SlideShare ist ein Scribd-Unternehmen logo
1 von 95
Downloaden Sie, um offline zu lesen
VoIP Hopping the Hotel: Attacking
                 the Crown Jewels through VoIP

                         Jason Ostrom
Monday, August 8, 2011
VIPER “Research” in Las Vegas




      DefCon	
  19	
  ~	
  August	
  6,	
  2011        2

Monday, August 8, 2011
Thank you

              Friends	
  and	
  associates
                      Who	
  might	
  be	
  here
                          • Charles,	
  Arjun,	
  Tom,	
  Victor,	
  Zack,	
  Brian,	
  Chris,	
  Shaq
                      Who	
  couldn’t	
  make	
  it	
  here
                                                                                                       Thanks	
  to	
  
                          • Ed	
  S.                                                                 everyone	
  else	
  
                                                                                                      in	
  this	
  room	
  
                          • Erik	
  G.                                                               right	
  now,	
  for	
  
                          • Camey	
  Y.                                                              aPending	
  my	
  
                                                                                                             talk.




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                 3

Monday, August 8, 2011
Agenda

              VIPER	
  Intro
              UC	
  Business	
  Examples
              Live	
  Demo	
  &	
  Case	
  Study:	
  	
  Hotel	
  VoIP	
  Vulnerability
              Live	
  Demo	
  &	
  Case	
  Study:	
  	
  LLDP-­‐MED
              Conclusion




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                         4

Monday, August 8, 2011
What is VIPER

              VIPER	
  R&D	
  (Voice	
  over	
  IP	
  Exploit	
  Research)
                      Author	
  open	
  source	
  security	
  tools	
  (VAST)
                      LAVA	
  (Load	
  Analysis	
  &	
  Vulnerability	
  Assessment)
                      VoIP	
  Honeypot
              Penetraaon	
  Tesang	
  of	
  VoIP	
  and	
  UC	
  Networks
                      “field	
  research”	
  -­‐	
  understand	
  real	
  vulnerabiliaes	
  &	
  
                      problems	
  in	
  producaon	
  networks
                      Proacave	
  idenaficaaon	
  of	
  client	
  vulnerabiliaes	
  before	
  
                      someone	
  else

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                   5

Monday, August 8, 2011
Market: VoIP in Hotels

              Market	
  is	
  growing
                      Worldwide	
  revenue	
  $869	
  million	
  in	
  2008
                      By	
  end	
  of	
  2014,	
  will	
  exceed	
  $2	
  billion	
  (ABI	
  Research)
              Currently	
  most	
  adopted	
  in	
  luxury	
  resort	
  hotels
                      Catering	
  to	
  clientele	
  willing	
  to	
  spend	
  >	
  $300	
  night
              Expected	
  to	
  penetrate	
  mid-­‐range	
  hotels	
  soon
              High-­‐end	
  hotels	
  using	
  technology	
  as	
  a	
  
              differenaator

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                          6

Monday, August 8, 2011
Market: VoIP in Hotels




      DefCon	
  19	
  ~	
  August	
  6,	
  2011   7

Monday, August 8, 2011
Benefits to Hotel

              Well	
  known	
  benefits	
  of	
  VoIP
                      Simplicity	
  of	
  Network	
  Management
                      Reducaon	
  of	
  cabling	
  cost	
  (VoIP,	
  data,	
  video	
  over	
  single	
  
                      cabling	
  plant)
                      Reducaon	
  of	
  telecom	
  expenses	
  (Global	
  offices)
              Ad	
  and	
  markeang	
  revenue	
  directly	
  on	
  the	
  IP	
  
              Phones	
  ~	
  revenue	
  stream	
  to	
  hotel
              Improved	
  customer	
  service	
  ~	
  increased	
  revenue	
  
              from	
  repeat	
  customers
      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                          8

Monday, August 8, 2011
Benefits to Hotel (continued)

              New	
  VoIP	
  applicaaons	
  provide	
  improved	
  guest	
  
              service	
  ~	
  technology	
  differenaator	
  (compeaaon)
              VoIP	
  as	
  a	
  QA	
  tool,	
  to	
  improve	
  customer	
  service
              Rebuild	
  lost	
  telephone	
  service	
  revenue	
  (from	
  
              mobile	
  phones)
                      European	
  roaming	
  charges	
  outside	
  home	
  area	
  are	
  
                      inflated
                      VoIP	
  can	
  provide	
  lower	
  costs	
  than	
  roaming	
  charges,	
  
                      benefiang	
  Hotel	
  and	
  guests

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                      9

Monday, August 8, 2011
Benefits to Hotel (continued)

              Low	
  cost	
  of	
  internaaonal	
  calling	
  over	
  VoIP
                      Provide	
  an	
  internaaonal	
  inbound	
  number	
  in	
  home	
  
                      country	
  of	
  guest,	
  increasing	
  reservaaons
                      Growing	
  Trend	
  in	
  Hospitality:	
  	
  Giving	
  guests	
  free	
  limited	
  
                      or	
  unlimited	
  internaaonal	
  calling
              VoIP	
  over	
  Wi-­‐Fi	
  Wireless	
  in	
  Hotels
                      For	
  employee	
  communicaaon
                      For	
  guests,	
  ordering	
  products	
  and	
  services	
  with	
  click	
  of	
  
                      a	
  buPon

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                         10

Monday, August 8, 2011
Benefits to Guests

              Improved	
  service
                      Order	
  room	
  service	
  from	
  IP	
  Phone	
  menu
                      Browse	
  colorful	
  menu	
  displays	
  showing	
  dining	
  opaons	
  
                      in	
  a	
  hotel,	
  while	
  making	
  reservaaon
                      	
  New	
  products,	
  services	
  (VoIP	
  over	
  WiFi	
  handsets)
              Convenient,	
  advanced	
  call	
  features
                      Automated	
  wake	
  up	
  call,	
  Voice	
  mail,	
  Call	
  Forwarding
              Lowered	
  telecom	
  costs	
  passed	
  on	
  to	
  guests
                      Cheaper	
  guest	
  Internaaonal,	
  domesac	
  calling
      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                   11

Monday, August 8, 2011
VoIP Security benefits

                      For	
  the	
  hotel
                          • Prevents	
  unauthorized	
  access	
  to	
  internal	
  systems
                          • Protects	
  hotel	
  guests	
  from	
  UC	
  specific	
  aPacks,	
  like	
  
                            eavesdropping
                          • Of	
  course,	
  it	
  is	
  the	
  responsibility	
  of	
  the	
  hotel	
  to	
  provide	
  
                            security	
  for	
  the	
  hotel	
  guest
                      For	
  the	
  guest
                          • Prevents	
  eavesdropping	
  on	
  private	
  communicaaons	
  
                            through	
  IP	
  Phones
                                   –Recording	
  VoIP	
  conversaaons,	
  re-­‐construcaon	
  of	
  media
                                   –Trapping	
  sensiave	
  data,	
  such	
  as	
  credit	
  card	
  data,	
  sent	
  over	
  VoIP

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                                    12

Monday, August 8, 2011
Case Studies: VoIP in Hotels
                                                  Sources	
  for	
  Case	
  Studies




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                       13

Monday, August 8, 2011
Case Study: Peninsula Hotels

              Five-­‐star	
  luxury	
  hotel	
  chain	
  in	
  North	
  America	
  and	
  
              Asia
              14	
  Hotel	
  Chain	
  presence	
  globally	
  linked	
  by	
  VoIP
              Telecom	
  cost	
  savings	
  from	
  VoIP




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                           14

Monday, August 8, 2011
Case Study: Peninsula Hotels

           Chain	
  can	
  manage	
  all	
  of	
  its	
  reservaaons	
  from	
  a	
  
           Global	
  Customer	
  Service	
  Center
           Employees	
  can	
  communicate	
  with	
  VoIP	
  (significant	
  
           cost	
  savings)
           Each	
  employee	
  has	
  his	
  or	
  her	
  own	
  number	
  which	
  
           stays	
  with	
  them	
  no	
  maPer	
  what	
  locaaon	
  they’re	
  in
           Caller	
  ID	
  from	
  global	
  locaaons


      DefCon	
  19	
  ~	
  August	
  6,	
  2011                      15

Monday, August 8, 2011
Case Study: Wynn Las Vegas

              Improved	
  customer	
  service	
  through	
  VoIP
              Improved	
  guest	
  experience	
  through	
  VoIP




      DefCon	
  19	
  ~	
  August	
  6,	
  2011               16

Monday, August 8, 2011
Case Study: Wynn Las Vegas

              Strategy	
  to	
  “pamper	
  and	
  delight	
  guests”
              Each	
  guest	
  room	
  has	
  an	
  IP	
  Phone
                      Reservaaons	
  over	
  touch	
  screen
                      Guests	
  call	
  concierge	
  to	
  arrange	
  dinner	
  reservaaons	
  
                      while	
  browsing	
  menus	
  and	
  pictures	
  of	
  dining	
  room	
  on	
  
                      phone’s	
  color	
  display
                      When	
  guest	
  calls	
  service	
  staff,	
  VoIP	
  rings	
  their	
  cell	
  and	
  
                      desk	
  phone,	
  to	
  assure	
  the	
  guest	
  gets	
  through


      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                            17

Monday, August 8, 2011
Case Study: Wynn Las Vegas
                                                                    Quote:
                                                   “As	
  Wynn	
  Resorts	
  is	
  showing,	
  
                                                    the	
  enare	
  organizaaon	
  can	
  
                                                  become	
  a	
  contact	
  center.	
  	
  The	
  
                                                     phone	
  is	
  no	
  longer	
  just	
  a	
  
                                                  communicaaon	
  channel;	
  it’s	
  a	
  
                                                  form	
  of	
  customer	
  service	
  in	
  its	
  
                                                                 own	
  right.”
                                                    (Harvard	
  Business	
  Review)




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                 18

Monday, August 8, 2011
Case Study: Hotel 1000 Seattle




      DefCon	
  19	
  ~	
  August	
  6,	
  2011   19

Monday, August 8, 2011
Case Study: Hotel 1000 Seattle

              Luxury	
  hotel	
  in	
  SeaPle	
  deployed	
  Cisco	
  VoIP	
  
              technology
              VoIP	
  custom	
  applicaaons	
  created	
  by	
  Percipia
              Convergence	
  in	
  Hotel:	
  	
  Single	
  infrastructure	
  for	
  
              data,	
  voice,	
  video,	
  and	
  security




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                         20

Monday, August 8, 2011
Case Study: Hotel 1000 Seattle

              Downtown	
  SeaPle,	
  120	
  guest	
  rooms	
  and	
  47	
  
              condominium	
  units
              3	
  levels	
  of	
  underground	
  parking	
  accessed	
  via	
  
              valet	
  car	
  elevator
              Mulaple	
  custom	
  applicaaons
                      Video	
  valet	
  system
                      Condominium	
  security	
  entry	
  applicaaon
                      VoIP	
  applicaaon	
  to	
  detect	
  guest	
  presence	
  and	
  set	
  room	
  
                      preferences
      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                      21

Monday, August 8, 2011
Case Study: Hotel 1000 Seattle

              Video	
  Valet	
  system:
                      Guest	
  touches	
  screen	
  on	
  IP	
  Phone,	
  custom	
  app
                      Sends	
  signal	
  to	
  valet	
  drivers	
  mobile	
  phone,	
  vehicle	
  locator	
  
                      system	
  that	
  noafies	
  drivers	
  of	
  vehicle	
  locaaon
                      Driver	
  closest	
  to	
  car	
  accepts	
  request	
  with	
  Cisco	
  7920	
  Wi-­‐Fi	
  
                      phone,	
  noafying	
  other	
  drivers	
  that	
  request	
  taken
                      Elevator	
  call	
  buPon	
  on	
  Wi-­‐Fi	
  phone	
  acavates	
  Hotel	
  1000	
  car	
  
                      elevator	
  and	
  brings	
  it	
  to	
  the	
  level	
  where	
  car	
  and	
  driver	
  are	
  
                      located.
                      Valet	
  driver	
  can	
  use	
  WiFi	
  phone	
  to	
  send	
  a	
  picture	
  to	
  owner	
  of	
  
                      car	
  ready,	
  which	
  shows	
  up	
  on	
  Cisco	
  IP	
  Phone	
  display

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                       22

Monday, August 8, 2011
Case Study: Hotel 1000 Seattle

              Good	
  Quotes
                      “It	
  is	
  never	
  just	
  about	
  bricks	
  and	
  mortar,	
  nor	
  is	
  it	
  about	
  
                      technical	
  bells	
  and	
  whistles.	
  	
  It	
  is	
  about	
  the	
  experience	
  
                      that	
  maPers	
  to	
  the	
  individual	
  traveler.	
  	
  It	
  made	
  sense	
  to	
  
                      round	
  out	
  the	
  guest	
  experience	
  with	
  the	
  technology	
  
                      experience	
  people	
  have	
  at	
  home	
  or	
  in	
  the	
  office,	
  so	
  
                      that	
  they	
  arrive	
  in	
  an	
  environment	
  that	
  is	
  more	
  familiar	
  
                      to	
  them.	
  	
