SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Security Art | August 2011




       Sounds Like Botnet
Itzik Kotler, Chief Technology Officer
Iftach Ian Amit, VP Consulting




                                         www.security-art.com
Intro to VoIP
• It’s everywhere
  – Home (Vonage, Skype, TeamSpeak, Comcast,
    etc…)
  – Office (Cisco, Avaya, Lucent, Asterisk, etc…)
• Easy to deploy
  – Most are “plug and talk” with fancy web interfaces
    to configure features such as voicemail,
    forwarding, conference calls, etc…
Overview of SIP
• Request/Response model
• Responsible for setup/teardown of
  voice/video calls
• Designed to allow “piercing” of firewalls, NAT,
  etc…
• Security? meh… (basic identification, usually
  not required in most PBXs, easily sniffed…)
VoIP as a Getaway Car
• So… VoIP can traverse firewalls easily
• And can go outside the corporate network
  over PSTN lines (no internetz needed…)
• And is rarely monitored (“can you hear me
  now” ain’t gonna pass through the DLP…)
• EXFILTRATE!
What is a VoIP Botnet
•   Take your good ol’e botnet
•   Disconnect all C&C channels
•   Replace with VoIP
•   Profit?

• Fully mobilized (NAT piercing)
• Looks more legit (try to pick THAT out of the
  traffic)
• Harder to peek into (can you spell “whazzzzup?”
  in RTP?)
Who Needs a VoIP Botnet
• Well, everyone…

• Botmaster is more mobile (literally)
• More anonymous C&C servers (conf call bridge
  numbers are aplenty…)
• Can actually transfer fair amounts of data
  back/forth (remember the modem days?)
• It’s starting to show up as alternative methods of
  covert communications
   – Sorry spooks… 
VoIP Botnet in Action
• Red Team Penetration Testing Engagement
• Botnet in No Internet/Closed Networks
• Botnet for VoIP Phones
VoIP Botnet Architecture
• Telephony systems allows both Unicast and
  Multicast communication
• Unicast:
  – Bot calls Bot Master
  – Bot Master calls Bot (registered ext. on his PBX)
• Multicast:
  – Bot A calls Conference Call
  – Bot B calls Conference Call
  – Bot Master joins Conference Call
VoIP Botnet Architecture
• Conference Call as “IRC Channel”

        Bot


                                       Bot
  Bot               Conference Call
                                      Master


              Bot
The Call
• Calling can be made via TCP/IP or PSTN

                      Bot/Bot Master




    PSTN/VoIP Trunk                     TCP/IP (SIP, H.323,…)




                      Conference Call
Moshi Moshi
• Open-source VoIP Bot written in Python
  – Uses SIP as VoIP Protocol
  – Uses Text-to-speech Engines for Output
  – Uses DTMF Tones for Input


• Download your copy at:
  – http://code.google.com/p/moshimoshi/
Press 1 to Continue in l33t Speak
• DTMF (Dual-tone multi-frequency signaling)
  are used for signaling over telephone lines in
  the voice-frequency band between telephone
  handsets and other devices and switching
  centers.
• DTMF tones are standardized and can be sent
  and received from any phone
Asterisk as C&C and DTMF
• Asterisk is free software that transforms a
  computer into a communication server
• We’re using AsteriskNow 1.7.1 Linux Distribution
• MeetMe is a conference bridge for Asterisk
  and supports passing DTMF through the
  conference.
• To pass DTMF through the conference add ‘F’
  option to MEETME_OPTS at extensions.conf
DTMF Pass through/Relaying
• Conf. Call to relay DTMF to other calls

                                                Bot A

                                          Bot A: Heard 1#
           Pressed 1#
   Bot
                        Conference Call         Bot B
  Master

                                          Bot B: Heard 1#

                                                Bot C

                                          Bot C: Heard 1#
DTMF Tones as C&C
• The (made-up) Rules
  – ‘*’ is End of Line (EOL)
  – ‘#’ is a delimiter (i.e. Space)
• Examples
  – ‘0#*’ invoke command 0 without arguments
  – ‘1#123#*’ invoke command 1 with one arg ‘123’
  – ‘2#1#2#*’ invoke command 2 with args ‘1’ and ‘2’
• It’s your rules – go wild…
Ring, Ring!
Text-to-Speech as Data Leakage
• It's only natural that since we don’t have visuals
  in phone conversation, to use voice
• Passwords, documents, settings and
  acknowledgements can all be read back
• Some systems (Mac, Windows) includes built-in
  Text-to-Speech engines, others requires
  installation
• External utilities can be used to convert different
  formats (e.g. Microsoft Word) into simpler text
  files
Talk to me… Woo hoo!
The Getaway: Modulation
• Take any arbitrary binary data
• Devise a way to transform bytes to sounds
  – PoC: every ½ byte  one of 16 octaves within the
    human audible range (~200Hz - ~2000Hz)
• Record each ½ byte octave
  – PoC uses ½ second tones (for legibility in a
    conference )
• Music to my ears…
Demo: Binary Data Modulation -> Data
             Exfiltration
• Transform data to sound

