SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
Phree as in Phone Call
  The other end of the line




           Presented By: john@security-assessment.com
                                  © 2008 Security-Assessment.com
FILE_ID.DIZ

 Advantages of phreaking with VoIP
     Modern dialing setup
 Modern wardialing and scanning techniques
     Identifying and classifying devices
 Hacking dial-in lines
     System types and login attacks
 IVR and voicemail systems
     PIN brute-forcing
 PaBX’s
     Exploiting features
     Eavesdropping and data-mining



                                              © 2008 Security-Assessment.com
Advantages of phreaking with VoIP

 International destinations much more accessible
     VoIP is cheap
     Can scam free VoIP
 Don’t need to scan from home anymore
     Less knocks at the door
 Parallelization
     Can run savage burns
 Easier to perform certain attacks
     CallerID spoofing
 Automates hand scanning
     Callus free!



                                                    © 2008 Security-Assessment.com
Modems and VoIP

 Most people think it can’t be done
    Complex codecs cause havoc to connections
    Modems can’t connect
    Connections drop
 It can be done!
    What you need
    How to tweak it




                                                 © 2008 Security-Assessment.com
What you need

 Modems




           © 2008 Security-Assessment.com
What you need

 Analog telephony adaptors (ATA)




                                    © 2008 Security-Assessment.com
What you need

 VoIP account
    Lots of cheap providers
        voipjet.com
        voipbuster.com
    Trial accounts
        Free calls
 Asterisk server
    Routing
    Call recording
    CallerID spoofing




                               © 2008 Security-Assessment.com
Device configuration tricks

 ATA
   Compression disabled (G.711 ulaw!)
   No echo cancellation (*99 on PAP2)
 Modem
   Disable local flow control
   Error-correction
   Disable data-compression
   Limit the data rate to 1200 bps for scans




                                                      © 2008 Security-Assessment.com
Modem connection using VoIP




        © 2008 Security-Assessment.com
What can you connect to?

 Modems all over the world
     Control systems
     SCADA systems
     Alarm systems
 International x.25 networks
     India, Africa, Russia, China…
     Banking
 Other interesting stuff
     Obscure devices and networks
     Bulletin boards (yep!)
     Who knows? The PSTN is global!



                                            © 2008 Security-Assessment.com
What can you connect to?

 SCADA system example




                              © 2008 Security-Assessment.com
Wardialing

 Automatically dialing numbers to find modems
    Target identification
    Inventory building
 Risks
    Time of day
    Randomize numbers!
 Modern Wardialing
    Use VoIP, UNIX and Asterisk
    The Intelligent Wardialer (iWar)




                                                 © 2008 Security-Assessment.com
Wardialing

 iWar
    Multiple modems are no problems!
          Serial to usb adapters
          Scaleable banks of modems with limitless potentional
    Remote system identification (126 banners)
    MySQL support
    CNAM lookup feature
    Blacklist support




                                                       © 2008 Security-Assessment.com
Wardialing

 iWar in serial mode




                        © 2008 Security-Assessment.com
Wardialing

 What will we find?
    Routers
    Remote access servers
    PPP dialins
    PC Anywhere
    PaBX management systems
    IVR systems
    Network backdoors
    Outdials
    Diverters (dialtones)
    Unknown and forgotten devices



                                     © 2008 Security-Assessment.com
Wardialing

 Reducing time with blacklists
    Internal / employee directories
    DDI’s and other numbers harvested from websites
    Business directories
        Websites
        CDROMs
    Fax directories
    Do-not-call lists
 Special ranges
    Telco test equipment




                                                  © 2008 Security-Assessment.com
Wardialing

 Published research
    Peter Shipley dialed 5.7M numbers over three years
        50,000 carriers found
 Found unauthenticated access to
    Fire Department's dispatch system
    Control system for high-voltage power transmission line
    Internal networks of financial organizations
    A leased line control system
    Credit card number databases
    Medical billing records.




                                                     © 2008 Security-Assessment.com
Wardialing

 THC-Scan: Next Generation
    Distributed wardialer!
        Large modem pools
    Large scan ranges - (09) 3XXXXXX
    Global scanning efforts
        Log sharing and karma systems




                                         © 2008 Security-Assessment.com
Wardialing

 Callus-free handscanning
    iWar with IAX2 connection
        Wifi at café, etc
        Headphones
        Time and patience
    Upsides
        Safe and anonymous
        Mostly automated
        Handsfree!