  That	
  is	
  not	
  the	
  norm	
  for	
  most	
  hotels.”



      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                23

Monday, August 8, 2011
The Security Problem

              VLAN	
  Traversal	
  vulnerability
                      Trivial	
  to	
  exploit
                      Leads	
  to	
  unauthorized	
  IP	
  network	
  access
              The	
  Business	
  Risk
                      Deployed	
  to	
  guest	
  rooms
                          • Many	
  business	
  benefits
                      All	
  deployments	
  I’ve	
  observed	
  are	
  at	
  risk
                          • Physical	
  ports	
  by	
  default	
  permit	
  VLAN	
  traversal
                          • Low	
  awareness

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                             24

Monday, August 8, 2011
This is “The Vulnerability” - Credit




      DefCon	
  19	
  ~	
  August	
  6,	
  2011   25

Monday, August 8, 2011
IEEE 802.1q Unauthorized VLAN
       Traversal Weakness
              September	
  1999	
  (12	
  years	
  ago)
              Steve	
  Schupp,	
  Dave	
  Taylor
              Further	
  research	
  by	
  Andrew	
  Vladimirov
              CVE-­‐1999-­‐1129	
  (BID:	
  	
  615)
              Cisco	
  PSIRT	
  responded
                      Acknowledges	
  vulnerability
                      Recommended	
  Cisco	
  Security	
  Best	
  Pracaces
                          • Disable	
  trunk	
  ports	
  that	
  shouldn’t	
  be	
  in	
  use

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                 26

Monday, August 8, 2011
Other Researchers

              @Stake	
  Report:	
  	
  “Secure	
  use	
  of	
  VLANS”
                      August	
  2002
                      Mike	
  Schiffman,	
  David	
  Pollino
              Black	
  Hat	
  USA:	
  	
  “Hacking	
  Layer	
  2:	
  	
  Fun	
  with	
  
              Ethernet	
  Switches”
                      2002
                      Sean	
  Convery,	
  Cisco	
  Systems
              Cisco	
  White	
  Paper:	
  	
  VLAN	
  Security	
  WP
                      “Virtual	
  LAN	
  Security	
  Best	
  Pracaces”

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                    27

Monday, August 8, 2011
Other Researchers

              SANS	
  Resources
                      “Intrusion	
  Detecaon	
  FAQ:	
  	
  Are	
  there	
  vulnerabiliaes	
  in	
  
                      VLAN	
  Implementaaons?”
                          • David	
  Taylor	
  (July,	
  2000)
                      “Virtual	
  LAN	
  Security:	
  	
  weaknesses	
  and	
  
                      countermeasures”
                          • Steve	
  A.	
  Rouiller
                      “VLAN	
  Security	
  in	
  the	
  LAN	
  and	
  MAN	
  Environment”
                          • Chris	
  Hoffmann	
  (April,	
  2003)


      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                      28

Monday, August 8, 2011
VoIP Hopping

              Definiaon
                      Unauthorized	
  VLAN	
  access	
  within	
  a	
  VoIP	
  infrastructure,	
  
                      that	
  was	
  not	
  intended	
  by	
  the	
  system	
  design
              Business	
  Risk	
  increases	
  in	
  areas	
  with:
                      Inherent	
  right	
  to	
  privacy	
  (hotel	
  guest	
  rooms)
                      Poor	
  physical	
  security	
  (public	
  access)




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                     29

Monday, August 8, 2011
VoIP Hopping

              All	
  Best	
  Pracaces	
  recommend	
  disabling	
  trunk	
  
              ports	
  for	
  user	
  access	
  networks
              With	
  VoIP	
  to	
  work,	
  some	
  form	
  of	
  trunk	
  ports	
  
              (usually)	
  must	
  be	
  used
                      Trunk	
  ports	
  in	
  tradiaonal	
  sense
                      Mula-­‐access	
  VLANS	
  with	
  auxiliary	
  ports
                          • The	
  Cisco	
  “Voice	
  VLAN”




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                              30

Monday, August 8, 2011
Overview
                                                              Benefit	
  of	
  VoIP:
                                                          Saves	
  on	
  Cabling	
  Costs:	
  	
  
                                                               VoIP	
  and	
  Data	
  
                                                          transmiPed	
  over	
  single	
  
                                                                      cable




                         Easy	
  Provisioning:                           Easy	
  QoS:
                        IP	
  Phones	
  can	
  auto-­‐    QoS	
  can	
  ensure	
  that	
  VoIP	
  and	
  
                       discover	
  and	
  provision	
       Video	
  traffic	
  has	
  highest	
  
                       into	
  the	
  VoIP	
  network       priority	
  through	
  network



      DefCon	
  19	
  ~	
  August	
  6,	
  2011                         31

Monday, August 8, 2011
802.1q Frame Tagging Attack: Step 1
              Learn	
  the	
  VLAN	
  ID	
  
                      Need	
  to	
  learn	
  the	
  VLAN	
  ID	
  to	
  tag	
  traffic,	
  or	
  the	
  ethernet	
  
                      frames	
  will	
  be	
  dropped
                      Usually	
  this	
  is	
  the	
  Voice	
  VLAN	
  ID	
  (VVID)
                      Can	
  be	
  learned	
  through	
  CDP,	
  LLDP-­‐MED,	
  DHCP




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                              32

Monday, August 8, 2011
802.1q Frame Tagging Attack: Step 2

              Spoof	
  tagged	
  ethernet	
  frames	
  
                      Spoof	
  ethernet	
  frames	
  with	
  VLAN	
  ID	
  learned	
  in	
  Step	
  #1
                      Trivial	
  to	
  do,	
  using	
  special	
  souware	
  on	
  your	
  PC
                      Create	
  a	
  virtual	
  interface	
  (eth0.xxx)
                      Send	
  DHCP	
  with	
  eth0.xxx	
  (&	
  tag	
  subsequent	
  frames)




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                      33

Monday, August 8, 2011
Overview
                                                                                                      Networks
                   Internet                                        Legend
                                                                     Ethernet	
  cable          VoIP	
  VLAN:	
  	
  VLAN_200
                                                                                                IP	
  Subnet:	
  	
  172.16.200.0/24
                                                                     VoIP	
  network	
  traffic
                                                                     Data	
  network	
  traffic
                                                                                                Guest	
  Data	
  VLAN:	
  	
  VLAN_100
                   Network                                                                      IP	
  Subnet:	
  	
  172.16.100.0/24




         Call	
  Control	
  Servers                 VLAN_67

                                                  172.16.67.0/24




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                                        34

Monday, August 8, 2011
Overview
                                                                                                                                     Networks
                   Internet                                                                     Legend
                                                                                                    Ethernet	
  cable          VoIP	
  VLAN:	
  	
  VLAN_200
                                                                                                                               IP	
  Subnet:	
  	
  172.16.200.0/24
                                                                                                    VoIP	
  network	
  traffic
                                                                                                    Data	
  network	
  traffic
                                                                                                                               Guest	
  Data	
  VLAN:	
  	
  VLAN_100
                   Network                                                                                                     IP	
  Subnet:	
  	
  172.16.100.0/24




                                                  Learn	
  VLAN	
  ID:	
  	
  200


                                                                              eth0.200




                                                    Create	
  eth0.200	
  Voice	
  interface




         Call	
  Control	
  Servers                      VLAN_67

                                                      172.16.67.0/24

                                                                                         Tag	
  with	
  VID:	
  	
  200

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                                                                       34

Monday, August 8, 2011
VoIP Hopping

              How	
  to	
  reconcile	
  this	
  security	
  problem
                      Current	
  best	
  pracaces	
  recommend	
  disabling	
  trunk	
  
                      ports	
  in	
  user	
  access	
  networks
                      Yet,	
  VoIP	
  configuraaon	
  requires	
  802.1q	
  trunking	
  in	
  
                      these	
  user	
  access	
  networks                       Best	
  Pracaces	
  need	
  to	
  
                                                                                                be	
  updated	
  to	
  include	
  
                                                                                             security	
  configuraaon	
  in	
  UC	
  
                                                                                             networks	
  with	
  Voice	
  VLANS	
  
                                                                                                  and/or	
  Trunk	
  port	
  
                                                                                                requirements	
  for	
  QoS




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                               35

Monday, August 8, 2011
Case Study: Hotel Vulnerability




  Credit:	
  	
  Michelle	
  Ahmadian




      DefCon	
  19	
  ~	
  August	
  6,	
  2011   36

Monday, August 8, 2011
Case Study: My Story of a Hotel

              Story	
  Intro
                      Sixng	
  in	
  a	
  luxury	
  hotel	
  with	
  IP	
  Phones	
  in	
  guest	
  rooms
              Summary	
  of	
  Configuraaon
                      What	
  security	
  controls	
  were	
  in	
  place
                      Detailed	
  descripaon	
  of	
  methods	
  and	
  how	
  they	
  can	
  be	
  
                      defeated




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                          37

Monday, August 8, 2011
Observation 1: MAC Address Hiding

              MAC	
  Address	
  label	
  removed	
  from	
  IP	
  Phone
                      Increasingly	
  common	
  knowledge	
  that	
  MAC	
  Address	
  
                      spoofing	
  defeats	
  Port	
  Security	
  (MAC	
  Address	
  filtering)
                      Infers	
  that	
  they	
  knew	
  about	
  this
                      Infers	
  that	
  they	
  were	
  trying	
  to	
  prevent	
  VLAN	
  Hop	
  and	
  
                      MAC	
  Address	
  spoofing	
  by	
  removing	
  ability	
  of	
  aPacker	
  
                      to	
  use	
  MAC	
  address	
  of	
  IP	
  Phone
                      This	
  infers	
  that	
  Port	
  Security	
  could	
  have	
  also	
  been	
  
                      enabled
                          • Why	
  else	
  would	
  they	
  hide	
  the	
  MAC	
  Address	
  of	
  IP	
  Phone?
      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                38

Monday, August 8, 2011
Observation 2: DHCP Disabled

              DHCP	
  was	
  disabled
                      Sending	
  a	
  tagged	
  DHCP	
  request	
  was	
  ineffecave
                      You	
  would	
  have	
  to	
  configure	
  a	
  staac	
  IP	
  address
                      Defeats	
  casual	
  or	
  unsophisacated	
  aPackers
              How	
  to	
  know	
  the	
  right	
  IP	
  address	
  to	
  use?




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                       39

Monday, August 8, 2011
Issue #1: Trunk ports leaking VLAN
       ID
              Plugged	
  laptop	
  with	
  sniffer	
  directly	
  into	
  wall	
  port
              Passively	
  observed	
  ~	
  sniffed	
  tagged	
  ethernet	
  
              frames
                      Observed	
  ARP	
  traffic	
  from	
  IP	
  Phones
                      802.1q	
  tagged	
  ARP	
  frames	
  contained	
  VLAN	
  ID
                      Now	
  we	
  have	
  the	
  VLAN	
  ID	
  (for	
  spoofing	
  802.1q!)
              Trunk	
  ports	
  mis-­‐configured,	
  or	
  shouldn’t	
  be	
  used	
  
              at	
  all?

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                     40

Monday, August 8, 2011
Issue #2: Control two IP Phones in
       adjoining guest rooms
              I	
  can	
  check	
  into	
  two	
  adjoining	
  guest	
  rooms
                      Coordinated,	
  physical	
  aPack	
  with	
  mulaple	
  colluders
                      Physical	
  control	
  of	
  at	
  least	
  two	
  IP	
  Phones
              Method
                      Room	
  1:	
  	
  Replace	
  IP	
  phone	
  with	
  sniffing	
  laptop
                      Room	
  2:	
  	
  Reboot	
  IP	
  Phone	
  mulaple	
  ames
                      Room	
  1:	
  	
  Sniff	
  and	
  verify	
  MAC	
  address	
  and	
  staac	
  IP	
  
                      address	
  of	
  phone	
  in	
  room	
  1	
  (rebooted	
  mulaple	
  ames)
                      Room	
  1:	
  	
  Plug	
  IP	
  Phone	
  back	
  into	
  wall	
  port

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                          41

Monday, August 8, 2011
Issue #2: Control two IP Phones in
       adjoining guest rooms
              Method	
  (Conanued)
                      Room	
  2:	
  	
  Move	
  sniffing	
  laptop	
  into	
  Room	
  2
                      Room	
  2:	
  	
  Unplug	
  IP	
  Phone
                      Room	
  2:	
  	
  Offline,	
  manually	
  spoof	
  MAC	
  address,	
  create	
  
                      virtual	
  interface,	
  configure	
  staac	
  IP	
  address
                      Room	
  2:	
  	
  Connect	
  laptop	
  to	
  wall	
  port
                      Room	
  2:	
  	
  Ping	
  IP	
  Gateway
                          • If	
  successful,	
  unauthorized	
  IP	
  network	
  access



      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                            42

Monday, August 8, 2011
Overview


                                             Adjoining	
  Room	
  1          Adjoining	
  Room	
  2




                                                                      Door




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                       43

Monday, August 8, 2011
Overview
                                                                      Keeping	
  in	
  mind
                                                                      -­‐Phones	
  in	
  adjoining	
  rooms	
  are	
  normally	
  going	
  to	
  be	
  members	
  of	
  the	
  same	
  VLAN	
  (broadcast	
  domain)
                                                                      -­‐All	
  ethernet	
  broadcasts	
  (ARP)	
  are	
  forwarded	
  out	
  all	
  ethernet	
  switch	
  ports	
  of	
  broadcast	
  domain	
  hosts
                                                                      -­‐In	
  hotels	
  normally	
  all	
  phones	
  on	
  same	
  floor	
  are	
  terminated	
  into	
  same	
  switch	
  closet
                                                                      -­‐There	
  is	
  a	
  high	
  degree	
  of	
  probability	
  that	
  phones	
  in	
  adjoining	
  rooms	
  are	
  in	
  the	
  same	
  VLAN


                                             Adjoining	
  Room	
  1                                                             Adjoining	
  Room	
  2




                                                                               Door
                                                                                                                                                                    Ok,	
  I’m	
  
                                                                                                                                                             connected.	
  	