• Dial, leave a message…

• Transform recorded message to data

• Profit?
ET Phone Home!
VoIP as VPN
• Alternative unmonitored Internet access
  – No DLP
  – No Firewalls
  – No IDS/IPS/DPI
• Allows using already-existing C&C protocols
  – IRC
  – HTTP
• Bot Master can easily explore his Botnet
  – nmap –sS 10.0.0.0/8
TCP/IP over VoIP
• Bring back Modems to the game
• Use V.42/HDLC/PPP protocols
                      • Works with Hardware Modems
       TCP
                      • Works with Software Modems
        IP
                      • Works within Voice frequency band
   V.42/HDLC/PPP
                      • Works under poor connectivity conditions
     SIP/RTSP
                      • Two-way communication channel
       UDP
        IP
Did You Hear That?
• VoIP Botnets are as good and even better in
  some cases, than IRC, P2P, and HTTP Botnets.
• VoIP Botnets strengths:
  – Can be operated from a payphone, or a Mobile.
  – Can be accessed from both PSTN and Internet
  – Are not blocked by your typical IDS/IPS signatures
Countermeasures
• Separate VoIP from Corporate Network
  – Yes, COMPLETELY!
• Monitor VoIP Activity
  – It’s your data. Same as you do for web/emails…
• Consider whitelisting Conf. Call Numbers
The Future Sound of Botnets
• Hearing is Believing
  – Speech-to-Text as Input
• Going Mobile
  – Text-to-SMS as Output
  – SMS-to-Voice Calls as Input
• Meeting new Appliances
  – T.38 (Fax) as Output (e.g. “Screen Shots”)
• Meeting old Appliances
  – Modem (PPP) as Input/Output (e.g. “Internal VPN”)
Questions?

Itzik Kotler (itzik.kotler@security-art.com)
Iftach Ian Amit (iamit@security-art.com)
Thanks!

Itzik Kotler (Twitter: @itzikkotler)
Iftach Ian Amit (Twitter: @iiamit)

Weitere ähnliche Inhalte

Was ist angesagt?

Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIDevelop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIEnablex io
 
Polycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheetPolycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheetbest4systems
 
Designing Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource BoardsDesigning Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource BoardsVideoguy
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
 
Matrix vision presentation
Matrix vision presentationMatrix vision presentation
Matrix vision presentationmatrixtelesol
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingThousandEyes
 
Pbx Presentation V021
Pbx Presentation V021Pbx Presentation V021
Pbx Presentation V021nicklacey
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application IntroduceZack Chou
 

Was ist angesagt? (20)

Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIDevelop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
 
Vo ip
Vo ipVo ip
Vo ip
 
Fortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIPFortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIP
 
Polycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheetPolycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheet
 
Designing Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource BoardsDesigning Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource Boards
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
Matrix vision presentation
Matrix vision presentationMatrix vision presentation
Matrix vision presentation
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
 
Pi Is For Python
Pi Is For PythonPi Is For Python
Pi Is For Python
 
Voip In College
Voip In CollegeVoip In College
Voip In College
 
voip gateway
 voip gateway voip gateway
voip gateway
 
Pbx Presentation V021
Pbx Presentation V021Pbx Presentation V021
Pbx Presentation V021
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
Voip
VoipVoip
Voip
 
DTMF-project
DTMF-projectDTMF-project
DTMF-project
 
IPv6: A Digital Game Changer
IPv6: A Digital Game ChangerIPv6: A Digital Game Changer
IPv6: A Digital Game Changer
 
Audio conferencing
Audio conferencingAudio conferencing
Audio conferencing
 
small production house
small production house small production house
small production house
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
 

Andere mochten auch

Cross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brandsCross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brandsdiwakar sharma
 
Protecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and MalwareProtecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and MalwareScott McDermott
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adwareRaja Kiran
 
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spywarediwakar sharma
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasureskaranwayne
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Dasun Hegoda
 
Getting Started With bots
Getting Started With botsGetting Started With bots
Getting Started With botsGaurav sharma
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Akhil Sharma
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber AttacksVenafi
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Bot and Botnet Taxonomy
Bot and Botnet TaxonomyBot and Botnet Taxonomy
Bot and Botnet Taxonomydigitallibrary
 
