsletter_Spr2014_Final[1]
CL_Times_Newsletter_Spr2014_Final[1]CL_Times_Newsletter_Spr2014_Final[1]
CL_Times_Newsletter_Spr2014_Final[1]Alexey Belousov
 
49C9D647-48FA-40AF-87FB-C9C33C8F1E79:Maranda
49C9D647-48FA-40AF-87FB-C9C33C8F1E79:Maranda49C9D647-48FA-40AF-87FB-C9C33C8F1E79:Maranda
49C9D647-48FA-40AF-87FB-C9C33C8F1E79:MarandaMaranda Patton
 
Funcións e compoñentes do S.O.
Funcións e compoñentes do S.O.Funcións e compoñentes do S.O.
Funcións e compoñentes do S.O.antonio freire
 
What’s new in version 5 of AskoziaPBX? - webinar 2016, English
What’s new in version 5 of AskoziaPBX? - webinar 2016, EnglishWhat’s new in version 5 of AskoziaPBX? - webinar 2016, English
What’s new in version 5 of AskoziaPBX? - webinar 2016, EnglishAskozia
 
Herramientas para el mantenimiento del pc
Herramientas para el mantenimiento del pcHerramientas para el mantenimiento del pc
Herramientas para el mantenimiento del pcJorge Ruiz Velez
 

Viewers also liked (20)

10 reasons for your costumers for choosing Askozia - webinar 2017, English
10 reasons for your costumers for choosing Askozia - webinar 2017, English10 reasons for your costumers for choosing Askozia - webinar 2017, English
10 reasons for your costumers for choosing Askozia - webinar 2017, English
 
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
 
5 Benefits of Telecommuting
5 Benefits of Telecommuting5 Benefits of Telecommuting
5 Benefits of Telecommuting
 
What is VoIP
What is VoIPWhat is VoIP
What is VoIP
 
Benefits of VoIP
Benefits of VoIPBenefits of VoIP
Benefits of VoIP
 
Wie der Wechsel von ISDN auf VoIP gelingen kann - Webinar 2016, deutsch
Wie der Wechsel von ISDN auf VoIP gelingen kann - Webinar 2016, deutschWie der Wechsel von ISDN auf VoIP gelingen kann - Webinar 2016, deutsch
Wie der Wechsel von ISDN auf VoIP gelingen kann - Webinar 2016, deutsch
 
SIP-Relaismodule mit AskoziaPBX - Webinar 2016, deutsch
SIP-Relaismodule mit AskoziaPBX - Webinar 2016, deutschSIP-Relaismodule mit AskoziaPBX - Webinar 2016, deutsch
SIP-Relaismodule mit AskoziaPBX - Webinar 2016, deutsch
 
ionas Business-Server mit integrierter AskoziaPBX - Webinar 2016, deutsch
ionas Business-Server mit integrierter AskoziaPBX - Webinar 2016, deutschionas Business-Server mit integrierter AskoziaPBX - Webinar 2016, deutsch
ionas Business-Server mit integrierter AskoziaPBX - Webinar 2016, deutsch
 
Forgotten Benefits of VoIP
Forgotten Benefits of VoIPForgotten Benefits of VoIP
Forgotten Benefits of VoIP
 
pascom Corporate Profile
pascom Corporate Profilepascom Corporate Profile
pascom Corporate Profile
 
Essential VoIP Features InfoGraphic
Essential VoIP Features InfoGraphicEssential VoIP Features InfoGraphic
Essential VoIP Features InfoGraphic
 
mobydick and beroNet UC Solutions
mobydick and beroNet UC Solutionsmobydick and beroNet UC Solutions
mobydick and beroNet UC Solutions
 
10 Gründe für AskoziaPBX für Unternehmen - Webinar 2017, deutsch
10 Gründe für AskoziaPBX für Unternehmen - Webinar 2017, deutsch10 Gründe für AskoziaPBX für Unternehmen - Webinar 2017, deutsch
10 Gründe für AskoziaPBX für Unternehmen - Webinar 2017, deutsch
 
Historia de office
Historia de officeHistoria de office
Historia de office
 
CL_Times_Newsletter_Spr2014_Final[1]
CL_Times_Newsletter_Spr2014_Final[1]CL_Times_Newsletter_Spr2014_Final[1]
CL_Times_Newsletter_Spr2014_Final[1]
 
49C9D647-48FA-40AF-87FB-C9C33C8F1E79:Maranda
49C9D647-48FA-40AF-87FB-C9C33C8F1E79:Maranda49C9D647-48FA-40AF-87FB-C9C33C8F1E79:Maranda
49C9D647-48FA-40AF-87FB-C9C33C8F1E79:Maranda
 
Briick Resume
Briick ResumeBriick Resume
Briick Resume
 
Funcións e compoñentes do S.O.
Funcións e compoñentes do S.O.Funcións e compoñentes do S.O.
Funcións e compoñentes do S.O.
 