  I	
  have	
  
                                                                                                                                                              unauthorized	
  IP	
  
                                                                                                                                                           access.	
  	
  I	
  can	
  ping	
  the	
  
                                                                                                                                                                 gateway.




                                                  Done.




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                                                                                                       43

Monday, August 8, 2011
VoIP Hopper 2.0 Release
                                                                                         VoIP	
  Hopper	
  2.0	
  will	
  be	
  released	
  
                                                                                                           soon!
              Summary	
  of	
  new	
  features
                          • Assessment	
  Mode
                          • Interacave,	
  CLI
                          • LLDP-­‐MED	
  support	
  (spoof,	
  sniff)
                          • ARP	
  and	
  802.1q	
  dissector
                          • Automaacally	
  learns	
  IP	
  and	
  MAC	
  of	
  phones
                          • Automaac	
  VLAN	
  Hop	
  based	
  on	
  first	
  learned	
  VVID	
  (CDP,	
  LLDP-­‐
                            MED,	
  ARP)
                          • Can	
  set	
  IP	
  and	
  MAC	
  staacally	
  from	
  learned	
  phones	
  when	
  DHCP	
  
                            is	
  disabled
                          • Fixed	
  many	
  issues	
  with	
  integrated	
  DHCP	
  code

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                         44

Monday, August 8, 2011
VoIP Hopper 2.0 Release

                      New	
  Assessment	
  mode
                          • CLI	
  interface
                          • Pass	
  individual	
  commands,	
  easily	
  creaang	
  new	
  features




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                        45

Monday, August 8, 2011
VoIP Hopper 2.0 Release

                      LLDP-­‐MED	
  spoofing	
  support
                          • Shows	
  spoofing	
  LLDP-­‐MED	
  in	
  assessment	
  mode




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                     46

Monday, August 8, 2011
VoIP Hopper 2.0 Release

                      Automaacally	
  VLAN	
  Hops	
  based	
  on	
  first	
  discovered	
  
                      VVID	
  
                          • New	
  support	
  for	
  decoding	
  802.1q	
  tagged	
  ARP	
  traffic
                          • In	
  the	
  screen	
  shot,	
  automaac	
  VLAN	
  Hop	
  is	
  disabled
                          • The	
  first	
  protocol	
  method	
  discovery	
  (CDP,	
  LLDP-­‐MED,	
  ARP)	
  
                            is	
  used




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                             47

Monday, August 8, 2011
VoIP Hopper 2.0 Release
                          • Passive	
  ARP	
  sniffer	
  automaacally	
  launches	
  auer	
  VLAN	
  Hop
                          • Silently	
  logs	
  /	
  records	
  Phone	
  MAC	
  and	
  IP	
  from	
  ARP	
  traffic
                          • Logs	
  the	
  phones	
  to	
  a	
  text	
  file,	
  voip-­‐hosts.txt




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                48

Monday, August 8, 2011
VoIP Hopper 2.0 Release
                          • If	
  DHCP	
  is	
  disabled,	
  VoIP	
  Hopper	
  automaacally	
  sets	
  a	
  staac	
  
                            IP	
  address	
  (auer	
  DHCP	
  ameout)
                          • Also,	
  starts	
  sniffing	
  and	
  recording	
  IP	
  Phones	
  via	
  ARP




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                  49

Monday, August 8, 2011
VoIP Hopper 2.0 Release
                          • An	
  aPacker	
  can	
  then	
  spoof	
  a	
  previously	
  learned	
  Phone’s	
  IP	
  
                            and	
  MAC	
  address,	
  from	
  a	
  menu




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                  50

Monday, August 8, 2011
VoIP Hopper 2.0 Release
                          • Automaacally	
  learns	
  and	
  records	
  all	
  IP	
  Phone	
  endpoints	
  
                            that	
  support	
  LLDP-­‐MED
                          • Saves	
  endpoints	
  to	
  a	
  text	
  file,	
  ‘myass.txt’
                          • Useful	
  feature	
  from	
  a	
  previous	
  VoIP	
  Pentest




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                              51

Monday, August 8, 2011
Live Demo: VoIP Hopper


      Thanks	
  to	
  Tom	
  
     Mostyn,	
  for	
  low	
  
     level	
  debugging	
  
              help




      DefCon	
  19	
  ~	
  August	
  6,	
  2011   52

Monday, August 8, 2011
Live Demo: VoIP Hopper vs. Hotel


                            VoIP	
  Hopper             The	
  Hotel
                                                  vs




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                   53

Monday, August 8, 2011
Summary

              What	
  happens	
  when	
  you	
  physically	
  control	
  two	
  or	
  more	
  
              IP	
  Phones?                                                                                     Using	
  the	
  IP	
  
                                                                                                             Phone	
  reboot	
  as	
  a	
  
                                                                                                             tool	
  or	
  method	
  to	
  

                      Are	
  people	
  really	
  thinking	
  about	
  this?                                  learn	
  informaaon	
  
                                                                                                            about	
  the	
  network.


                      A	
  potenaal	
  coordinated	
  aPack	
  from	
  trusted	
  ports
                                                                                                                   802.1q	
  tagged	
  ARP	
  	
  

                      Key	
  Assumpaons                                                                         traffic	
  is	
  another	
  way	
  of	
  
                                                                                                                 learning	
  the	
  VLAN	
  ID.	
  	
  
                                                                                                                  We	
  don’t	
  absolutely	
  
                          • Phones	
  members	
  of	
  same	
  VLAN,	
  broadcast	
  domain                    need	
  CDP,	
  DHCP,	
  or	
  LLDP.


                          • An	
  ethernet	
  broadcast	
  (ARP)	
  will	
  forward	
  to	
  all	
  broadcast	
  domain	
  
                            member	
  switch	
  ports
                          • Hotels	
  usually	
  would	
  terminate	
  all	
  IP	
  Phones	
  into	
  same	
  wiring	
  
                            closet	
  on	
  a	
  given	
  floor
                          • Very	
  likely	
  that	
  phones	
  in	
  adjoining	
  rooms	
  are	
  in	
  same	
  VLAN

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                        54

Monday, August 8, 2011
Summary

              The	
  point	
  is	
  that	
  for	
  VoIP,	
  QoS,	
  and	
  
              “convergence”	
  to	
  work,	
  you	
  (usually)	
  need	
  both	
  
              VLANs	
  allowed
                      Risk	
  of	
  VLAN	
  Hop	
  known	
  for	
  a	
  long	
  ame
                      This	
  is	
  about	
  the	
  risk	
  of	
  VLAN	
  Hop	
  in	
  environments	
  that	
  
                      require	
  trunk	
  ports	
  in	
  user	
  access	
  networks




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                            55

Monday, August 8, 2011
Summary

              Impact	
  in	
  this	
  Case	
  Study
                      Unauthorized	
  IP	
  network	
  access	
  to	
  VoIP	
  network
                          • Enables	
  UC	
  specific	
  aPacks	
  against	
  VoIP	
  network
                          • Could	
  allow	
  access	
  to	
  corporate	
  data	
  (servers)
                          • Could	
  represent	
  criacal	
  business	
  impact
                          • APacker	
  sixng	
  in	
  privacy	
  of	
  guest	
  room	
  could	
  spend	
  all	
  the	
  
                            ame	
  he	
  or	
  she	
  desires	
  penetraang	
  further
              These	
  Hotels	
  deploying	
  UC	
  in	
  guest	
  rooms	
  should	
  
              be	
  aware	
  and	
  apply	
  required	
  security	
  controls
                                                  Miagaaon	
  covered	
  at	
  end	
  of	
  slides

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                      56

Monday, August 8, 2011
Summary

              Authorized	
  VoIP	
  Pentest	
  in	
  2007
                      Gained	
  unauthorized	
  access	
  to	
  Hotel’s	
  servers	
  through	
  
                      IP	
  Phone	
  in	
  hotel	
  guest	
  room
                      Potenaal	
  back	
  door	
  into	
  internal	
  systems	
  could	
  
                      represent	
  criacal	
  impact	
  to	
  business	
  in	
  hospitality	
  
                      industries
                      Businesses	
  deploying	
  UC	
  to	
  private	
  areas	
  must	
  
                      understand	
  the	
  risk	
  ~	
  it	
  can	
  be	
  properly	
  miagated
                      Could	
  represent	
  another	
  method	
  of	
  data	
  breach	
  (credit	
  
                      card	
  data)
      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                    57

Monday, August 8, 2011
Summary

              Physical	
  Security	
  is	
  compromised	
  here
                      It’s	
  a	
  unique	
  situaaon	
  for	
  hotel	
  rooms
                      Guests	
  have	
  right	
  to	
  privacy
                      Security	
  controls	
  need	
  to	
  compensate	
  for	
  this
                      Soluaons	
  such	
  as	
  802.1x	
  provide	
  equivalent	
  physical	
  
                      security




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                   58

Monday, August 8, 2011
Valcros and Percipia




                                                                   I	
  
                                                        wanted	
  to	
  ask:	
  
                                                         how	
  do	
  you	
  
                                                         recommend	
  
                                                       best	
  pracaces	
  in	
  
                                                          these	
  hotel	
  
                                                       infrastructures?



      DefCon	
  19	
  ~	
  August	
  6,	
  2011   59

Monday, August 8, 2011
Valcros and Percipia




                                                     No	
  
                                                  response


      DefCon	
  19	
  ~	
  August	
  6,	
  2011               60

Monday, August 8, 2011
Hotel Survey
         Idea	
  to	
  conduct	
  a	
  survey	
  of	
  hotels
                  Objecave:
                     • To	
  find	
  percentage	
  of	
  hotels	
  using	
  VoIP	
  and	
  price,	
  from	
  a	
  
                       sampling	
  of	
  100	
  luxury	
  hotels
                     • To	
  record	
  calls	
  and	
  see	
  how	
  the	
  reservaaon	
  specialist	
  
                       answers	
  quesaons	
  of	
  IP	
  Phones	
  in	
  guest	
  rooms
                  Used	
  research	
  assistant,	
  recorded	
  all	
  phone	
  calls
                  Hotels	
  included	
  20%	
  internaaonal	
  and	
  80%	
  US
                     • Included	
  Paris,	
  London,	
  NYC,	
  Tokyo,	
  Monte	
  Carlo
                     • Most	
  US	
  were	
  Las	
  Vegas	
  and	
  other	
  casino	
  resort	
  hotels

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                   61

Monday, August 8, 2011
Hotel Survey
         Script
                  “My	
  boss	
  has	
  a	
  strong	
  preference	
  for	
  hotels	
  with	
  VoIP,	
  as	
  he	
  
                  really	
  likes	
  the	
  service	
  and	
  convenience	
  of	
  these	
  IP	
  Phones”
                  Interesang	
  from	
  a	
  social	
  engineering	
  aspect	
  	
  
                  If	
  an	
  aPacker	
  wanted	
  to	
  find	
  potenaal	
  VoIP	
  Hopping	
  targets
         Result
                  Of	
  100	
  luxury	
  hotels,	
  8	
  out	
  of	
  100	
  (8%)	
  confirmed	
  to	
  have	
  IP	
  
                  phones	
  in	
  guest	
  rooms
                  Average	
  room	
  price	
  per	
  night:	
  	
  $655.32	
  USD



      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                  62

Monday, August 8, 2011
Hotel Survey
         Sample	
  audio	
  clip	
  1
                  For	
  hotels	
  that	
  do,	
  reservaaon	
  specialist	
  doesn’t	
  know	
  
                  what	
  VoIP	
  is	
  and	
  has	
  to	
  check
                  “Ooohhh....not	
  quite	
  sure	
  if	
  our	
  phones	
  do	
  that”




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                   63

Monday, August 8, 2011
Hotel Survey
         Sample	
  audio	
  clip	
  2
                  She	
  checked	
  with	
  her	
  IT	
  Director	
  and	
  they	
  do	
  have	
  IP	
  
                  Phones




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                           64