Network servers
Network serversNetwork servers
Network serversOnline
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 

Andere mochten auch (20)

Cross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brandsCross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brands
 
Protecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and MalwareProtecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and Malware
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Malware
MalwareMalware
Malware
 
Botnets
BotnetsBotnets
Botnets
 
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
Getting Started With bots
Getting Started With botsGetting Started With bots
Getting Started With bots
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Bot and Botnet Taxonomy
Bot and Botnet TaxonomyBot and Botnet Taxonomy
Bot and Botnet Taxonomy
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Network servers
Network serversNetwork servers
Network servers
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 

Ähnlich wie Sounds Like Botnet

Voip introduction
Voip introductionVoip introduction
Voip introductiondaksh bhatt
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppthajAli4
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVideoguy
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Kaushal Bhavsar
 
Fun with Linux Telephony
Fun with Linux TelephonyFun with Linux Telephony
Fun with Linux TelephonyDonald Burr
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGRagheb Gmira
 
Gaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMECGaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMECGaurav Kumar
 
Yeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationYeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationHossein Yavari
 
Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Aakura Pyakura
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.Sumutiu Marius
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)Abdullah Shah
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1Adebayo Ojo
 

Ähnlich wie Sounds Like Botnet (20)

Linux VOIP
Linux VOIP Linux VOIP
Linux VOIP
 
Voip introduction
Voip introductionVoip introduction
Voip introduction
 
VOIP security
VOIP securityVOIP security
VOIP security
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppt
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP
 
Fun with Linux Telephony
Fun with Linux TelephonyFun with Linux Telephony
Fun with Linux Telephony
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
 
Gaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMECGaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMEC
 
[Carius] Skype Online, Teams, and PSTN
[Carius] Skype Online, Teams, and PSTN[Carius] Skype Online, Teams, and PSTN
[Carius] Skype Online, Teams, and PSTN
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
Yeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationYeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configuration
 
Asterisk
Asterisk Asterisk
Asterisk
 
Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Voip
Voip Voip
Voip
 
Voip
VoipVoip
Voip
 
Voip
VoipVoip
Voip
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
 

Mehr von Itzik Kotler

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationItzik Kotler
 
Goodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationGoodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationItzik Kotler
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Itzik Kotler
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation BotnetItzik Kotler
 
The Day of the Updates
The Day of the UpdatesThe Day of the Updates
The Day of the UpdatesItzik Kotler
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0Itzik Kotler
 

Mehr von Itzik Kotler (6)

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
 
Goodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationGoodbye Data, Hello Exfiltration
Goodbye Data, Hello Exfiltration
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation Botnet
 
The Day of the Updates
The Day of the UpdatesThe Day of the Updates
The Day of the Updates
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0
 

Kürzlich hochgeladen

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Kürzlich hochgeladen (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Sounds Like Botnet