What’s new in version 5 of AskoziaPBX? - webinar 2016, English
What’s new in version 5 of AskoziaPBX? - webinar 2016, EnglishWhat’s new in version 5 of AskoziaPBX? - webinar 2016, English
What’s new in version 5 of AskoziaPBX? - webinar 2016, English
 
Herramientas para el mantenimiento del pc
Herramientas para el mantenimiento del pcHerramientas para el mantenimiento del pc
Herramientas para el mantenimiento del pc
 

Similar to Secure calling for IP telephony - webinar 2016, English

Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in networkTanveer Malik
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systemsfajjarrehman
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedFelipe Prado
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 

Similar to Secure calling for IP telephony - webinar 2016, English (20)

Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in network
 
Presentation
PresentationPresentation
Presentation
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 

More from Askozia

Askozia Telefonanlage: Fallstudie einer DECT-Installation
Askozia Telefonanlage: Fallstudie einer DECT-InstallationAskozia Telefonanlage: Fallstudie einer DECT-Installation
Askozia Telefonanlage: Fallstudie einer DECT-InstallationAskozia
 
Askozia y snom presentan su solución integrada
Askozia y snom presentan su solución integradaAskozia y snom presentan su solución integrada
Askozia y snom presentan su solución integradaAskozia
 
IX Interconnection add-on for AskoziaPBX - webinar 2017, English
IX Interconnection add-on for AskoziaPBX - webinar 2017, EnglishIX Interconnection add-on for AskoziaPBX - webinar 2017, English
IX Interconnection add-on for AskoziaPBX - webinar 2017, EnglishAskozia
 
IX Interconnection Add-on für AskoziaPBX - Webinar 2017, deutsch
IX Interconnection Add-on für AskoziaPBX - Webinar 2017, deutschIX Interconnection Add-on für AskoziaPBX - Webinar 2017, deutsch
IX Interconnection Add-on für AskoziaPBX - Webinar 2017, deutschAskozia
 
Wie Sie Ihr Unternehmen vor Cyber-Attacken schützen können - webinar 2017, de...
Wie Sie Ihr Unternehmen vor Cyber-Attacken schützen können - webinar 2017, de...Wie Sie Ihr Unternehmen vor Cyber-Attacken schützen können - webinar 2017, de...
Wie Sie Ihr Unternehmen vor Cyber-Attacken schützen können - webinar 2017, de...Askozia
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia
 
How to prepare a DECT installation - webinar 2016, English
How to prepare a DECT installation - webinar 2016, EnglishHow to prepare a DECT installation - webinar 2016, English
How to prepare a DECT installation - webinar 2016, EnglishAskozia
 
Was bei einer DECT-Installation zu beachten ist - Webinar 2016, deutsch
Was bei einer DECT-Installation zu beachten ist - Webinar 2016, deutschWas bei einer DECT-Installation zu beachten ist - Webinar 2016, deutsch
Was bei einer DECT-Installation zu beachten ist - Webinar 2016, deutschAskozia
 
How to set up emergency numbers in AskoziaPBX - webinar 2016, English
How to set up emergency numbers in AskoziaPBX - webinar 2016, EnglishHow to set up emergency numbers in AskoziaPBX - webinar 2016, English
How to set up emergency numbers in AskoziaPBX - webinar 2016, EnglishAskozia
 
Notrufnummern korrekt einrichten - Webinar 2016, deutsch
Notrufnummern korrekt einrichten - Webinar 2016, deutschNotrufnummern korrekt einrichten - Webinar 2016, deutsch
Notrufnummern korrekt einrichten - Webinar 2016, deutschAskozia
 
How to switch from analog or ISDN to VoIP - webinar 2016, English
How to switch from analog or ISDN to VoIP - webinar 2016, EnglishHow to switch from analog or ISDN to VoIP - webinar 2016, English
How to switch from analog or ISDN to VoIP - webinar 2016, EnglishAskozia
 
Anbindung externer IP-Telefone via VPN - Webinar 2016, deutsch
Anbindung externer IP-Telefone via VPN - Webinar 2016, deutschAnbindung externer IP-Telefone via VPN - Webinar 2016, deutsch
Anbindung externer IP-Telefone via VPN - Webinar 2016, deutschAskozia
 
