SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
Gaurav Saha


November 23, 2007   Sipera Proprietary & Confidential                 1
The Sipera Approach



• Learn
                 Sipera VIPER™ lab concentrates all its efforts on Vulnerability Research to
             learn about different kinds of unique threats in SIP/IMS/UMA networks and UA

• Verify
                   Sipera LAVA™ tool emulate thousands of attacks to verify above threats.

• Protect
               Sipera IPCS™ products combines VPN, Firewall, IPS etc functionality for VoIP
             systems in a single device to protect and enable unified communications.




   November 23, 2007                     Sipera Proprietary & Confidential             2
Talk Outline



1. VoIP Overview
2. VoIP protocols
3. SIP Protocol Analysis
4. Weaknesses in VoIP Protocols
5. Attack Vectors
6. Conclusion
7. Demo



  November 23, 2007        Sipera Proprietary & Confidential   3
VoIP Overview



• What is VoIP?
           VoIP is an IP telephony service which converts analog data signals into digital
          signals and carries it over internet.

• Why VoIP?
           Cost Effective
           Flexible and Easy implementation
           Advance Services




  November 23, 2007                   Sipera Proprietary & Confidential               4
VoIP Protocols


• H.323
• Session Initiation Protocol ( SIP )
• Skinny Client Control Protocol ( SCCP )
• Media Gateway Control Protocol ( MGCP )




   November 23, 2007        Sipera Proprietary & Confidential   5
SIP Protocol Overview

• SIP stands for Session Initiation Protocol
        SIP is signaling protocol
        Plain-Text like HTTP
        Supports encryption like HTTPS
        Supports TLS
        Supports encryption of VoIP Media Data




• SIP Components
        User Agent Client ( UAC )
        User Agent Server ( UAS )




  November 23, 2007                 Sipera Proprietary & Confidential   6
SIP Architecture
                   Server: abc.com                                                     Server: xyz.com




joe@abc.com             john@abc.com                                             alice@xyz.com     veronica@xyz.com




                                       How call are made between to VoIP Phones


    November 23, 2007                        Sipera Proprietary & Confidential                             7
SIP Call Flow




                    Call Flow: How the whole session looks like.
November 23, 2007           Sipera Proprietary & Confidential      8
Weaknesses and Vulnerabilities in SIP

• UAS/UAC identity disclosure
• Username/Password cracking
• Eavesdropping
• Data Mangling
• SIP call Setup, Routing and Termination




  November 23, 2007       Sipera Proprietary & Confidential   9
Attack Vectors


• UAS/UAC identity disclosure
                Similar to Banner Grabbing.
                Users Enumeration




• Username/Password cracking
                 Call/Toll Fraud
                 Spamming




  November 23, 2007                           Sipera Proprietary & Confidential   10
Attack Vectors


• Eavesdropping
                Spying
                Mass Password Discovery




• Data Mangling
                 Phishing
                 Spam Over Internet Telephony
                 QoS Degradation




  November 23, 2007                       Sipera Proprietary & Confidential   11
Attack Vectors


• SIP call Setup, Routing and Termination
                Fake REGISTER and INVITE
                Active Eavesdropping
                Fake REGISTER, BYE and CANCEL



• Denial of Service Attack ( DoS )
                 Flooding (   INVITE, REGISTER, SUBSCRIBE, BYE … et al              )
                 Stealth DoS
                 Call Jamming
                 Distributed DoS ( DDoS )



  November 23, 2007                             Sipera Proprietary & Confidential       12
DEMONSTRATION




             Witness your desk phone getting 0w||3d !!
                           Thank You ☺




November 23, 2007           Sipera Proprietary & Confidential   13

Mais conteúdo relacionado

Destaque

Характеристика КИМов ГИА 2011 по биологии
Характеристика КИМов ГИА 2011 по биологииХарактеристика КИМов ГИА 2011 по биологии
Характеристика КИМов ГИА 2011 по биологии
Екатерина Луговова
 