                                 © 2008 Security-Assessment.com
Hacking dial-in lines

 Figuring out what you’re dealing with
    System types and banners
    Identifying different type login prompts and methods
    Building username and password lists
        Google for defaults
 Login Brute-forcing
    Tools
    Homebrew scripting




                                                     © 2008 Security-Assessment.com
Hacking dial-in lines

 System types and banners




                             © 2008 Security-Assessment.com
Hacking dial-in lines

 System types and banners




                             © 2008 Security-Assessment.com
Hacking dial-in lines

 Different login prompts and methods
    Single auth
    Dual auth
    Limited or unlimited attempts?
    Username, password or both?




                                        © 2008 Security-Assessment.com
Login brute forcing

 Tools
    Commercial war dialers (lame)
    Modem login hacker for Linux
    X.25 NUI/NUA scanners
 Homebrew
    Minicom runscript
    Python serial library
    Procomm plus aspect script




                                     © 2008 Security-Assessment.com
Login brute forcing

   Modem Login Hacker
     Works against any ‘Username:’ or ‘Login:’ variations
         Unix, Cisco, PaBXs
     Customizable for different login formats
     Includes PPP brute-forcing tool!




                                                         © 2008 Security-Assessment.com
IVRs and voicemail

 Fingerprinting voicemail systems
    Default prompts
        Default mailbox numbers and PINs
        Admin mailbox
    “Nudges” (*8, *81, *, #, 0)
    Can you find the admin console?
 CallerID spoofing attacks
    ANI or CID authentication is very bad!
 Call forwarding and out-dials
    Free calls




                                              © 2008 Security-Assessment.com
IVRs and voicemail

 Launching a PIN brute force attack
    Things to figure out
        Dial-in numbers and PIN length
        Numbering format for mailboxes
        Method of getting to the PIN prompt




                                               © 2008 Security-Assessment.com
PIN brute forcing

 Metalstorms mighty Hai2IVR
    SIP-client for brute forcing DTMF prompts
    Can record calls and scan in parallel
    GUI for sorting and listening to the results
    Doubles as PaBX extension war dialer




                                                    © 2008 Security-Assessment.com
PIN brute forcing

 Components
    Hai2IVR GTK interface
        Handles the parallelization
        GUI for reviewing results
    metlodtmfzor
        Makes the calls and sends the DTMF
        Command line scriptable
 Hai2IVR setup
    Route through Asterisk
        Authenticated SIP
        CID spoofing



                                              © 2008 Security-Assessment.com
Predictable PINs

 Keypad patterns
     Making shapes
         L, X, O
     Repeating numbers
         2244, 9988
     Patterns
 Other lists
     Birth dates
     Pop culture references
         1984, 1337 (WiteRabits PIN)
     Word numbers
         Hell, love, krad, sexy

                                        © 2008 Security-Assessment.com
Predictable PINs




© 2008 Security-Assessment.com
Predictable PINs

 PINPop.com
    Research project into predictable PINs
    PIN database analysis
 Goals
    Secure PIN selection patches to Asterisk
    Whitepaper on PIN selection psychology




                                                © 2008 Security-Assessment.com
PaBX hacking

 Attack categories
    Theft of service
    Routing manipulation
    Traffic analysis (stealing CDR’s)
    Social engineering
    Eavesdropping




                                         © 2008 Security-Assessment.com
PaBX hacking

   The Holy Grail
      Access to the maintenance console
          Dial-in lines, extensions, computers
   Feature exploits
      Conferencing
      Three-way calling
      Call forwarding
      Direct Inwards System Access (DISA)
      Test features that remotely activate mics
   Theft of CDR’s
      Industrial espionage
   Advanced auditing
      Free Space Invaders: reverse engineering


                                                   © 2008 Security-Assessment.com
PaBX hacking

 Maintenance console banners




                                © 2008 Security-Assessment.com
PaBX hacking

 A hacked Meridian management console can:
    Setup trunks to allow outgoing calls
    Manipulate trunks
        Re-route incoming / outgoing calls
    Eavesdrop extensions
    Set a Meridian Mail box to auto logon temporarily
    Shut down the PaBX
    Make phones ring infinitely
    Trace calls through CDR records
    Steal CDRs




                                                     © 2008 Security-Assessment.com
PaBX hacking

 Lockdown methods
    Restricted out dialing
    Forwarding features disabled
    Enforced minimum PIN size
    Unused boxes deactivated
    Lockout counters with manual reset
    Timeouts on setup of new mailboxes
    Challenge response systems
        US Government classified VMSs need SecureID’s
    Logging




                                                   © 2008 Security-Assessment.com
PaBX hacking

 CDR’s and datamining
    Sensitive information can be gleaned from call records
        Who called who and when
        Current and potential clients, contractors
        Recent company activities
 AMDOCS Example
    Handles billing for most American telcos
    FBI and NSA investigation into sending CDRs offshore
    Possibility of Israeli's spying on American's through CDRs