Monday, August 8, 2011
Voice VLANs as Trunk Ports
         Went	
  back	
  through	
  all	
  internal	
  VoIP	
  Pentests,	
  
         researched	
  packet	
  captures	
  from	
  Voice	
  VLAN	
  port
         In	
  6	
  customer	
  cases,	
  tagged	
  frames	
  revealed:
                  5	
  deployments	
  revealed	
  VVID	
  through	
  ARP	
  to	
  switch	
  
                  access	
  ports                                             Mula-­‐VLAN	
  
                                                                             access	
  ports
                  1	
  deployment	
  didn’t	
  tag	
  ARP	
  packets
         Summary
                  Cisco	
  Voice	
  VLANs	
  appear	
  to	
  behave	
  as	
  trunk	
  ports
                  Adverase	
  VVID	
  to	
  access	
  ports	
  through	
  802.1q	
  tagged	
  
                  ARP
      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                    65

Monday, August 8, 2011
Voice VLANs as Trunk Ports

              Sent	
  noaficaaon	
  to	
  Cisco	
  PSIRT




      DefCon	
  19	
  ~	
  August	
  6,	
  2011           66

Monday, August 8, 2011
Voice VLANs as Trunk Ports




      DefCon	
  19	
  ~	
  August	
  6,	
  2011   67

Monday, August 8, 2011
LLDP-MED

                                                  ether	
  proto	
  0x88cc




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                              68

Monday, August 8, 2011
Intro to LLDP-MED

              LLDP
                      Link	
  Layer	
  Discovery	
  Protocol	
  ~	
  802.1A
                      New	
  standardized	
  Discovery	
  Protocol
                      IEEE	
  mula-­‐vendor	
  support	
  ~	
  provides	
  standards-­‐based	
  
                      discovery	
  for	
  vendor	
  interop	
  (May	
  2005)
              LLDP-­‐MED
                      Link	
  Layer	
  Discovery	
  Protocol	
  -­‐	
  Media	
  Endpoint	
  
                      Discovery
                      An	
  extension	
  to	
  LLDP	
  to	
  address	
  voice	
  applicaaons

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                   69

Monday, August 8, 2011
Intro to LLDP-MED

              Uses	
  TLV	
  messages	
  to	
  communicate	
  to	
  neighboring	
  devices
                      Very	
  similar	
  to	
  CDP,	
  IP	
  Phones	
  can	
  learn	
  VoIP	
  VLAN	
  and	
  negoaate	
  
                      power	
  with	
  PoE	
  Switch	
  (but	
  it’s	
  IEEE	
  mula-­‐vendor	
  interop!)
              Summarized	
  features
                      Inventory	
  control	
  (Serial	
  number,	
  model	
  numbers,	
  firmware)
                      Network	
  Topology	
  with	
  an	
  NMS	
  (Aid	
  in	
  troubleshooang)
                      Power	
  Negoaaaon	
  and	
  priority
                      Network	
  Policy	
  Discovery	
  (VoIP	
  VLAN)
                      Capabiliaes	
  Discovery
                      Automaac	
  Locaaon	
  Idenaficaaon	
  (E911)
                          • Media	
  endpoint	
  locaaon	
  in	
  emergency	
  situaaons

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                       70

Monday, August 8, 2011
e911 Emergency Services

              Corporaaons	
  challenged	
  by	
  obligaaon	
  to	
  support	
  
              Emergency	
  Calling	
  Services	
  (ECS)	
  that	
  include	
  
              E911
                      Difficult	
  due	
  to	
  lack	
  of	
  standards
                      LLDP-­‐MED	
  provides	
  e911	
  in	
  enterprises
                      When	
  an	
  endpoint	
  receives	
  a	
  TLV	
  with	
  ECS	
  locaaon	
  
                      data,	
  stores	
  it	
  and	
  can	
  communicate	
  with	
  public	
  safety	
  
                      answering	
  point
                      Appears	
  more	
  useful	
  for	
  telling	
  IP	
  Phone	
  its	
  locaaon

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                        71

Monday, August 8, 2011
e911 Emergency Services

              Locaaon	
  informaaon
                      Normally	
  sent	
  from	
  switch	
  to	
  phone
                      For	
  phones	
  that	
  can’t	
  determine	
  their	
  own	
  locaaon
                      Can	
  be	
  useful	
  for	
  locaaon	
  based	
  applicaaons	
  on	
  phone
              Scenarios	
  where	
  an	
  IP	
  Phone	
  needs	
  to	
  send	
  its	
  
              locaaon	
  informaaon	
  to	
  switch
                      Any	
  security	
  risk
                      Spoofing	
  LLDP-­‐MED	
  messages


      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                   72

Monday, August 8, 2011
Comparison: LLDP-MED vs CDP

                                                  LLDP-­‐MED                                     CDP

                                                  Cisco	
  IOS	
  switch	
  accepts	
            Cisco	
  IOS	
  switch	
  accepts	
  
      Spoofing                                     spoofed	
  LLDP.	
  	
  Can	
  spoof	
         spoofed	
  CDP.
                                                  capabiliaes,	
  fill	
  LLDP	
  table.
                                                  Can	
  sniff	
  LLDP	
  adverasements,	
        Can	
  easily	
  sniff	
  CDP	
  and	
  learn	
  
      Sniffing                                      but	
  by	
  default	
  don’t	
  receive	
     VVVID	
  by	
  default
                                                  Network	
  Policy	
  (VVID)	
  TLV
                                                  Spoofing	
  LLDP	
  doesn’t	
  bypass	
         Spoofing	
  CDP	
  can	
  bypass	
  
      802.1x	
  Bypass                            802.1x.	
  	
  LLDP	
  messages	
  can’t	
     802.1x	
  with	
  Voice	
  VLANs.	
  	
  Can	
  
                                                  be	
  prior	
  to	
  802.1x	
  port	
  up.     be	
  miagated	
  with	
  802.1x.
                                                  LLDP-­‐MED	
  must	
  be	
  spoofed.	
  	
  
      Automaacally	
  learning	
  VVID                                                           Spoofed	
  or	
  sniffed.	
  	
  Easier.
                                                  Harder.




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                                    73

Monday, August 8, 2011
Case Study: Pentest with LLDP-MED

              Plugged	
  into	
  Ethernet	
  port
                      Received	
  LLDP-­‐MED	
  mulacast	
  messages	
  from	
  other	
  IP	
  
                      Phones	
  on	
  VLAN




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                 74

Monday, August 8, 2011
Mitigations

              Voice	
  1:	
  	
  VoIP	
  is	
  totally	
  insecure!	
  	
  Be	
  scared!
              Voice	
  2:	
  	
  Don’t	
  worry,	
  VoIP	
  is	
  safe,	
  you	
  don’t	
  have	
  
              to	
  do	
  anything!	
  	
  It’s	
  secure	
  out	
  of	
  the	
  box!
              Truth	
  rests	
  somewhere	
  in	
  between
                      As	
  any	
  TCP/IP	
  client/server	
  applicaaon,	
  VoIP	
  can	
  most	
  
                      definitely	
  be	
  properly	
  secured	
  to	
  match	
  your	
  
                      environment’s	
  security	
  requirements
                      It	
  should	
  be


      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                     75

Monday, August 8, 2011
Mitigations: Don’t do this

              Port	
  Security
              MAC	
  Address	
  filtering




      DefCon	
  19	
  ~	
  August	
  6,	
  2011   76

Monday, August 8, 2011
Mitigations: Don’t do this

              Including	
  “hiding”	
  the	
  MAC	
  Address
              Hiding	
  the	
  MAC	
  Address	
  isn’t	
  a	
  security	
  feature




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                       77

Monday, August 8, 2011
Mitigations

              Locking	
  phones	
  to	
  wall




      DefCon	
  19	
  ~	
  August	
  6,	
  2011   78

Monday, August 8, 2011
Mitigations

              Can	
  be	
  broken	
  with	
  this




      DefCon	
  19	
  ~	
  August	
  6,	
  2011     79

Monday, August 8, 2011
Mitigations

   Fascinaang,	
  found	
  another	
  hotel	
  this	
  
   week	
  using	
  IP	
  Phones	
  in	
  guest	
  rooms.
   Vendor	
  is	
  specialized	
  for	
  VoIP	
  in	
  
   hospitality	
  industry:	
  	
  www.teledex.com




      DefCon	
  19	
  ~	
  August	
  6,	
  2011             80

Monday, August 8, 2011
Mitigations
   Fascinaang,	
  look	
  at	
  what	
  
   they	
  did.	
  They	
  stripped	
  the	
  
   RJ-­‐45	
  plug	
  where	
  a	
  human	
  
   would	
  easily	
  unplug	
  the	
  
   cable.	
  	
  

   Almost	
  a	
  poor	
  man’s	
  
   physical	
  security	
  soluaon.	
  	
  It	
  
   looked	
  like	
  you	
  could	
  sall	
  
   use	
  a	
  tool	
  to	
  pry	
  off	
  the	
  
   ethernet	
  plug.




      DefCon	
  19	
  ~	
  August	
  6,	
  2011     81

Monday, August 8, 2011
Part II
   As	
  circumstance	
  would	
  have	
  it,	
  I	
  changed	
  
   rooms	
  (yesterday)	
  in	
  this	
  hotel.	
  	
  Found	
  the	
  
   following	
  in	
  comparing	
  new	
  room	
  to	
  prior:

   *	
  In	
  my	
  new	
  room,	
  IP	
  phone	
  didn’t	
  have	
  same	
  
   physical	
  security	
  control	
  applied.

   *	
  The	
  RJ-­‐45	
  connector	
  plug	
  was	
  intact,	
  and	
  one	
  
   could	
  easily	
  disconnect	
  the	
  phone	
  from	
  the	
  
   wall	
  and	
  connect	
  their	
  laptop.

   *	
  Fascinaang:	
  	
  Physical	
  security	
  controls	
  not	
  
   applied	
  consistently	
  across	
  hotel	
  guest	
  rooms.

   *	
  Human	
  error	
  always	
  the	
  weakest	
  link	
  in	
  a	
  
   security	
  system	
  and	
  can	
  lead	
  to	
  breach,	
  in	
  the	
  
   right	
  scenarios.



      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                   82

Monday, August 8, 2011
Mitigations

              Great	
  Miagaaon	
  Idea,	
  not	
  using	
  dot1x
                      Lock	
  phones	
  to	
  wall	
  using	
  Panduit	
  or	
  equivalent
                      If	
  IP	
  Phones	
  are	
  disconnected	
  from	
  wall
                                                                                                                            Great	
  security	
  
                                                                                                                          miagaaon	
  idea	
  from	
  
                                                                                                                          Chris	
  and	
  Zack	
  with	
  
                                                                                                                            Cisco	
  Systems
                          • Err-­‐disable	
  the	
  port	
  ~	
  port	
  goes	
  down	
  and	
  needs	
  
                            Administrator	
  intervenaon	
  to	
  enable
                          • Issue	
  a	
  high	
  priority	
  snmp	
  trap	
  or	
  syslog	
  of	
  suspicious	
  
                            acavity
                                   –With	
  either	
  method,	
  if	
  the	
  aPacker	
  has	
  physically	
  broken	
  through	
  the	
  
                                    security	
  locks,	
  this	
  is	
  highly	
  suspicious	
  acavity	
  in	
  a	
  hotel	
  room
                                      »Either	
  scenario	
  should	
  require	
  NetOps	
  or	
  SecOps	
  noaficaaon


      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                                   83

Monday, August 8, 2011
Mitigations

              802.1x	
  with	
  mula-­‐domain	
  authenacaaon




              Make	
  sure	
  you	
  don’t	
  configure	
  single	
  VLAN
                      With	
  Cisco	
  Voice	
  VLANs,	
  802.1x	
  can	
  be	
  bypassed	
  via	
  
                      spoofing	
  CDP



      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                       84

Monday, August 8, 2011
Dotx1 limitations

                      Be	
  careful	
  with	
  802.1x	
  with	
  VoIP	
  wired	
  deployments
                          • Uses	
  RFC	
  3847	
  EAP-­‐MD5	
  authenacaaon
                          • Vulnerable	
  to	
  2	
  security	
  issues
                                      –Vulnerable	
  to	
  offline	
  pcap	
  dicaonary	
  aPack
                                        »EAP-­‐MD5	
  vulnerable	
  to	
  offline	
  dicaonary	
  aPack
         Major	
  props	
             –Vulnerable	
  to	
  MiTM	
  aPack
   to	
  Josh	
  Wright	
  for	
  
         his	
  research.               »802.1x	
  EAP	
  authenacaaon	
  only	
  required	
  in	
  wired	
  deployments	
  
                                          when	
  port	
  comes	
  up
             Discovered	
  by	
  
            Steve	
  Riley	
  and	
  
                                        »APacker	
  can	
  piggyback	
  on	
  successful	
  Auth	
  of	
  an	
  IP	
  Phone,	
  sharing	
  
         Svyatoslav	
  Pidgorny	
  
     with	
  Microsou	
  (2005)
                                          a	
  hub	
  with	
  IP	
  Phone	
  for	
  unauthorized	
  access




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                                 85

Monday, August 8, 2011
Dotx1 limitations

                      In	
  2008,	
  VIPER	
  published	
  open	
  source	
  security	
  
                      assessment	
  tool	
  to	
  highlight	
  both	
  of	
  these	
  issues	
  in	
  
                      wired	
  802.1x	
  deployments
                          • XTest	
  (ToorCon	
  X,	
  2008)
                      Talk	
  advancing	
  this	
  forward




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                          86

Monday, August 8, 2011
Mitigations

              MACSec
                      IEEE	
  802.1AE
                      Provides	
  hop-­‐by-­‐hop	
  layer	
  2	
  encrypaon
                      Doesn’t	
  appear	
  to	
  be	
  widespread	
  support	
  yet,	
  at	
  least	
  
                      in	
  Edge	
  network	
  ethernet	
  switch	
  products,	
  or	
  IP	
  Phones




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                      87

Monday, August 8, 2011
Conclusion - Thank you for listening!