Combining an External pfSense firewall with AskoziaPBX - webinar 2016, English
Combining an External pfSense firewall with AskoziaPBX - webinar 2016, EnglishCombining an External pfSense firewall with AskoziaPBX - webinar 2016, English
Combining an External pfSense firewall with AskoziaPBX - webinar 2016, EnglishAskozia
 
Anbindung einer externen pfSense Firewall - Webinar 2016, deutsch
Anbindung einer externen pfSense Firewall - Webinar 2016, deutschAnbindung einer externen pfSense Firewall - Webinar 2016, deutsch
Anbindung einer externen pfSense Firewall - Webinar 2016, deutschAskozia
 
Hürden bei einer Rufnummernportierung - Webinar 2016, deutsch
Hürden bei einer Rufnummernportierung - Webinar 2016, deutschHürden bei einer Rufnummernportierung - Webinar 2016, deutsch
Hürden bei einer Rufnummernportierung - Webinar 2016, deutschAskozia
 
Basic troubleshooting for Askozia IP PBX phone systems - webinar 2016, English
Basic troubleshooting for Askozia IP PBX phone systems - webinar 2016, EnglishBasic troubleshooting for Askozia IP PBX phone systems - webinar 2016, English
Basic troubleshooting for Askozia IP PBX phone systems - webinar 2016, EnglishAskozia
 
Askozia 5 features: Stateboard and Client User Interface - webinar 2016, English
Askozia 5 features: Stateboard and Client User Interface - webinar 2016, EnglishAskozia 5 features: Stateboard and Client User Interface - webinar 2016, English
Askozia 5 features: Stateboard and Client User Interface - webinar 2016, EnglishAskozia
 
Grundlegende Fehleranalyse für Askozia IP-Telefonanlagen - Webinar 2016, deutsch
Grundlegende Fehleranalyse für Askozia IP-Telefonanlagen - Webinar 2016, deutschGrundlegende Fehleranalyse für Askozia IP-Telefonanlagen - Webinar 2016, deutsch
Grundlegende Fehleranalyse für Askozia IP-Telefonanlagen - Webinar 2016, deutschAskozia
 
Was ist neu in Version 5 der Askozia IP-Telefonanlage? - Webinar 2016, deutsch
Was ist neu in Version 5 der Askozia IP-Telefonanlage? - Webinar 2016, deutschWas ist neu in Version 5 der Askozia IP-Telefonanlage? - Webinar 2016, deutsch
Was ist neu in Version 5 der Askozia IP-Telefonanlage? - Webinar 2016, deutschAskozia
 
AskoziaPBX and snom M700 DECT for workplace mobility - webinar 2016, English
AskoziaPBX and snom M700 DECT for workplace mobility - webinar 2016, EnglishAskoziaPBX and snom M700 DECT for workplace mobility - webinar 2016, English
AskoziaPBX and snom M700 DECT for workplace mobility - webinar 2016, EnglishAskozia
 

More from Askozia (20)

Askozia Telefonanlage: Fallstudie einer DECT-Installation
Askozia Telefonanlage: Fallstudie einer DECT-InstallationAskozia Telefonanlage: Fallstudie einer DECT-Installation
Askozia Telefonanlage: Fallstudie einer DECT-Installation
 
Askozia y snom presentan su solución integrada
Askozia y snom presentan su solución integradaAskozia y snom presentan su solución integrada
Askozia y snom presentan su solución integrada
 
IX Interconnection add-on for AskoziaPBX - webinar 2017, English
IX Interconnection add-on for AskoziaPBX - webinar 2017, EnglishIX Interconnection add-on for AskoziaPBX - webinar 2017, English
IX Interconnection add-on for AskoziaPBX - webinar 2017, English
 
IX Interconnection Add-on für AskoziaPBX - Webinar 2017, deutsch
IX Interconnection Add-on für AskoziaPBX - Webinar 2017, deutschIX Interconnection Add-on für AskoziaPBX - Webinar 2017, deutsch
IX Interconnection Add-on für AskoziaPBX - Webinar 2017, deutsch
 
Wie Sie Ihr Unternehmen vor Cyber-Attacken schützen können - webinar 2017, de...
Wie Sie Ihr Unternehmen vor Cyber-Attacken schützen können - webinar 2017, de...Wie Sie Ihr Unternehmen vor Cyber-Attacken schützen können - webinar 2017, de...
Wie Sie Ihr Unternehmen vor Cyber-Attacken schützen können - webinar 2017, de...
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, English
 