                                                      © 2008 Security-Assessment.com
The infinite power of Asterisk

 Custom setups
    Testing environment for tools
    Anonymous voicemail servers
    Encrypted voice
    Private networks like DetoVoIP and Telephreak
    Rogue PaBX’s for evesdropping
 Custom features
    ProjectMF: A trip down phone-phreak memory lane
        Asterisk patches to support MF in-band signaling
        Lets you bluebox telephone calls
        Simulation of old (but not dead?) networks



                                                      © 2008 Security-Assessment.com
The infinite power of Asterisk

 Blueboxing through a ProjectMF test server




                                                        © 2008 Security-Assessment.com
The infinite power of Asterisk

 Call the ProjectMF server
    Get dropped to a C5 trunk
    Hold the phone up to the speakers
    Seize the trunk with a 1 second burst of 2600Hz
    Send KP + 12588+ ST in multi-frequency tones (MF)
    Call connects
    Re-seize, repeat




                                                       © 2008 Security-Assessment.com
Thanks

 Thanks & greats to:
    SA.com
    SLi
    Andrew Horton
    Metlstorm
    Detonate
    Kiwicon crew
    Beave
    Jfalcon
    M4phr1k




                        © 2008 Security-Assessment.com
NO CARRIER




http://www.security-assessment.com
   john@security-assessment.com




                                © 2008 Security-Assessment.com

Weitere ähnliche Inhalte

Was ist angesagt?

Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutionshemantchaskar
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Communication Devices Inc
 
Inside .NET Smart Card Operating System - 44CON 2012
Inside .NET Smart Card Operating System - 44CON 2012Inside .NET Smart Card Operating System - 44CON 2012
Inside .NET Smart Card Operating System - 44CON 201244CON
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)Fatih Ozavci
 
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 edenSec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden道成資訊股份有限公司
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosPriyanka Aash
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection TechnologySegitiga.Net
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksRohan Fernandes
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
 
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceUltraUploader
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceFatih Ozavci
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
 

Was ist angesagt? (20)

Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.Secure Out Of Band Management - Comm Devices Inc.
Secure Out Of Band Management - Comm Devices Inc.
 
Inside .NET Smart Card Operating System - 44CON 2012
Inside .NET Smart Card Operating System - 44CON 2012Inside .NET Smart Card Operating System - 44CON 2012
Inside .NET Smart Card Operating System - 44CON 2012
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 edenSec.4 有效協助企業內部網路行為管理-奕瑞 eden
Sec.4 有效協助企業內部網路行為管理-奕瑞 eden
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
My ppt
My pptMy ppt
My ppt
 
SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
[InDMF 2013] Prof. John Choi - Evolution of Copyright Protection Technology
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
 
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
VoIP security
VoIP securityVoIP security
VoIP security
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 

Ähnlich wie Phree As In Phone Call

Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationVCW Security Ltd
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Voippresentation
VoippresentationVoippresentation
Voippresentationeliran2
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxamalouwarda1
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures أحلام انصارى
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999TomParker
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 

Ähnlich wie Phree As In Phone Call (20)

Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Voippresentation
VoippresentationVoippresentation
Voippresentation
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptx
 
Commsday presentation
Commsday presentationCommsday presentation
Commsday presentation
 
Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
04b-radcliffe
04b-radcliffe04b-radcliffe
04b-radcliffe
 