              Why	
  I	
  did	
  this

                                                  Someone	
  is	
  going	
  to	
  get
                                                  caught	
  with	
  their	
  pants
                                                             down




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                        88

Monday, August 8, 2011
Conclusion

              Why	
  I	
  did	
  this
                      This	
  talk	
  is	
  a	
  culminaaon	
  of	
  my	
  research	
  on	
  hotel	
  VoIP	
  
                      VLAN	
  &	
  Infrastructure	
  security	
  (since	
  2007)
                      Share	
  something	
  I’m	
  passionate	
  about	
  (interests	
  me)




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                             89

Monday, August 8, 2011
Conclusion

              Why	
  I	
  did	
  this	
  (conanued)
                      To	
  create	
  educaaon	
  and	
  awareness
                      To	
  publish	
  a	
  new	
  version	
  of	
  the	
  free	
  security	
  tool,	
  “VoIP	
  
                      Hopper”,	
  so	
  that	
  people	
  can	
  test	
  their	
  own	
  network
                          • Understand	
  the	
  vulnerability	
  and	
  risk	
  for	
  yourself	
  (hotels,	
  
                            integrators)
                          • Showing	
  is	
  believing
                          • Seeing	
  the	
  vulnerability	
  is	
  believing	
  (VoIP	
  Hopper)
                          • Someames	
  people	
  have	
  to	
  see	
  a	
  vulnerability	
  with	
  their	
  
                            own	
  eyes	
  before	
  they	
  can	
  start	
  to	
  miagate	
  it

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                90

Monday, August 8, 2011
Conclusion

              Why	
  I	
  did	
  this	
  (conanued)
                      It’s	
  my	
  hope	
  this	
  informaaon	
  will	
  get	
  into	
  the	
  proper	
  
                      hands
                          • Hotel	
  Net	
  and	
  Sec	
  Ops
                          • System	
  integrators	
  and	
  VARs	
  who	
  implement	
  these	
  
                            Hospitality	
  VoIP	
  soluaons
                      Before	
  a	
  real	
  security	
  breach	
  happens	
  in	
  a	
  hotel
                      See,	
  if	
  I’m	
  showing	
  this	
  today,	
  and	
  it	
  is	
  news	
  to	
  a	
  hotel
                          • How	
  many	
  people	
  already	
  know,	
  and	
  were	
  silent?
                          • How	
  many	
  hotels	
  have	
  already	
  been	
  breached?

      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                  91

Monday, August 8, 2011
Conclusion

              Why	
  I	
  did	
  this	
  (conanued)
                          • Publishing	
  updated	
  best	
  pracaces	
  around	
  UC	
  security	
  in	
  	
  
                            these	
  deployments	
  would	
  be	
  a	
  good	
  first	
  step
                                   –UC	
  Security	
  where	
  802.1q	
  trunking	
  is	
  required	
  ~	
  to	
  protect	
  customers
                          • SANS	
  menaons	
  this	
  in	
  their	
  Top	
  20	
  (2007)




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                                                92

Monday, August 8, 2011
Contact Information

              Jason	
  Ostrom,	
  CCIE	
  #15239	
  (Security)
                      Director,	
  VIPER	
  (Voice	
  over	
  IP	
  Exploit	
  Research)
                      jostrom@viperlab.net;	
  iknowjason@pobox.com
              For	
  more	
  informaaon	
  about	
  us,	
  visit	
  us	
  online:
                      VIPER	
  Lab:	
  	
  hPp://www.viperlab.net
                      Sipera	
  Systems:	
  	
  hPp://www.sipera.com




      DefCon	
  19	
  ~	
  August	
  6,	
  2011                                   93

Monday, August 8, 2011

Weitere ähnliche Inhalte

Was ist angesagt?

IPv6 and How It Impacts Communication Applications
IPv6 and How It Impacts Communication ApplicationsIPv6 and How It Impacts Communication Applications
IPv6 and How It Impacts Communication ApplicationsVoxeo Corp
 
Alec Saunders’s Presentation at eComm 2009
Alec Saunders’s Presentation at eComm 2009Alec Saunders’s Presentation at eComm 2009
Alec Saunders’s Presentation at eComm 2009eCommConf
 
1001tech i pvox-ip-pbx-datasheet
1001tech i pvox-ip-pbx-datasheet1001tech i pvox-ip-pbx-datasheet
1001tech i pvox-ip-pbx-datasheet1001tech IPvox
 
Mobiz: Marketing in a Mobile World
Mobiz: Marketing in a Mobile WorldMobiz: Marketing in a Mobile World
Mobiz: Marketing in a Mobile WorldAlliance numérique
 
BNS: Monitising The Hotel Room
BNS: Monitising The Hotel RoomBNS: Monitising The Hotel Room
BNS: Monitising The Hotel Roomankegill
 
Use Vo Ip Solution For Improve Enterprise Communication Ntust0716
Use Vo Ip Solution For Improve Enterprise Communication Ntust0716Use Vo Ip Solution For Improve Enterprise Communication Ntust0716
Use Vo Ip Solution For Improve Enterprise Communication Ntust0716jones1812
 
Sound Matters in Multiscreen Entertainment Delivery - TVNext 2012
Sound Matters in Multiscreen Entertainment Delivery - TVNext 2012Sound Matters in Multiscreen Entertainment Delivery - TVNext 2012
Sound Matters in Multiscreen Entertainment Delivery - TVNext 2012Ellis Reid
 

Was ist angesagt? (11)

Vo ip
Vo ipVo ip
Vo ip
 
IPv6 and How It Impacts Communication Applications
IPv6 and How It Impacts Communication ApplicationsIPv6 and How It Impacts Communication Applications
IPv6 and How It Impacts Communication Applications
 
Alec Saunders’s Presentation at eComm 2009
Alec Saunders’s Presentation at eComm 2009Alec Saunders’s Presentation at eComm 2009
Alec Saunders’s Presentation at eComm 2009
 
BNS Monitising The Hotel Room
BNS Monitising The Hotel RoomBNS Monitising The Hotel Room
BNS Monitising The Hotel Room
 
Call One 2012
Call One 2012Call One 2012
Call One 2012
 
1001tech i pvox-ip-pbx-datasheet
1001tech i pvox-ip-pbx-datasheet1001tech i pvox-ip-pbx-datasheet
1001tech i pvox-ip-pbx-datasheet
 
Mobiz: Marketing in a Mobile World
Mobiz: Marketing in a Mobile WorldMobiz: Marketing in a Mobile World
Mobiz: Marketing in a Mobile World
 
BNS: Monitising The Hotel Room
BNS: Monitising The Hotel RoomBNS: Monitising The Hotel Room
BNS: Monitising The Hotel Room
 
Use Vo Ip Solution For Improve Enterprise Communication Ntust0716
Use Vo Ip Solution For Improve Enterprise Communication Ntust0716Use Vo Ip Solution For Improve Enterprise Communication Ntust0716
Use Vo Ip Solution For Improve Enterprise Communication Ntust0716
 
Naomi assia
Naomi assiaNaomi assia
Naomi assia
 
Sound Matters in Multiscreen Entertainment Delivery - TVNext 2012
Sound Matters in Multiscreen Entertainment Delivery - TVNext 2012Sound Matters in Multiscreen Entertainment Delivery - TVNext 2012
Sound Matters in Multiscreen Entertainment Delivery - TVNext 2012
 

Ähnlich wie VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP

VoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showVoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showmarilynjolly
 
Market Update For Enterprise
Market Update For EnterpriseMarket Update For Enterprise
Market Update For EnterpriseChuck Adams
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsAshik Jibon
 
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria An ...
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria  An ...A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria  An ...
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria An ...Michele Thomas
 
IP Telephone Service
IP Telephone ServiceIP Telephone Service
IP Telephone ServiceMRO
 
ONUG Keynote - VoIP Has Just Begun
ONUG Keynote - VoIP Has Just BegunONUG Keynote - VoIP Has Just Begun
ONUG Keynote - VoIP Has Just BegunAndrew Randall
 
Martin Taylor's Presentation at Emerging Communication Conference & Awards 20...
Martin Taylor's Presentation at Emerging Communication Conference & Awards 20...Martin Taylor's Presentation at Emerging Communication Conference & Awards 20...
Martin Taylor's Presentation at Emerging Communication Conference & Awards 20...eCommConf
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056mashiur
 
Webinar: Fanvil SIP Intercom and Door Phones
Webinar: Fanvil SIP Intercom and Door PhonesWebinar: Fanvil SIP Intercom and Door Phones
Webinar: Fanvil SIP Intercom and Door PhonesNeocenter SA de CV
 
Final Twilio Under the Radar 2009 Cloud
Final Twilio Under the Radar 2009 CloudFinal Twilio Under the Radar 2009 Cloud
Final Twilio Under the Radar 2009 CloudDealmaker Media
 
VoIP Presentation
VoIP PresentationVoIP Presentation
VoIP PresentationJamJin
 
385 voice over ip
385 voice over ip385 voice over ip
385 voice over ipjacinthsara
 
Unified Communication na urządzeniach mobilnych. Magia czy rzeczywistość?
Unified Communication na urządzeniach mobilnych. Magia czy rzeczywistość?Unified Communication na urządzeniach mobilnych. Magia czy rzeczywistość?
Unified Communication na urządzeniach mobilnych. Magia czy rzeczywistość?Biznes to Rozmowy
 

Ähnlich wie VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP (20)

VoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 showVoIP group - research project presentation - marilyn jolly - section 800 show
VoIP group - research project presentation - marilyn jolly - section 800 show
 
Market Update For Enterprise
Market Update For EnterpriseMarket Update For Enterprise
Market Update For Enterprise
 
How to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling EnvironmentsHow to Optimize VoIP Call Quality Across Multiple Calling Environments
How to Optimize VoIP Call Quality Across Multiple Calling Environments
 
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria An ...
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria  An ...A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria  An ...
A Low-Cost Telephony System For Small Medium Scale Businesses In Nigeria An ...
 
Voip
VoipVoip
Voip
 
Voip
VoipVoip
Voip
 
IP Telephone Service
IP Telephone ServiceIP Telephone Service
IP Telephone Service
 
VOIP Presentation
VOIP PresentationVOIP Presentation
VOIP Presentation
 
Hospitality Solution
Hospitality SolutionHospitality Solution
Hospitality Solution
 
ONUG Keynote - VoIP Has Just Begun
ONUG Keynote - VoIP Has Just BegunONUG Keynote - VoIP Has Just Begun
ONUG Keynote - VoIP Has Just Begun
 
Martin Taylor's Presentation at Emerging Communication Conference & Awards 20...
Martin Taylor's Presentation at Emerging Communication Conference & Awards 20...Martin Taylor's Presentation at Emerging Communication Conference & Awards 20...
Martin Taylor's Presentation at Emerging Communication Conference & Awards 20...
 
Voip
VoipVoip
Voip
 
Rumana Akther Id#072842056
Rumana Akther Id#072842056Rumana Akther Id#072842056
Rumana Akther Id#072842056
 
Webinar: Fanvil SIP Intercom and Door Phones
Webinar: Fanvil SIP Intercom and Door PhonesWebinar: Fanvil SIP Intercom and Door Phones
Webinar: Fanvil SIP Intercom and Door Phones
 
Final Twilio Under the Radar 2009 Cloud
Final Twilio Under the Radar 2009 CloudFinal Twilio Under the Radar 2009 Cloud
Final Twilio Under the Radar 2009 Cloud
 
VoIP Presentation
VoIP PresentationVoIP Presentation
VoIP Presentation
 
VOIP BASIC
VOIP BASICVOIP BASIC
VOIP BASIC
 
385 voice over ip
385 voice over ip385 voice over ip
385 voice over ip
 
Unified Communication na urządzeniach mobilnych. Magia czy rzeczywistość?
Unified Communication na urządzeniach mobilnych. Magia czy rzeczywistość?Unified Communication na urządzeniach mobilnych. Magia czy rzeczywistość?
Unified Communication na urządzeniach mobilnych. Magia czy rzeczywistość?
 