  • 1. Security Art | August 2011 Sounds Like Botnet Itzik Kotler, Chief Technology Officer Iftach Ian Amit, VP Consulting www.security-art.com
  • 2. Intro to VoIP • It’s everywhere – Home (Vonage, Skype, TeamSpeak, Comcast, etc…) – Office (Cisco, Avaya, Lucent, Asterisk, etc…) • Easy to deploy – Most are “plug and talk” with fancy web interfaces to configure features such as voicemail, forwarding, conference calls, etc…
  • 3. Overview of SIP • Request/Response model • Responsible for setup/teardown of voice/video calls • Designed to allow “piercing” of firewalls, NAT, etc… • Security? meh… (basic identification, usually not required in most PBXs, easily sniffed…)
  • 4. VoIP as a Getaway Car • So… VoIP can traverse firewalls easily • And can go outside the corporate network over PSTN lines (no internetz needed…) • And is rarely monitored (“can you hear me now” ain’t gonna pass through the DLP…) • EXFILTRATE!
  • 5. What is a VoIP Botnet • Take your good ol’e botnet • Disconnect all C&C channels • Replace with VoIP • Profit? • Fully mobilized (NAT piercing) • Looks more legit (try to pick THAT out of the traffic) • Harder to peek into (can you spell “whazzzzup?” in RTP?)
  • 6. Who Needs a VoIP Botnet • Well, everyone… • Botmaster is more mobile (literally) • More anonymous C&C servers (conf call bridge numbers are aplenty…) • Can actually transfer fair amounts of data back/forth (remember the modem days?) • It’s starting to show up as alternative methods of covert communications – Sorry spooks… 
  • 7. VoIP Botnet in Action • Red Team Penetration Testing Engagement • Botnet in No Internet/Closed Networks • Botnet for VoIP Phones
  • 8. VoIP Botnet Architecture • Telephony systems allows both Unicast and Multicast communication • Unicast: – Bot calls Bot Master – Bot Master calls Bot (registered ext. on his PBX) • Multicast: – Bot A calls Conference Call – Bot B calls Conference Call – Bot Master joins Conference Call
  • 9. VoIP Botnet Architecture • Conference Call as “IRC Channel” Bot Bot Bot Conference Call Master Bot
  • 10. The Call • Calling can be made via TCP/IP or PSTN Bot/Bot Master PSTN/VoIP Trunk TCP/IP (SIP, H.323,…) Conference Call
  • 11. Moshi Moshi • Open-source VoIP Bot written in Python – Uses SIP as VoIP Protocol – Uses Text-to-speech Engines for Output – Uses DTMF Tones for Input • Download your copy at: – http://code.google.com/p/moshimoshi/
  • 12. Press 1 to Continue in l33t Speak • DTMF (Dual-tone multi-frequency signaling) are used for signaling over telephone lines in the voice-frequency band between telephone handsets and other devices and switching centers. • DTMF tones are standardized and can be sent and received from any phone
  • 13. Asterisk as C&C and DTMF • Asterisk is free software that transforms a computer into a communication server • We’re using AsteriskNow 1.7.1 Linux Distribution • MeetMe is a conference bridge for Asterisk and supports passing DTMF through the conference. • To pass DTMF through the conference add ‘F’ option to MEETME_OPTS at extensions.conf
  • 14. DTMF Pass through/Relaying • Conf. Call to relay DTMF to other calls Bot A Bot A: Heard 1# Pressed 1# Bot Conference Call Bot B Master Bot B: Heard 1# Bot C Bot C: Heard 1#
  • 15. DTMF Tones as C&C • The (made-up) Rules – ‘*’ is End of Line (EOL) – ‘#’ is a delimiter (i.e. Space) • Examples – ‘0#*’ invoke command 0 without arguments – ‘1#123#*’ invoke command 1 with one arg ‘123’ – ‘2#1#2#*’ invoke command 2 with args ‘1’ and ‘2’ • It’s your rules – go wild…
  • 17. Text-to-Speech as Data Leakage • It's only natural that since we don’t have visuals in phone conversation, to use voice • Passwords, documents, settings and acknowledgements can all be read back • Some systems (Mac, Windows) includes built-in Text-to-Speech engines, others requires installation • External utilities can be used to convert different formats (e.g. Microsoft Word) into simpler text files
  • 18. Talk to me… Woo hoo!
  • 19. The Getaway: Modulation • Take any arbitrary binary data • Devise a way to transform bytes to sounds – PoC: every ½ byte  one of 16 octaves within the human audible range (~200Hz - ~2000Hz) • Record each ½ byte octave – PoC uses ½ second tones (for legibility in a conference ) • Music to my ears…
  • 20. Demo: Binary Data Modulation -> Data Exfiltration • Transform data to sound • Dial, leave a message… • Transform recorded message to data • Profit?
  • 22. VoIP as VPN • Alternative unmonitored Internet access – No DLP – No Firewalls – No IDS/IPS/DPI • Allows using already-existing C&C protocols – IRC – HTTP • Bot Master can easily explore his Botnet – nmap –sS 10.0.0.0/8
  • 23. TCP/IP over VoIP • Bring back Modems to the game • Use V.42/HDLC/PPP protocols • Works with Hardware Modems TCP • Works with Software Modems IP • Works within Voice frequency band V.42/HDLC/PPP • Works under poor connectivity conditions SIP/RTSP • Two-way communication channel UDP IP
  • 24. Did You Hear That? • VoIP Botnets are as good and even better in some cases, than IRC, P2P, and HTTP Botnets. • VoIP Botnets strengths: – Can be operated from a payphone, or a Mobile. – Can be accessed from both PSTN and Internet – Are not blocked by your typical IDS/IPS signatures
  • 25. Countermeasures • Separate VoIP from Corporate Network – Yes, COMPLETELY! • Monitor VoIP Activity – It’s your data. Same as you do for web/emails… • Consider whitelisting Conf. Call Numbers
  • 26. The Future Sound of Botnets • Hearing is Believing – Speech-to-Text as Input • Going Mobile – Text-to-SMS as Output – SMS-to-Voice Calls as Input • Meeting new Appliances – T.38 (Fax) as Output (e.g. “Screen Shots”) • Meeting old Appliances – Modem (PPP) as Input/Output (e.g. “Internal VPN”)
  • 28. Thanks! Itzik Kotler (Twitter: @itzikkotler) Iftach Ian Amit (Twitter: @iiamit)