Voip security
Voip securityVoip security
Voip security
 
iViZ Profile
iViZ ProfileiViZ Profile
iViZ Profile
 

Kürzlich hochgeladen

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Phree As In Phone Call

  • 1. Phree as in Phone Call The other end of the line Presented By: john@security-assessment.com © 2008 Security-Assessment.com
  • 2. FILE_ID.DIZ  Advantages of phreaking with VoIP  Modern dialing setup  Modern wardialing and scanning techniques  Identifying and classifying devices  Hacking dial-in lines  System types and login attacks  IVR and voicemail systems  PIN brute-forcing  PaBX’s  Exploiting features  Eavesdropping and data-mining © 2008 Security-Assessment.com
  • 3. Advantages of phreaking with VoIP  International destinations much more accessible  VoIP is cheap  Can scam free VoIP  Don’t need to scan from home anymore  Less knocks at the door  Parallelization  Can run savage burns  Easier to perform certain attacks  CallerID spoofing  Automates hand scanning  Callus free! © 2008 Security-Assessment.com
  • 4. Modems and VoIP  Most people think it can’t be done  Complex codecs cause havoc to connections  Modems can’t connect  Connections drop  It can be done!  What you need  How to tweak it © 2008 Security-Assessment.com
  • 5. What you need  Modems © 2008 Security-Assessment.com
  • 6. What you need  Analog telephony adaptors (ATA) © 2008 Security-Assessment.com
  • 7. What you need  VoIP account  Lots of cheap providers  voipjet.com  voipbuster.com  Trial accounts  Free calls  Asterisk server  Routing  Call recording  CallerID spoofing © 2008 Security-Assessment.com
  • 8. Device configuration tricks  ATA  Compression disabled (G.711 ulaw!)  No echo cancellation (*99 on PAP2)  Modem  Disable local flow control  Error-correction  Disable data-compression  Limit the data rate to 1200 bps for scans © 2008 Security-Assessment.com
  • 9. Modem connection using VoIP © 2008 Security-Assessment.com
  • 10. What can you connect to?  Modems all over the world  Control systems  SCADA systems  Alarm systems  International x.25 networks  India, Africa, Russia, China…  Banking  Other interesting stuff  Obscure devices and networks  Bulletin boards (yep!)  Who knows? The PSTN is global! © 2008 Security-Assessment.com
  • 11. What can you connect to?  SCADA system example © 2008 Security-Assessment.com
  • 12. Wardialing  Automatically dialing numbers to find modems  Target identification  Inventory building  Risks  Time of day  Randomize numbers!  Modern Wardialing  Use VoIP, UNIX and Asterisk  The Intelligent Wardialer (iWar) © 2008 Security-Assessment.com
  • 13. Wardialing  iWar  Multiple modems are no problems!  Serial to usb adapters  Scaleable banks of modems with limitless potentional  Remote system identification (126 banners)  MySQL support  CNAM lookup feature  Blacklist support © 2008 Security-Assessment.com
  • 14. Wardialing  iWar in serial mode © 2008 Security-Assessment.com
  • 15. Wardialing  What will we find?  Routers  Remote access servers  PPP dialins  PC Anywhere  PaBX management systems  IVR systems  Network backdoors  Outdials  Diverters (dialtones)  Unknown and forgotten devices © 2008 Security-Assessment.com
  • 16. Wardialing  Reducing time with blacklists  Internal / employee directories  DDI’s and other numbers harvested from websites  Business directories  Websites  CDROMs  Fax directories  Do-not-call lists  Special ranges  Telco test equipment © 2008 Security-Assessment.com
  • 17. Wardialing  Published research  Peter Shipley dialed 5.7M numbers over three years  50,000 carriers found  Found unauthenticated access to  Fire Department's dispatch system  Control system for high-voltage power transmission line  Internal networks of financial organizations  A leased line control system  Credit card number databases  Medical billing records. © 2008 Security-Assessment.com
  • 18. Wardialing  THC-Scan: Next Generation  Distributed wardialer!  Large modem pools  Large scan ranges - (09) 3XXXXXX  Global scanning efforts  Log sharing and karma systems © 2008 Security-Assessment.com
  • 19. Wardialing  Callus-free handscanning  iWar with IAX2 connection  Wifi at café, etc  Headphones  Time and patience  Upsides  Safe and anonymous  Mostly automated  Handsfree! © 2008 Security-Assessment.com
  • 20. Hacking dial-in lines  Figuring out what you’re dealing with  System types and banners  Identifying different type login prompts and methods  Building username and password lists  Google for defaults  Login Brute-forcing  Tools  Homebrew scripting © 2008 Security-Assessment.com
  • 21. Hacking dial-in lines  System types and banners © 2008 Security-Assessment.com
  • 22. Hacking dial-in lines  System types and banners © 2008 Security-Assessment.com
  • 23. Hacking dial-in lines  Different login prompts and methods  Single auth  Dual auth  Limited or unlimited attempts?  Username, password or both? © 2008 Security-Assessment.com