VoIP Overview
VoIP OverviewVoIP Overview
VoIP Overview
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP

  • 1. VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP Jason Ostrom Monday, August 8, 2011
  • 2. VIPER “Research” in Las Vegas DefCon  19  ~  August  6,  2011 2 Monday, August 8, 2011
  • 3. Thank you Friends  and  associates Who  might  be  here • Charles,  Arjun,  Tom,  Victor,  Zack,  Brian,  Chris,  Shaq Who  couldn’t  make  it  here Thanks  to   • Ed  S. everyone  else   in  this  room   • Erik  G. right  now,  for   • Camey  Y. aPending  my   talk. DefCon  19  ~  August  6,  2011 3 Monday, August 8, 2011
  • 4. Agenda VIPER  Intro UC  Business  Examples Live  Demo  &  Case  Study:    Hotel  VoIP  Vulnerability Live  Demo  &  Case  Study:    LLDP-­‐MED Conclusion DefCon  19  ~  August  6,  2011 4 Monday, August 8, 2011
  • 5. What is VIPER VIPER  R&D  (Voice  over  IP  Exploit  Research) Author  open  source  security  tools  (VAST) LAVA  (Load  Analysis  &  Vulnerability  Assessment) VoIP  Honeypot Penetraaon  Tesang  of  VoIP  and  UC  Networks “field  research”  -­‐  understand  real  vulnerabiliaes  &   problems  in  producaon  networks Proacave  idenaficaaon  of  client  vulnerabiliaes  before   someone  else DefCon  19  ~  August  6,  2011 5 Monday, August 8, 2011
  • 6. Market: VoIP in Hotels Market  is  growing Worldwide  revenue  $869  million  in  2008 By  end  of  2014,  will  exceed  $2  billion  (ABI  Research) Currently  most  adopted  in  luxury  resort  hotels Catering  to  clientele  willing  to  spend  >  $300  night Expected  to  penetrate  mid-­‐range  hotels  soon High-­‐end  hotels  using  technology  as  a   differenaator DefCon  19  ~  August  6,  2011 6 Monday, August 8, 2011
  • 7. Market: VoIP in Hotels DefCon  19  ~  August  6,  2011 7 Monday, August 8, 2011
  • 8. Benefits to Hotel Well  known  benefits  of  VoIP Simplicity  of  Network  Management Reducaon  of  cabling  cost  (VoIP,  data,  video  over  single   cabling  plant) Reducaon  of  telecom  expenses  (Global  offices) Ad  and  markeang  revenue  directly  on  the  IP   Phones  ~  revenue  stream  to  hotel Improved  customer  service  ~  increased  revenue   from  repeat  customers DefCon  19  ~  August  6,  2011 8 Monday, August 8, 2011
  • 9. Benefits to Hotel (continued) New  VoIP  applicaaons  provide  improved  guest   service  ~  technology  differenaator  (compeaaon) VoIP  as  a  QA  tool,  to  improve  customer  service Rebuild  lost  telephone  service  revenue  (from   mobile  phones) European  roaming  charges  outside  home  area  are   inflated VoIP  can  provide  lower  costs  than  roaming  charges,   benefiang  Hotel  and  guests DefCon  19  ~  August  6,  2011 9 Monday, August 8, 2011
  • 10. Benefits to Hotel (continued) Low  cost  of  internaaonal  calling  over  VoIP Provide  an  internaaonal  inbound  number  in  home   country  of  guest,  increasing  reservaaons Growing  Trend  in  Hospitality:    Giving  guests  free  limited   or  unlimited  internaaonal  calling VoIP  over  Wi-­‐Fi  Wireless  in  Hotels For  employee  communicaaon For  guests,  ordering  products  and  services  with  click  of   a  buPon DefCon  19  ~  August  6,  2011 10 Monday, August 8, 2011
  • 11. Benefits to Guests Improved  service Order  room  service  from  IP  Phone  menu Browse  colorful  menu  displays  showing  dining  opaons   in  a  hotel,  while  making  reservaaon  New  products,  services  (VoIP  over  WiFi  handsets) Convenient,  advanced  call  features Automated  wake  up  call,  Voice  mail,  Call  Forwarding Lowered  telecom  costs  passed  on  to  guests Cheaper  guest  Internaaonal,  domesac  calling DefCon  19  ~  August  6,  2011 11 Monday, August 8, 2011
  • 12. VoIP Security benefits For  the  hotel • Prevents  unauthorized  access  to  internal  systems • Protects  hotel  guests  from  UC  specific  aPacks,  like   eavesdropping • Of  course,  it  is  the  responsibility  of  the  hotel  to  provide   security  for  the  hotel  guest For  the  guest • Prevents  eavesdropping  on  private  communicaaons   through  IP  Phones –Recording  VoIP  conversaaons,  re-­‐construcaon  of  media –Trapping  sensiave  data,  such  as  credit  card  data,  sent  over  VoIP DefCon  19  ~  August  6,  2011 12 Monday, August 8, 2011
  • 13. Case Studies: VoIP in Hotels Sources  for  Case  Studies DefCon  19  ~  August  6,  2011 13 Monday, August 8, 2011
  • 14. Case Study: Peninsula Hotels Five-­‐star  luxury  hotel  chain  in  North  America  and   Asia 14  Hotel  Chain  presence  globally  linked  by  VoIP Telecom  cost  savings  from  VoIP DefCon  19  ~  August  6,  2011 14 Monday, August 8, 2011
  • 15. Case Study: Peninsula Hotels Chain  can  manage  all  of  its  reservaaons  from  a   Global  Customer  Service  Center Employees  can  communicate  with  VoIP  (significant   cost  savings) Each  employee  has  his  or  her  own  number  which   stays  with  them  no  maPer  what  locaaon  they’re  in Caller  ID  from  global  locaaons DefCon  19  ~  August  6,  2011 15 Monday, August 8, 2011
  • 16. Case Study: Wynn Las Vegas Improved  customer  service  through  VoIP Improved  guest  experience  through  VoIP DefCon  19  ~  August  6,  2011 16 Monday, August 8, 2011
  • 17. Case Study: Wynn Las Vegas Strategy  to  “pamper  and  delight  guests” Each  guest  room  has  an  IP  Phone Reservaaons  over  touch  screen Guests  call  concierge  to  arrange  dinner  reservaaons   while  browsing  menus  and  pictures  of  dining  room  on   phone’s  color  display When  guest  calls  service  staff,  VoIP  rings  their  cell  and   desk  phone,  to  assure  the  guest  gets  through DefCon  19  ~  August  6,  2011 17 Monday, August 8, 2011
  • 18. Case Study: Wynn Las Vegas Quote: “As  Wynn  Resorts  is  showing,   the  enare  organizaaon  can   become  a  contact  center.    The   phone  is  no  longer  just  a   communicaaon  channel;  it’s  a   form  of  customer  service  in  its   own  right.” (Harvard  Business  Review) DefCon  19  ~  August  6,  2011 18 Monday, August 8, 2011
  • 19. Case Study: Hotel 1000 Seattle DefCon  19  ~  August  6,  2011 19 Monday, August 8, 2011
  • 20. Case Study: Hotel 1000 Seattle Luxury  hotel  in  SeaPle  deployed  Cisco  VoIP   technology VoIP  custom  applicaaons  created  by  Percipia Convergence  in  Hotel:    Single  infrastructure  for   data,  voice,  video,  and  security DefCon  19  ~  August  6,  2011 20 Monday, August 8, 2011
  • 21. Case Study: Hotel 1000 Seattle Downtown  SeaPle,  120  guest  rooms  and  47   condominium  units 3  levels  of  underground  parking  accessed  via   valet  car  elevator Mulaple  custom  applicaaons Video  valet  system Condominium  security  entry  applicaaon VoIP  applicaaon  to  detect  guest  presence  and  set  room   preferences DefCon  19  ~  August  6,  2011 21 Monday, August 8, 2011
  • 22. Case Study: Hotel 1000 Seattle Video  Valet  system: Guest  touches  screen  on  IP  Phone,  custom  app Sends  signal  to  valet  drivers  mobile  phone,  vehicle  locator   system  that  noafies  drivers  of  vehicle  locaaon Driver  closest  to  car  accepts  request  with  Cisco  7920  Wi-­‐Fi   phone,  noafying  other  drivers  that  request  taken Elevator  call  buPon  on  Wi-­‐Fi  phone  acavates  Hotel  1000  car   elevator  and  brings  it  to  the  level  where  car  and  driver  are   located. Valet  driver  can  use  WiFi  phone  to  send  a  picture  to  owner  of   car  ready,  which  shows  up  on  Cisco  IP  Phone  display DefCon  19  ~  August  6,  2011 22 Monday, August 8, 2011
  • 23. Case Study: Hotel 1000 Seattle Good  Quotes “It  is  never  just  about  bricks  and  mortar,  nor  is  it  about   technical  bells  and  whistles.    It  is  about  the  experience   that  maPers  to  the  individual  traveler.    It  made  sense  to   round  out  the  guest  experience  with  the  technology   experience  people  have  at  home  or  in  the  office,  so   that  they  arrive  in  an  environment  that  is  more  familiar   to  them.    That  is  not  the  norm  for  most  hotels.” DefCon  19  ~  August  6,  2011 23 Monday, August 8, 2011
  • 24. The Security Problem VLAN  Traversal  vulnerability Trivial  to  exploit Leads  to  unauthorized  IP  network  access The  Business  Risk Deployed  to  guest  rooms • Many  business  benefits All  deployments  I’ve  observed  are  at  risk • Physical  ports  by  default  permit  VLAN  traversal • Low  awareness DefCon  19  ~  August  6,  2011 24 Monday, August 8, 2011
  • 25. This is “The Vulnerability” - Credit DefCon  19  ~  August  6,  2011 25 Monday, August 8, 2011
  • 26. IEEE 802.1q Unauthorized VLAN Traversal Weakness September  1999  (12  years  ago) Steve  Schupp,  Dave  Taylor Further  research  by  Andrew  Vladimirov CVE-­‐1999-­‐1129  (BID:    615) Cisco  PSIRT  responded Acknowledges  vulnerability Recommended  Cisco  Security  Best  Pracaces • Disable  trunk  ports  that  shouldn’t  be  in  use DefCon  19  ~  August  6,  2011 26 Monday, August 8, 2011
  • 27. Other Researchers @Stake  Report:    “Secure  use  of  VLANS” August  2002 Mike  Schiffman,  David  Pollino Black  Hat  USA:    “Hacking  Layer  2:    Fun  with   Ethernet  Switches” 2002 Sean  Convery,  Cisco  Systems Cisco  White  Paper:    VLAN  Security  WP “Virtual  LAN  Security  Best  Pracaces” DefCon  19  ~  August  6,  2011 27 Monday, August 8, 2011
  • 28. Other Researchers SANS  Resources “Intrusion  Detecaon  FAQ:    Are  there  vulnerabiliaes  in   VLAN  Implementaaons?” • David  Taylor  (July,  2000) “Virtual  LAN  Security:    weaknesses  and   countermeasures” • Steve  A.  Rouiller “VLAN  Security  in  the  LAN  and  MAN  Environment” • Chris  Hoffmann  (April,  2003) DefCon  19  ~  August  6,  2011 28 Monday, August 8, 2011
  • 29. VoIP Hopping Definiaon Unauthorized  VLAN  access  within  a  VoIP  infrastructure,   that  was  not  intended  by  the  system  design Business  Risk  increases  in  areas  with: Inherent  right  to  privacy  (hotel  guest  rooms) Poor  physical  security  (public  access) DefCon  19  ~  August  6,  2011 29 Monday, August 8, 2011
  • 30. VoIP Hopping All  Best  Pracaces  recommend  disabling  trunk   ports  for  user  access  networks With  VoIP  to  work,  some  form  of  trunk  ports   (usually)  must  be  used Trunk  ports  in  tradiaonal  sense Mula-­‐access  VLANS  with  auxiliary  ports • The  Cisco  “Voice  VLAN” DefCon  19  ~  August  6,  2011 30 Monday, August 8, 2011
  • 31. Overview Benefit  of  VoIP: Saves  on  Cabling  Costs:     VoIP  and  Data   transmiPed  over  single   cable Easy  Provisioning: Easy  QoS: IP  Phones  can  auto-­‐ QoS  can  ensure  that  VoIP  and   discover  and  provision   Video  traffic  has  highest   into  the  VoIP  network priority  through  network DefCon  19  ~  August  6,  2011 31 Monday, August 8, 2011
  • 32. 802.1q Frame Tagging Attack: Step 1 Learn  the  VLAN  ID   Need  to  learn  the  VLAN  ID  to  tag  traffic,  or  the  ethernet   frames  will  be  dropped Usually  this  is  the  Voice  VLAN  ID  (VVID) Can  be  learned  through  CDP,  LLDP-­‐MED,  DHCP DefCon  19  ~  August  6,  2011 32 Monday, August 8, 2011