1. teoria. pintura escultura del segle xx. 1
1. teoria. pintura escultura del segle xx. 11. teoria. pintura escultura del segle xx. 1
1. teoria. pintura escultura del segle xx. 1
jgutier4
 
Bunu ona asla yapmayin!
Bunu ona asla yapmayin!Bunu ona asla yapmayin!
Bunu ona asla yapmayin!
Raci Göktaş
 
Daughter of a Witch Jess’s Story
Daughter of a Witch Jess’s StoryDaughter of a Witch Jess’s Story
Daughter of a Witch Jess’s Story
AuroraDay01
 
Next Level - Dierenpark Emmen
Next Level - Dierenpark EmmenNext Level - Dierenpark Emmen
Next Level - Dierenpark Emmen
NIMA
 
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
ClubHack
 
Listado de 10 productos innovadores
Listado de 10 productos innovadoresListado de 10 productos innovadores
Listado de 10 productos innovadores
daidsanty2
 
11. windstromet dks 11
11. windstromet dks 1111. windstromet dks 11
11. windstromet dks 11
DIPECHO Nepal
 

Destaque (19)

Характеристика КИМов ГИА 2011 по биологии
Характеристика КИМов ГИА 2011 по биологииХарактеристика КИМов ГИА 2011 по биологии
Характеристика КИМов ГИА 2011 по биологии
 
1. teoria. pintura escultura del segle xx. 1
1. teoria. pintura escultura del segle xx. 11. teoria. pintura escultura del segle xx. 1
1. teoria. pintura escultura del segle xx. 1
 
1. мурус
1. мурус1. мурус
1. мурус
 
PARA KAZANMAK
PARA KAZANMAKPARA KAZANMAK
PARA KAZANMAK
 
Bunu ona asla yapmayin!
Bunu ona asla yapmayin!Bunu ona asla yapmayin!
Bunu ona asla yapmayin!
 
Webbstjärnan - vad och hur
Webbstjärnan - vad och hurWebbstjärnan - vad och hur
Webbstjärnan - vad och hur
 
taula arxius
taula arxiustaula arxius
taula arxius
 
Daughter of a Witch Jess’s Story
Daughter of a Witch Jess’s StoryDaughter of a Witch Jess’s Story
Daughter of a Witch Jess’s Story
 
Next Level - Dierenpark Emmen
Next Level - Dierenpark EmmenNext Level - Dierenpark Emmen
Next Level - Dierenpark Emmen
 
MassDevelopment FY2006 Annual Report
MassDevelopment FY2006 Annual ReportMassDevelopment FY2006 Annual Report
MassDevelopment FY2006 Annual Report
 
World Health Congress 2009 Europe Market Insight
World Health Congress 2009 Europe Market InsightWorld Health Congress 2009 Europe Market Insight
World Health Congress 2009 Europe Market Insight
 
Compilatie super !
Compilatie super !Compilatie super !
Compilatie super !
 
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
 
Listado de 10 productos innovadores
Listado de 10 productos innovadoresListado de 10 productos innovadores
Listado de 10 productos innovadores
 
Enhancing your work through the strategic use of social media and other techn...
Enhancing your work through the strategic use of social media and other techn...Enhancing your work through the strategic use of social media and other techn...
Enhancing your work through the strategic use of social media and other techn...
 
11. windstromet dks 11
11. windstromet dks 1111. windstromet dks 11
11. windstromet dks 11
 
Reggaetones
ReggaetonesReggaetones
Reggaetones
 
BCC 2004 - Research Needs In Biometrics
BCC 2004 -  Research Needs In BiometricsBCC 2004 -  Research Needs In Biometrics
BCC 2004 - Research Needs In Biometrics
 
8
88
8
 

Semelhante a Gaurav - VoIP - ClubHack2007

Sip & its application
Sip & its applicationSip & its application
Sip & its application
Poulami Pal
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
Suhas Desai
 
Security Issues In Voip
Security Issues In VoipSecurity Issues In Voip
Security Issues In Voip
Waqas Daar
 