How to prepare a DECT installation - webinar 2016, English
How to prepare a DECT installation - webinar 2016, EnglishHow to prepare a DECT installation - webinar 2016, English
How to prepare a DECT installation - webinar 2016, English
 
Was bei einer DECT-Installation zu beachten ist - Webinar 2016, deutsch
Was bei einer DECT-Installation zu beachten ist - Webinar 2016, deutschWas bei einer DECT-Installation zu beachten ist - Webinar 2016, deutsch
Was bei einer DECT-Installation zu beachten ist - Webinar 2016, deutsch
 
How to set up emergency numbers in AskoziaPBX - webinar 2016, English
How to set up emergency numbers in AskoziaPBX - webinar 2016, EnglishHow to set up emergency numbers in AskoziaPBX - webinar 2016, English
How to set up emergency numbers in AskoziaPBX - webinar 2016, English
 
Notrufnummern korrekt einrichten - Webinar 2016, deutsch
Notrufnummern korrekt einrichten - Webinar 2016, deutschNotrufnummern korrekt einrichten - Webinar 2016, deutsch
Notrufnummern korrekt einrichten - Webinar 2016, deutsch
 
How to switch from analog or ISDN to VoIP - webinar 2016, English
How to switch from analog or ISDN to VoIP - webinar 2016, EnglishHow to switch from analog or ISDN to VoIP - webinar 2016, English
How to switch from analog or ISDN to VoIP - webinar 2016, English
 
Anbindung externer IP-Telefone via VPN - Webinar 2016, deutsch
Anbindung externer IP-Telefone via VPN - Webinar 2016, deutschAnbindung externer IP-Telefone via VPN - Webinar 2016, deutsch
Anbindung externer IP-Telefone via VPN - Webinar 2016, deutsch
 
Combining an External pfSense firewall with AskoziaPBX - webinar 2016, English
Combining an External pfSense firewall with AskoziaPBX - webinar 2016, EnglishCombining an External pfSense firewall with AskoziaPBX - webinar 2016, English
Combining an External pfSense firewall with AskoziaPBX - webinar 2016, English
 
Anbindung einer externen pfSense Firewall - Webinar 2016, deutsch
Anbindung einer externen pfSense Firewall - Webinar 2016, deutschAnbindung einer externen pfSense Firewall - Webinar 2016, deutsch
Anbindung einer externen pfSense Firewall - Webinar 2016, deutsch
 
Hürden bei einer Rufnummernportierung - Webinar 2016, deutsch
Hürden bei einer Rufnummernportierung - Webinar 2016, deutschHürden bei einer Rufnummernportierung - Webinar 2016, deutsch
Hürden bei einer Rufnummernportierung - Webinar 2016, deutsch
 
Basic troubleshooting for Askozia IP PBX phone systems - webinar 2016, English
Basic troubleshooting for Askozia IP PBX phone systems - webinar 2016, EnglishBasic troubleshooting for Askozia IP PBX phone systems - webinar 2016, English
Basic troubleshooting for Askozia IP PBX phone systems - webinar 2016, English
 
Askozia 5 features: Stateboard and Client User Interface - webinar 2016, English
Askozia 5 features: Stateboard and Client User Interface - webinar 2016, EnglishAskozia 5 features: Stateboard and Client User Interface - webinar 2016, English
Askozia 5 features: Stateboard and Client User Interface - webinar 2016, English
 
Grundlegende Fehleranalyse für Askozia IP-Telefonanlagen - Webinar 2016, deutsch
Grundlegende Fehleranalyse für Askozia IP-Telefonanlagen - Webinar 2016, deutschGrundlegende Fehleranalyse für Askozia IP-Telefonanlagen - Webinar 2016, deutsch
Grundlegende Fehleranalyse für Askozia IP-Telefonanlagen - Webinar 2016, deutsch
 
Was ist neu in Version 5 der Askozia IP-Telefonanlage? - Webinar 2016, deutsch
Was ist neu in Version 5 der Askozia IP-Telefonanlage? - Webinar 2016, deutschWas ist neu in Version 5 der Askozia IP-Telefonanlage? - Webinar 2016, deutsch
Was ist neu in Version 5 der Askozia IP-Telefonanlage? - Webinar 2016, deutsch
 
AskoziaPBX and snom M700 DECT for workplace mobility - webinar 2016, English
AskoziaPBX and snom M700 DECT for workplace mobility - webinar 2016, EnglishAskoziaPBX and snom M700 DECT for workplace mobility - webinar 2016, English
AskoziaPBX and snom M700 DECT for workplace mobility - webinar 2016, English
 