  • 24. Login brute forcing  Tools  Commercial war dialers (lame)  Modem login hacker for Linux  X.25 NUI/NUA scanners  Homebrew  Minicom runscript  Python serial library  Procomm plus aspect script © 2008 Security-Assessment.com
  • 25. Login brute forcing  Modem Login Hacker  Works against any ‘Username:’ or ‘Login:’ variations  Unix, Cisco, PaBXs  Customizable for different login formats  Includes PPP brute-forcing tool! © 2008 Security-Assessment.com
  • 26. IVRs and voicemail  Fingerprinting voicemail systems  Default prompts  Default mailbox numbers and PINs  Admin mailbox  “Nudges” (*8, *81, *, #, 0)  Can you find the admin console?  CallerID spoofing attacks  ANI or CID authentication is very bad!  Call forwarding and out-dials  Free calls © 2008 Security-Assessment.com
  • 27. IVRs and voicemail  Launching a PIN brute force attack  Things to figure out  Dial-in numbers and PIN length  Numbering format for mailboxes  Method of getting to the PIN prompt © 2008 Security-Assessment.com
  • 28. PIN brute forcing  Metalstorms mighty Hai2IVR  SIP-client for brute forcing DTMF prompts  Can record calls and scan in parallel  GUI for sorting and listening to the results  Doubles as PaBX extension war dialer © 2008 Security-Assessment.com
  • 29. PIN brute forcing  Components  Hai2IVR GTK interface  Handles the parallelization  GUI for reviewing results  metlodtmfzor  Makes the calls and sends the DTMF  Command line scriptable  Hai2IVR setup  Route through Asterisk  Authenticated SIP  CID spoofing © 2008 Security-Assessment.com
  • 30. Predictable PINs  Keypad patterns  Making shapes  L, X, O  Repeating numbers  2244, 9988  Patterns  Other lists  Birth dates  Pop culture references  1984, 1337 (WiteRabits PIN)  Word numbers  Hell, love, krad, sexy © 2008 Security-Assessment.com
  • 31. Predictable PINs © 2008 Security-Assessment.com
  • 32. Predictable PINs  PINPop.com  Research project into predictable PINs  PIN database analysis  Goals  Secure PIN selection patches to Asterisk  Whitepaper on PIN selection psychology © 2008 Security-Assessment.com
  • 33. PaBX hacking  Attack categories  Theft of service  Routing manipulation  Traffic analysis (stealing CDR’s)  Social engineering  Eavesdropping © 2008 Security-Assessment.com
  • 34. PaBX hacking  The Holy Grail  Access to the maintenance console  Dial-in lines, extensions, computers  Feature exploits  Conferencing  Three-way calling  Call forwarding  Direct Inwards System Access (DISA)  Test features that remotely activate mics  Theft of CDR’s  Industrial espionage  Advanced auditing  Free Space Invaders: reverse engineering © 2008 Security-Assessment.com
  • 35. PaBX hacking  Maintenance console banners © 2008 Security-Assessment.com
  • 36. PaBX hacking  A hacked Meridian management console can:  Setup trunks to allow outgoing calls  Manipulate trunks  Re-route incoming / outgoing calls  Eavesdrop extensions  Set a Meridian Mail box to auto logon temporarily  Shut down the PaBX  Make phones ring infinitely  Trace calls through CDR records  Steal CDRs © 2008 Security-Assessment.com
  • 37. PaBX hacking  Lockdown methods  Restricted out dialing  Forwarding features disabled  Enforced minimum PIN size  Unused boxes deactivated  Lockout counters with manual reset  Timeouts on setup of new mailboxes  Challenge response systems  US Government classified VMSs need SecureID’s  Logging © 2008 Security-Assessment.com
  • 38. PaBX hacking  CDR’s and datamining  Sensitive information can be gleaned from call records  Who called who and when  Current and potential clients, contractors  Recent company activities  AMDOCS Example  Handles billing for most American telcos  FBI and NSA investigation into sending CDRs offshore  Possibility of Israeli's spying on American's through CDRs © 2008 Security-Assessment.com
  • 39. The infinite power of Asterisk  Custom setups  Testing environment for tools  Anonymous voicemail servers  Encrypted voice  Private networks like DetoVoIP and Telephreak  Rogue PaBX’s for evesdropping  Custom features  ProjectMF: A trip down phone-phreak memory lane  Asterisk patches to support MF in-band signaling  Lets you bluebox telephone calls  Simulation of old (but not dead?) networks © 2008 Security-Assessment.com
  • 40. The infinite power of Asterisk  Blueboxing through a ProjectMF test server © 2008 Security-Assessment.com
  • 41. The infinite power of Asterisk  Call the ProjectMF server  Get dropped to a C5 trunk  Hold the phone up to the speakers  Seize the trunk with a 1 second burst of 2600Hz  Send KP + 12588+ ST in multi-frequency tones (MF)  Call connects  Re-seize, repeat © 2008 Security-Assessment.com
  • 42. Thanks  Thanks & greats to:  SA.com  SLi  Andrew Horton  Metlstorm  Detonate  Kiwicon crew  Beave  Jfalcon  M4phr1k © 2008 Security-Assessment.com
  • 43. NO CARRIER http://www.security-assessment.com john@security-assessment.com © 2008 Security-Assessment.com