F5 GOV Round Table - Application Centeric Security
F5 GOV Round Table - Application Centeric SecurityF5 GOV Round Table - Application Centeric Security
F5 GOV Round Table - Application Centeric Security
Tzoori Tamam
 
V2 d2013 saúl ibarra - sip2sip
V2 d2013   saúl ibarra - sip2sipV2 d2013   saúl ibarra - sip2sip
V2 d2013 saúl ibarra - sip2sip
VOIP2DAY
 

Semelhante a Gaurav - VoIP - ClubHack2007 (20)

Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!Departed Communications: Learn the ways to smash them!
Departed Communications: Learn the ways to smash them!
 
Number one-issue-voip-today-fraud
Number one-issue-voip-today-fraudNumber one-issue-voip-today-fraud
Number one-issue-voip-today-fraud
 
Sip & its application
Sip & its applicationSip & its application
Sip & its application
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
FOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication UpdateFOSS Sthlm: Realtime Communication Update
FOSS Sthlm: Realtime Communication Update
 
Security Issues In Voip
Security Issues In VoipSecurity Issues In Voip
Security Issues In Voip
 
Astricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installationsAstricon 2010: Scaling Asterisk installations
Astricon 2010: Scaling Asterisk installations
 
Wi-Fi: Secure or Open / Secure Open Wireless Access / SOWA @ HackFest 2011
Wi-Fi: Secure or Open / Secure Open Wireless Access / SOWA @ HackFest 2011Wi-Fi: Secure or Open / Secure Open Wireless Access / SOWA @ HackFest 2011
Wi-Fi: Secure or Open / Secure Open Wireless Access / SOWA @ HackFest 2011
 
Rethinking the PBX
Rethinking the PBXRethinking the PBX
Rethinking the PBX
 
Defcon 21-ozavci-vo ip-wars-return-of-the-sip by pseudor00t
Defcon 21-ozavci-vo ip-wars-return-of-the-sip by pseudor00tDefcon 21-ozavci-vo ip-wars-return-of-the-sip by pseudor00t
Defcon 21-ozavci-vo ip-wars-return-of-the-sip by pseudor00t
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Sydney UC - February 2015
Sydney UC - February 2015Sydney UC - February 2015
Sydney UC - February 2015
 
F5 GOV Round Table - Application Centeric Security
F5 GOV Round Table - Application Centeric SecurityF5 GOV Round Table - Application Centeric Security
F5 GOV Round Table - Application Centeric Security
 
Asterisk Deployments
Asterisk DeploymentsAsterisk Deployments
Asterisk Deployments
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
 
V2 d2013 saúl ibarra - sip2sip
V2 d2013   saúl ibarra - sip2sipV2 d2013   saúl ibarra - sip2sip
V2 d2013 saúl ibarra - sip2sip
 
SIP2SIP: SIP gratis para las masas
SIP2SIP: SIP gratis para las masasSIP2SIP: SIP gratis para las masas
SIP2SIP: SIP gratis para las masas
 

Mais de ClubHack

Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
ClubHack
 

Mais de ClubHack (20)

India legal 31 october 2014
India legal 31 october 2014India legal 31 october 2014
India legal 31 october 2014
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ BangaloreCyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 
Summarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threatSummarising Snowden and Snowden as internal threat
Summarising Snowden and Snowden as internal threat
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep KambleFatcat Automatic Web SQL Injector by Sandeep Kamble
Fatcat Automatic Web SQL Injector by Sandeep Kamble
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Legal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara AgrawalLegal Nuances to the Cloud by Ritambhara Agrawal
Legal Nuances to the Cloud by Ritambhara Agrawal
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar KuppanHybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman GuptaContent Type Attack Dark Hole in the Secure Environment by Raman Gupta
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
 
XSS Shell by Vandan Joshi
XSS Shell by Vandan JoshiXSS Shell by Vandan Joshi
XSS Shell by Vandan Joshi
 