Recently uploaded

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 

Recently uploaded (20)

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 

Secure calling for IP telephony - webinar 2016, English

  • 1.
  • 2. Your Hosts Markus Ehlers Oliver Wittig
  • 3. Agenda •Typical threads in VoIP •Physical access thread •What can the vendor do •Secure Calling in AskoziaPBX
  • 4. Possible attack points in VoIP Router + Firewall IP phone Soft clients Phone application + Web portal
  • 5. How to find vulnerable devices?
  • 6. Typical threats in VoIP Spam over Internet Telephony Broadcast of messages via VoIP Eavesdropping Secretly listening to private conversations Service Abuse VoIP fraud Denial of Service attacks Attempts to prevent legitimate use
 of services Physical Access IP phones as entry point into the network
  • 7. Spam over Internet Telephony Problem • Bulk unsolicited, automatically dialled, pre- recorded phone calls using VoIP protocols • The spammer attempts to initiate a voice session and then relays a pre-recorded message if the receiver answers. Measures • Only accept SIP invites from trusted hosts (SIP registrar) • Encrypt SIP credentials (SIP over TLS) • Enforce client cert authentication at SIP server
  • 8. Eavesdropping Problem • Capturing and Decoding VoIP Traffic on the network • Tools like Wireshark can decode RTP streams into playable audio format Measures • Always encrypt RTP packets (SRTP)
  • 9. Service Abuse Problem • Automatic dialling of toll numbers and long distance • Set up of blind transfer and erase setting server URL of a hacked device • Call forwarding from one toll number to a second doubles the “income” Measures • Secure web server (HTTPS) or switch it off completely • Deploy phone in user mode and use a strong admin mode password • Always put a router between phone and the Internet
  • 10. Physical access to the network Problem • An IP phone is a possible entrance gate into the corporate network • Network switch can enable illicit access for unauthorised devices Measures • Snom phones support 802.1x • IEEE 802.1X is an IEEE Standard for port- based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. • It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
  • 11. 802.1x the big fear / effort Problem • port authentication sounds easy • do not confuse it with MAB • do not expect its all like Wifi or PCs • certificate bases authentication involves • staging or automatic rollout • revocation / replacing / updating of certificates Measures • build a skilled team • network, switches • radius guest and productive • provisioning guest and productive • sit together and plan realistically • security audit needs • technical draw backs
  • 12. Denial of Service attacks Problem • A denial-of-service (DoS) attack is a cyber- attack where the perpetrator seeks to make a machine or network resource (services) unavailable to its intended users. • DoS is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems. Measures • Snom has secured its redirection server against possible DoS attacks • Service provider need to take necessary measures to ensure the availability of their service
  • 13. What can the vendor do?
  • 14. A hack that isn’t a hack • Snom’s security measures are sufficient to avoid a hack • In a SoHo / do it yourself environment, if users disregard warnings and security advice, it is their responsibility. • Almost every phone used in a business environment is auto- provisioned, i.e. all necessary passwords are set automatically with the initial deployment of the phone. • But….whats once on the www stays there forever.
  • 15. External security audit • Manipulation of a phone in the local network, possible by cross site scripting vulnerabilities • Path traversal filter bypass • URLs “../“ could access hidden folders • VPN profile enabled to run malware on phone • Bypass of authentication and gain of admin rights • when restrict_uri_queries and use_hidden_tags were set to “off”
  • 16. Actions taken • All detected security leaks have been closed, provided with a firmware update • Best practise guide was provided, as some users disregard alerts and notifications http://wiki.snom.com/FAQ/How_do_I_secure_my_phone
  • 17. Further enhancements in security • Factory installed SHA-256 certificates on the phones • Got rid of weak ciphers (TLS), according to Mozilla.org best practises • Disabled SSLv3 to avoid POODLE (Padding Oracle On Downgraded Legacy Encryption) • Regular updates of root file system with latest security patches
  • 19. Snom new D300 series High resolution screens Improved audio quality 2nd screen for fkey labelling Bluetooth built-in + USB Font embedded icons Features depending on model D305/315 D345 D375
  • 20. New D745 model Dual high-resolution displays 8x4 configurable, self-labelling, multicolored LED keys Gigabit switch USB port Wideband audio 12 SIP identities
  • 21. Secure Calling in Askozia
  • 22. Secure Calling in Askozia
  • 23. Secure Calling in Askozia
  • 24. Secure Calling in Askozia
  • 25. Secure Calling in Askozia
  • 26. Secure Calling in Askozia
  • 27. Questions? Time to wake up! markus.ehlers@askozia.com