  • 33. 802.1q Frame Tagging Attack: Step 2 Spoof  tagged  ethernet  frames   Spoof  ethernet  frames  with  VLAN  ID  learned  in  Step  #1 Trivial  to  do,  using  special  souware  on  your  PC Create  a  virtual  interface  (eth0.xxx) Send  DHCP  with  eth0.xxx  (&  tag  subsequent  frames) DefCon  19  ~  August  6,  2011 33 Monday, August 8, 2011
  • 34. Overview Networks Internet Legend Ethernet  cable VoIP  VLAN:    VLAN_200 IP  Subnet:    172.16.200.0/24 VoIP  network  traffic Data  network  traffic Guest  Data  VLAN:    VLAN_100 Network IP  Subnet:    172.16.100.0/24 Call  Control  Servers VLAN_67 172.16.67.0/24 DefCon  19  ~  August  6,  2011 34 Monday, August 8, 2011
  • 35. Overview Networks Internet Legend Ethernet  cable VoIP  VLAN:    VLAN_200 IP  Subnet:    172.16.200.0/24 VoIP  network  traffic Data  network  traffic Guest  Data  VLAN:    VLAN_100 Network IP  Subnet:    172.16.100.0/24 Learn  VLAN  ID:    200 eth0.200 Create  eth0.200  Voice  interface Call  Control  Servers VLAN_67 172.16.67.0/24 Tag  with  VID:    200 DefCon  19  ~  August  6,  2011 34 Monday, August 8, 2011
  • 36. VoIP Hopping How  to  reconcile  this  security  problem Current  best  pracaces  recommend  disabling  trunk   ports  in  user  access  networks Yet,  VoIP  configuraaon  requires  802.1q  trunking  in   these  user  access  networks Best  Pracaces  need  to   be  updated  to  include   security  configuraaon  in  UC   networks  with  Voice  VLANS   and/or  Trunk  port   requirements  for  QoS DefCon  19  ~  August  6,  2011 35 Monday, August 8, 2011
  • 37. Case Study: Hotel Vulnerability Credit:    Michelle  Ahmadian DefCon  19  ~  August  6,  2011 36 Monday, August 8, 2011
  • 38. Case Study: My Story of a Hotel Story  Intro Sixng  in  a  luxury  hotel  with  IP  Phones  in  guest  rooms Summary  of  Configuraaon What  security  controls  were  in  place Detailed  descripaon  of  methods  and  how  they  can  be   defeated DefCon  19  ~  August  6,  2011 37 Monday, August 8, 2011
  • 39. Observation 1: MAC Address Hiding MAC  Address  label  removed  from  IP  Phone Increasingly  common  knowledge  that  MAC  Address   spoofing  defeats  Port  Security  (MAC  Address  filtering) Infers  that  they  knew  about  this Infers  that  they  were  trying  to  prevent  VLAN  Hop  and   MAC  Address  spoofing  by  removing  ability  of  aPacker   to  use  MAC  address  of  IP  Phone This  infers  that  Port  Security  could  have  also  been   enabled • Why  else  would  they  hide  the  MAC  Address  of  IP  Phone? DefCon  19  ~  August  6,  2011 38 Monday, August 8, 2011
  • 40. Observation 2: DHCP Disabled DHCP  was  disabled Sending  a  tagged  DHCP  request  was  ineffecave You  would  have  to  configure  a  staac  IP  address Defeats  casual  or  unsophisacated  aPackers How  to  know  the  right  IP  address  to  use? DefCon  19  ~  August  6,  2011 39 Monday, August 8, 2011
  • 41. Issue #1: Trunk ports leaking VLAN ID Plugged  laptop  with  sniffer  directly  into  wall  port Passively  observed  ~  sniffed  tagged  ethernet   frames Observed  ARP  traffic  from  IP  Phones 802.1q  tagged  ARP  frames  contained  VLAN  ID Now  we  have  the  VLAN  ID  (for  spoofing  802.1q!) Trunk  ports  mis-­‐configured,  or  shouldn’t  be  used   at  all? DefCon  19  ~  August  6,  2011 40 Monday, August 8, 2011
  • 42. Issue #2: Control two IP Phones in adjoining guest rooms I  can  check  into  two  adjoining  guest  rooms Coordinated,  physical  aPack  with  mulaple  colluders Physical  control  of  at  least  two  IP  Phones Method Room  1:    Replace  IP  phone  with  sniffing  laptop Room  2:    Reboot  IP  Phone  mulaple  ames Room  1:    Sniff  and  verify  MAC  address  and  staac  IP   address  of  phone  in  room  1  (rebooted  mulaple  ames) Room  1:    Plug  IP  Phone  back  into  wall  port DefCon  19  ~  August  6,  2011 41 Monday, August 8, 2011
  • 43. Issue #2: Control two IP Phones in adjoining guest rooms Method  (Conanued) Room  2:    Move  sniffing  laptop  into  Room  2 Room  2:    Unplug  IP  Phone Room  2:    Offline,  manually  spoof  MAC  address,  create   virtual  interface,  configure  staac  IP  address Room  2:    Connect  laptop  to  wall  port Room  2:    Ping  IP  Gateway • If  successful,  unauthorized  IP  network  access DefCon  19  ~  August  6,  2011 42 Monday, August 8, 2011
  • 44. Overview Adjoining  Room  1 Adjoining  Room  2 Door DefCon  19  ~  August  6,  2011 43 Monday, August 8, 2011
  • 45. Overview Keeping  in  mind -­‐Phones  in  adjoining  rooms  are  normally  going  to  be  members  of  the  same  VLAN  (broadcast  domain) -­‐All  ethernet  broadcasts  (ARP)  are  forwarded  out  all  ethernet  switch  ports  of  broadcast  domain  hosts -­‐In  hotels  normally  all  phones  on  same  floor  are  terminated  into  same  switch  closet -­‐There  is  a  high  degree  of  probability  that  phones  in  adjoining  rooms  are  in  the  same  VLAN Adjoining  Room  1 Adjoining  Room  2 Door Ok,  I’m   connected.    I  have   unauthorized  IP   access.    I  can  ping  the   gateway. Done. DefCon  19  ~  August  6,  2011 43 Monday, August 8, 2011
  • 46. VoIP Hopper 2.0 Release VoIP  Hopper  2.0  will  be  released   soon! Summary  of  new  features • Assessment  Mode • Interacave,  CLI • LLDP-­‐MED  support  (spoof,  sniff) • ARP  and  802.1q  dissector • Automaacally  learns  IP  and  MAC  of  phones • Automaac  VLAN  Hop  based  on  first  learned  VVID  (CDP,  LLDP-­‐ MED,  ARP) • Can  set  IP  and  MAC  staacally  from  learned  phones  when  DHCP   is  disabled • Fixed  many  issues  with  integrated  DHCP  code DefCon  19  ~  August  6,  2011 44 Monday, August 8, 2011
  • 47. VoIP Hopper 2.0 Release New  Assessment  mode • CLI  interface • Pass  individual  commands,  easily  creaang  new  features DefCon  19  ~  August  6,  2011 45 Monday, August 8, 2011
  • 48. VoIP Hopper 2.0 Release LLDP-­‐MED  spoofing  support • Shows  spoofing  LLDP-­‐MED  in  assessment  mode DefCon  19  ~  August  6,  2011 46 Monday, August 8, 2011
  • 49. VoIP Hopper 2.0 Release Automaacally  VLAN  Hops  based  on  first  discovered   VVID   • New  support  for  decoding  802.1q  tagged  ARP  traffic • In  the  screen  shot,  automaac  VLAN  Hop  is  disabled • The  first  protocol  method  discovery  (CDP,  LLDP-­‐MED,  ARP)   is  used DefCon  19  ~  August  6,  2011 47 Monday, August 8, 2011
  • 50. VoIP Hopper 2.0 Release • Passive  ARP  sniffer  automaacally  launches  auer  VLAN  Hop • Silently  logs  /  records  Phone  MAC  and  IP  from  ARP  traffic • Logs  the  phones  to  a  text  file,  voip-­‐hosts.txt DefCon  19  ~  August  6,  2011 48 Monday, August 8, 2011
  • 51. VoIP Hopper 2.0 Release • If  DHCP  is  disabled,  VoIP  Hopper  automaacally  sets  a  staac   IP  address  (auer  DHCP  ameout) • Also,  starts  sniffing  and  recording  IP  Phones  via  ARP DefCon  19  ~  August  6,  2011 49 Monday, August 8, 2011
  • 52. VoIP Hopper 2.0 Release • An  aPacker  can  then  spoof  a  previously  learned  Phone’s  IP   and  MAC  address,  from  a  menu DefCon  19  ~  August  6,  2011 50 Monday, August 8, 2011
  • 53. VoIP Hopper 2.0 Release • Automaacally  learns  and  records  all  IP  Phone  endpoints   that  support  LLDP-­‐MED • Saves  endpoints  to  a  text  file,  ‘myass.txt’ • Useful  feature  from  a  previous  VoIP  Pentest DefCon  19  ~  August  6,  2011 51 Monday, August 8, 2011
  • 54. Live Demo: VoIP Hopper Thanks  to  Tom   Mostyn,  for  low   level  debugging   help DefCon  19  ~  August  6,  2011 52 Monday, August 8, 2011
  • 55. Live Demo: VoIP Hopper vs. Hotel VoIP  Hopper The  Hotel vs DefCon  19  ~  August  6,  2011 53 Monday, August 8, 2011
  • 56. Summary What  happens  when  you  physically  control  two  or  more   IP  Phones? Using  the  IP   Phone  reboot  as  a   tool  or  method  to   Are  people  really  thinking  about  this? learn  informaaon   about  the  network. A  potenaal  coordinated  aPack  from  trusted  ports 802.1q  tagged  ARP     Key  Assumpaons traffic  is  another  way  of   learning  the  VLAN  ID.     We  don’t  absolutely   • Phones  members  of  same  VLAN,  broadcast  domain need  CDP,  DHCP,  or  LLDP. • An  ethernet  broadcast  (ARP)  will  forward  to  all  broadcast  domain   member  switch  ports • Hotels  usually  would  terminate  all  IP  Phones  into  same  wiring   closet  on  a  given  floor • Very  likely  that  phones  in  adjoining  rooms  are  in  same  VLAN DefCon  19  ~  August  6,  2011 54 Monday, August 8, 2011
  • 57. Summary The  point  is  that  for  VoIP,  QoS,  and   “convergence”  to  work,  you  (usually)  need  both   VLANs  allowed Risk  of  VLAN  Hop  known  for  a  long  ame This  is  about  the  risk  of  VLAN  Hop  in  environments  that   require  trunk  ports  in  user  access  networks DefCon  19  ~  August  6,  2011 55 Monday, August 8, 2011
  • 58. Summary Impact  in  this  Case  Study Unauthorized  IP  network  access  to  VoIP  network • Enables  UC  specific  aPacks  against  VoIP  network • Could  allow  access  to  corporate  data  (servers) • Could  represent  criacal  business  impact • APacker  sixng  in  privacy  of  guest  room  could  spend  all  the   ame  he  or  she  desires  penetraang  further These  Hotels  deploying  UC  in  guest  rooms  should   be  aware  and  apply  required  security  controls Miagaaon  covered  at  end  of  slides DefCon  19  ~  August  6,  2011 56 Monday, August 8, 2011
  • 59. Summary Authorized  VoIP  Pentest  in  2007 Gained  unauthorized  access  to  Hotel’s  servers  through   IP  Phone  in  hotel  guest  room Potenaal  back  door  into  internal  systems  could   represent  criacal  impact  to  business  in  hospitality   industries Businesses  deploying  UC  to  private  areas  must   understand  the  risk  ~  it  can  be  properly  miagated Could  represent  another  method  of  data  breach  (credit   card  data) DefCon  19  ~  August  6,  2011 57 Monday, August 8, 2011
  • 60. Summary Physical  Security  is  compromised  here It’s  a  unique  situaaon  for  hotel  rooms Guests  have  right  to  privacy Security  controls  need  to  compensate  for  this Soluaons  such  as  802.1x  provide  equivalent  physical   security DefCon  19  ~  August  6,  2011 58 Monday, August 8, 2011
  • 61. Valcros and Percipia I   wanted  to  ask:   how  do  you   recommend   best  pracaces  in   these  hotel   infrastructures? DefCon  19  ~  August  6,  2011 59 Monday, August 8, 2011
  • 62. Valcros and Percipia No   response DefCon  19  ~  August  6,  2011 60 Monday, August 8, 2011
  • 63. Hotel Survey Idea  to  conduct  a  survey  of  hotels Objecave: • To  find  percentage  of  hotels  using  VoIP  and  price,  from  a   sampling  of  100  luxury  hotels • To  record  calls  and  see  how  the  reservaaon  specialist   answers  quesaons  of  IP  Phones  in  guest  rooms Used  research  assistant,  recorded  all  phone  calls Hotels  included  20%  internaaonal  and  80%  US • Included  Paris,  London,  NYC,  Tokyo,  Monte  Carlo • Most  US  were  Las  Vegas  and  other  casino  resort  hotels DefCon  19  ~  August  6,  2011 61 Monday, August 8, 2011