Clubhack Magazine Issue February 2012
Clubhack Magazine Issue  February 2012Clubhack Magazine Issue  February 2012
Clubhack Magazine Issue February 2012
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012ClubHack Magazine issue April 2012
ClubHack Magazine issue April 2012
 
ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012ClubHack Magazine Issue May 2012
ClubHack Magazine Issue May 2012
 
ClubHack Magazine – December 2011
ClubHack Magazine – December 2011ClubHack Magazine – December 2011
ClubHack Magazine – December 2011
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

Gaurav - VoIP - ClubHack2007

  • 1. Gaurav Saha November 23, 2007 Sipera Proprietary & Confidential 1
  • 2. The Sipera Approach • Learn Sipera VIPER™ lab concentrates all its efforts on Vulnerability Research to learn about different kinds of unique threats in SIP/IMS/UMA networks and UA • Verify Sipera LAVA™ tool emulate thousands of attacks to verify above threats. • Protect Sipera IPCS™ products combines VPN, Firewall, IPS etc functionality for VoIP systems in a single device to protect and enable unified communications. November 23, 2007 Sipera Proprietary & Confidential 2
  • 3. Talk Outline 1. VoIP Overview 2. VoIP protocols 3. SIP Protocol Analysis 4. Weaknesses in VoIP Protocols 5. Attack Vectors 6. Conclusion 7. Demo November 23, 2007 Sipera Proprietary & Confidential 3
  • 4. VoIP Overview • What is VoIP? VoIP is an IP telephony service which converts analog data signals into digital signals and carries it over internet. • Why VoIP? Cost Effective Flexible and Easy implementation Advance Services November 23, 2007 Sipera Proprietary & Confidential 4
  • 5. VoIP Protocols • H.323 • Session Initiation Protocol ( SIP ) • Skinny Client Control Protocol ( SCCP ) • Media Gateway Control Protocol ( MGCP ) November 23, 2007 Sipera Proprietary & Confidential 5
  • 6. SIP Protocol Overview • SIP stands for Session Initiation Protocol SIP is signaling protocol Plain-Text like HTTP Supports encryption like HTTPS Supports TLS Supports encryption of VoIP Media Data • SIP Components User Agent Client ( UAC ) User Agent Server ( UAS ) November 23, 2007 Sipera Proprietary & Confidential 6
  • 7. SIP Architecture Server: abc.com Server: xyz.com joe@abc.com john@abc.com alice@xyz.com veronica@xyz.com How call are made between to VoIP Phones November 23, 2007 Sipera Proprietary & Confidential 7
  • 8. SIP Call Flow Call Flow: How the whole session looks like. November 23, 2007 Sipera Proprietary & Confidential 8
  • 9. Weaknesses and Vulnerabilities in SIP • UAS/UAC identity disclosure • Username/Password cracking • Eavesdropping • Data Mangling • SIP call Setup, Routing and Termination November 23, 2007 Sipera Proprietary & Confidential 9
  • 10. Attack Vectors • UAS/UAC identity disclosure Similar to Banner Grabbing. Users Enumeration • Username/Password cracking Call/Toll Fraud Spamming November 23, 2007 Sipera Proprietary & Confidential 10
  • 11. Attack Vectors • Eavesdropping Spying Mass Password Discovery • Data Mangling Phishing Spam Over Internet Telephony QoS Degradation November 23, 2007 Sipera Proprietary & Confidential 11
  • 12. Attack Vectors • SIP call Setup, Routing and Termination Fake REGISTER and INVITE Active Eavesdropping Fake REGISTER, BYE and CANCEL • Denial of Service Attack ( DoS ) Flooding ( INVITE, REGISTER, SUBSCRIBE, BYE … et al ) Stealth DoS Call Jamming Distributed DoS ( DDoS ) November 23, 2007 Sipera Proprietary & Confidential 12
  • 13. DEMONSTRATION Witness your desk phone getting 0w||3d !! Thank You ☺ November 23, 2007 Sipera Proprietary & Confidential 13