  • 64. Hotel Survey Script “My  boss  has  a  strong  preference  for  hotels  with  VoIP,  as  he   really  likes  the  service  and  convenience  of  these  IP  Phones” Interesang  from  a  social  engineering  aspect     If  an  aPacker  wanted  to  find  potenaal  VoIP  Hopping  targets Result Of  100  luxury  hotels,  8  out  of  100  (8%)  confirmed  to  have  IP   phones  in  guest  rooms Average  room  price  per  night:    $655.32  USD DefCon  19  ~  August  6,  2011 62 Monday, August 8, 2011
  • 65. Hotel Survey Sample  audio  clip  1 For  hotels  that  do,  reservaaon  specialist  doesn’t  know   what  VoIP  is  and  has  to  check “Ooohhh....not  quite  sure  if  our  phones  do  that” DefCon  19  ~  August  6,  2011 63 Monday, August 8, 2011
  • 66. Hotel Survey Sample  audio  clip  2 She  checked  with  her  IT  Director  and  they  do  have  IP   Phones DefCon  19  ~  August  6,  2011 64 Monday, August 8, 2011
  • 67. Voice VLANs as Trunk Ports Went  back  through  all  internal  VoIP  Pentests,   researched  packet  captures  from  Voice  VLAN  port In  6  customer  cases,  tagged  frames  revealed: 5  deployments  revealed  VVID  through  ARP  to  switch   access  ports Mula-­‐VLAN   access  ports 1  deployment  didn’t  tag  ARP  packets Summary Cisco  Voice  VLANs  appear  to  behave  as  trunk  ports Adverase  VVID  to  access  ports  through  802.1q  tagged   ARP DefCon  19  ~  August  6,  2011 65 Monday, August 8, 2011
  • 68. Voice VLANs as Trunk Ports Sent  noaficaaon  to  Cisco  PSIRT DefCon  19  ~  August  6,  2011 66 Monday, August 8, 2011
  • 69. Voice VLANs as Trunk Ports DefCon  19  ~  August  6,  2011 67 Monday, August 8, 2011
  • 70. LLDP-MED ether  proto  0x88cc DefCon  19  ~  August  6,  2011 68 Monday, August 8, 2011
  • 71. Intro to LLDP-MED LLDP Link  Layer  Discovery  Protocol  ~  802.1A New  standardized  Discovery  Protocol IEEE  mula-­‐vendor  support  ~  provides  standards-­‐based   discovery  for  vendor  interop  (May  2005) LLDP-­‐MED Link  Layer  Discovery  Protocol  -­‐  Media  Endpoint   Discovery An  extension  to  LLDP  to  address  voice  applicaaons DefCon  19  ~  August  6,  2011 69 Monday, August 8, 2011
  • 72. Intro to LLDP-MED Uses  TLV  messages  to  communicate  to  neighboring  devices Very  similar  to  CDP,  IP  Phones  can  learn  VoIP  VLAN  and  negoaate   power  with  PoE  Switch  (but  it’s  IEEE  mula-­‐vendor  interop!) Summarized  features Inventory  control  (Serial  number,  model  numbers,  firmware) Network  Topology  with  an  NMS  (Aid  in  troubleshooang) Power  Negoaaaon  and  priority Network  Policy  Discovery  (VoIP  VLAN) Capabiliaes  Discovery Automaac  Locaaon  Idenaficaaon  (E911) • Media  endpoint  locaaon  in  emergency  situaaons DefCon  19  ~  August  6,  2011 70 Monday, August 8, 2011
  • 73. e911 Emergency Services Corporaaons  challenged  by  obligaaon  to  support   Emergency  Calling  Services  (ECS)  that  include   E911 Difficult  due  to  lack  of  standards LLDP-­‐MED  provides  e911  in  enterprises When  an  endpoint  receives  a  TLV  with  ECS  locaaon   data,  stores  it  and  can  communicate  with  public  safety   answering  point Appears  more  useful  for  telling  IP  Phone  its  locaaon DefCon  19  ~  August  6,  2011 71 Monday, August 8, 2011
  • 74. e911 Emergency Services Locaaon  informaaon Normally  sent  from  switch  to  phone For  phones  that  can’t  determine  their  own  locaaon Can  be  useful  for  locaaon  based  applicaaons  on  phone Scenarios  where  an  IP  Phone  needs  to  send  its   locaaon  informaaon  to  switch Any  security  risk Spoofing  LLDP-­‐MED  messages DefCon  19  ~  August  6,  2011 72 Monday, August 8, 2011
  • 75. Comparison: LLDP-MED vs CDP LLDP-­‐MED CDP Cisco  IOS  switch  accepts   Cisco  IOS  switch  accepts   Spoofing spoofed  LLDP.    Can  spoof   spoofed  CDP. capabiliaes,  fill  LLDP  table. Can  sniff  LLDP  adverasements,   Can  easily  sniff  CDP  and  learn   Sniffing but  by  default  don’t  receive   VVVID  by  default Network  Policy  (VVID)  TLV Spoofing  LLDP  doesn’t  bypass   Spoofing  CDP  can  bypass   802.1x  Bypass 802.1x.    LLDP  messages  can’t   802.1x  with  Voice  VLANs.    Can   be  prior  to  802.1x  port  up. be  miagated  with  802.1x. LLDP-­‐MED  must  be  spoofed.     Automaacally  learning  VVID Spoofed  or  sniffed.    Easier. Harder. DefCon  19  ~  August  6,  2011 73 Monday, August 8, 2011
  • 76. Case Study: Pentest with LLDP-MED Plugged  into  Ethernet  port Received  LLDP-­‐MED  mulacast  messages  from  other  IP   Phones  on  VLAN DefCon  19  ~  August  6,  2011 74 Monday, August 8, 2011
  • 77. Mitigations Voice  1:    VoIP  is  totally  insecure!    Be  scared! Voice  2:    Don’t  worry,  VoIP  is  safe,  you  don’t  have   to  do  anything!    It’s  secure  out  of  the  box! Truth  rests  somewhere  in  between As  any  TCP/IP  client/server  applicaaon,  VoIP  can  most   definitely  be  properly  secured  to  match  your   environment’s  security  requirements It  should  be DefCon  19  ~  August  6,  2011 75 Monday, August 8, 2011
  • 78. Mitigations: Don’t do this Port  Security MAC  Address  filtering DefCon  19  ~  August  6,  2011 76 Monday, August 8, 2011
  • 79. Mitigations: Don’t do this Including  “hiding”  the  MAC  Address Hiding  the  MAC  Address  isn’t  a  security  feature DefCon  19  ~  August  6,  2011 77 Monday, August 8, 2011
  • 80. Mitigations Locking  phones  to  wall DefCon  19  ~  August  6,  2011 78 Monday, August 8, 2011
  • 81. Mitigations Can  be  broken  with  this DefCon  19  ~  August  6,  2011 79 Monday, August 8, 2011
  • 82. Mitigations Fascinaang,  found  another  hotel  this   week  using  IP  Phones  in  guest  rooms. Vendor  is  specialized  for  VoIP  in   hospitality  industry:    www.teledex.com DefCon  19  ~  August  6,  2011 80 Monday, August 8, 2011
  • 83. Mitigations Fascinaang,  look  at  what   they  did.  They  stripped  the   RJ-­‐45  plug  where  a  human   would  easily  unplug  the   cable.     Almost  a  poor  man’s   physical  security  soluaon.    It   looked  like  you  could  sall   use  a  tool  to  pry  off  the   ethernet  plug. DefCon  19  ~  August  6,  2011 81 Monday, August 8, 2011
  • 84. Part II As  circumstance  would  have  it,  I  changed   rooms  (yesterday)  in  this  hotel.    Found  the   following  in  comparing  new  room  to  prior: *  In  my  new  room,  IP  phone  didn’t  have  same   physical  security  control  applied. *  The  RJ-­‐45  connector  plug  was  intact,  and  one   could  easily  disconnect  the  phone  from  the   wall  and  connect  their  laptop. *  Fascinaang:    Physical  security  controls  not   applied  consistently  across  hotel  guest  rooms. *  Human  error  always  the  weakest  link  in  a   security  system  and  can  lead  to  breach,  in  the   right  scenarios. DefCon  19  ~  August  6,  2011 82 Monday, August 8, 2011
  • 85. Mitigations Great  Miagaaon  Idea,  not  using  dot1x Lock  phones  to  wall  using  Panduit  or  equivalent If  IP  Phones  are  disconnected  from  wall Great  security   miagaaon  idea  from   Chris  and  Zack  with   Cisco  Systems • Err-­‐disable  the  port  ~  port  goes  down  and  needs   Administrator  intervenaon  to  enable • Issue  a  high  priority  snmp  trap  or  syslog  of  suspicious   acavity –With  either  method,  if  the  aPacker  has  physically  broken  through  the   security  locks,  this  is  highly  suspicious  acavity  in  a  hotel  room »Either  scenario  should  require  NetOps  or  SecOps  noaficaaon DefCon  19  ~  August  6,  2011 83 Monday, August 8, 2011
  • 86. Mitigations 802.1x  with  mula-­‐domain  authenacaaon Make  sure  you  don’t  configure  single  VLAN With  Cisco  Voice  VLANs,  802.1x  can  be  bypassed  via   spoofing  CDP DefCon  19  ~  August  6,  2011 84 Monday, August 8, 2011
  • 87. Dotx1 limitations Be  careful  with  802.1x  with  VoIP  wired  deployments • Uses  RFC  3847  EAP-­‐MD5  authenacaaon • Vulnerable  to  2  security  issues –Vulnerable  to  offline  pcap  dicaonary  aPack »EAP-­‐MD5  vulnerable  to  offline  dicaonary  aPack Major  props   –Vulnerable  to  MiTM  aPack to  Josh  Wright  for   his  research. »802.1x  EAP  authenacaaon  only  required  in  wired  deployments   when  port  comes  up Discovered  by   Steve  Riley  and   »APacker  can  piggyback  on  successful  Auth  of  an  IP  Phone,  sharing   Svyatoslav  Pidgorny   with  Microsou  (2005) a  hub  with  IP  Phone  for  unauthorized  access DefCon  19  ~  August  6,  2011 85 Monday, August 8, 2011
  • 88. Dotx1 limitations In  2008,  VIPER  published  open  source  security   assessment  tool  to  highlight  both  of  these  issues  in   wired  802.1x  deployments • XTest  (ToorCon  X,  2008) Talk  advancing  this  forward DefCon  19  ~  August  6,  2011 86 Monday, August 8, 2011
  • 89. Mitigations MACSec IEEE  802.1AE Provides  hop-­‐by-­‐hop  layer  2  encrypaon Doesn’t  appear  to  be  widespread  support  yet,  at  least   in  Edge  network  ethernet  switch  products,  or  IP  Phones DefCon  19  ~  August  6,  2011 87 Monday, August 8, 2011
  • 90. Conclusion - Thank you for listening! Why  I  did  this Someone  is  going  to  get caught  with  their  pants down DefCon  19  ~  August  6,  2011 88 Monday, August 8, 2011
  • 91. Conclusion Why  I  did  this This  talk  is  a  culminaaon  of  my  research  on  hotel  VoIP   VLAN  &  Infrastructure  security  (since  2007) Share  something  I’m  passionate  about  (interests  me) DefCon  19  ~  August  6,  2011 89 Monday, August 8, 2011
  • 92. Conclusion Why  I  did  this  (conanued) To  create  educaaon  and  awareness To  publish  a  new  version  of  the  free  security  tool,  “VoIP   Hopper”,  so  that  people  can  test  their  own  network • Understand  the  vulnerability  and  risk  for  yourself  (hotels,   integrators) • Showing  is  believing • Seeing  the  vulnerability  is  believing  (VoIP  Hopper) • Someames  people  have  to  see  a  vulnerability  with  their   own  eyes  before  they  can  start  to  miagate  it DefCon  19  ~  August  6,  2011 90 Monday, August 8, 2011
  • 93. Conclusion Why  I  did  this  (conanued) It’s  my  hope  this  informaaon  will  get  into  the  proper   hands • Hotel  Net  and  Sec  Ops • System  integrators  and  VARs  who  implement  these   Hospitality  VoIP  soluaons Before  a  real  security  breach  happens  in  a  hotel See,  if  I’m  showing  this  today,  and  it  is  news  to  a  hotel • How  many  people  already  know,  and  were  silent? • How  many  hotels  have  already  been  breached? DefCon  19  ~  August  6,  2011 91 Monday, August 8, 2011
  • 94. Conclusion Why  I  did  this  (conanued) • Publishing  updated  best  pracaces  around  UC  security  in     these  deployments  would  be  a  good  first  step –UC  Security  where  802.1q  trunking  is  required  ~  to  protect  customers • SANS  menaons  this  in  their  Top  20  (2007) DefCon  19  ~  August  6,  2011 92 Monday, August 8, 2011
  • 95. Contact Information Jason  Ostrom,  CCIE  #15239  (Security) Director,  VIPER  (Voice  over  IP  Exploit  Research) jostrom@viperlab.net;  iknowjason@pobox.com For  more  informaaon  about  us,  visit  us  online: VIPER  Lab:    hPp://www.viperlab.net Sipera  Systems:    hPp://www.sipera.com DefCon  19  ~  August  6,  2011 93 Monday, August 8, 2011