VoIP(Voice over IP) Security             Dayanand Prabhakar
Project scope•   Understanding VoIP•   Threat profiling of VoIP application•   Develop the test case and    Methodologies ...
What is VoIP? Routingof voice conversations over the Internet or through any other IP-based network.
Benefits VoIP enables convergence of data,  voice, and video onto single network. Attractive opportunities  –   Reducing...
VoIP implementations   Business-grade VoIP telephony     – Designed specifically for business grade usage   Softphones  ...
Protocols   Signaling Protocol     – Create, modify, and terminate sessions       with participants     – Conferences    ...
Protocols   Session Initiation Protocol (SIP)    –   Signaling protocol    –   Session Initiation Protocol    –   Applica...
Protocols   H.323     – One of the earliest sets of VoIP standards       by ITU-T     – Handles voice, video and data con...
Most Common VOIP SecurityMistakes1.   Treating VOIP security the same way as Network     security2.   Not treating VOIP se...
Complexities in VOIPArchitecture
Voice over IP ThreatsThreats are categorized into followingparameters. Threats   against   availability Threats   agains...
Voice over IP ThreatsAgainst Availability   Against Confidentiality   Call flooding         Eavesdropping   Toll Fraud ...
Voice over IP ThreatsAgainst Integrity      Against Social context   Message                          Misrepresentation ...
What are the Threat Vectors?   OS Exploits   Signaling Attacks   Endpoint Admin Privilege Exploits   Real Time Protoco...
Specialized Hacking Tools   BackTrack Penetration Testing Distribution     – www.backtrack-linux.org/   Wireshark (http:...
Attack on VoIP
Mitigation Strategies   Create VOIP Specific Security Policies   Segmentation as appropriate     – Utilize separate VLAN...
Key Mitigation Strategies   Apply Encryption where possible   Use tools to test the network   Utilize VoIP aware Firewa...
Conclusion VoIP is established as the future of  telephones Security is critical when designing,  implementing and maint...
References   VOIPSA     – http://www.voipsa.org/   The VOIP Dilemma SANS Institute     – http://www.sans.org/rr/whitepap...
THANK YOU Dayanand Prabhakar
VoIP Security
Upcoming SlideShare
Loading in...5
×

VoIP Security

2,362

Published on

This presentation describes the summary of VoIP infrastructure and related vulnerabilities and security concerns.

Published in: Technology
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,362
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

Transcript of "VoIP Security"

  1. 1. VoIP(Voice over IP) Security Dayanand Prabhakar
  2. 2. Project scope• Understanding VoIP• Threat profiling of VoIP application• Develop the test case and Methodologies to test VoIP application• Sample testing of one VoIP application and report presentation• Mitigation strategies• Conclusion
  3. 3. What is VoIP? Routingof voice conversations over the Internet or through any other IP-based network.
  4. 4. Benefits VoIP enables convergence of data, voice, and video onto single network. Attractive opportunities – Reducing costs – Reducing complexities – Enabling progressive business gains
  5. 5. VoIP implementations Business-grade VoIP telephony – Designed specifically for business grade usage Softphones – X-lite, 3cx , Express Talk Instant Messaging voice services – Application such as AIM, MSN, Apple iChat offer ‘voice chat’ functionality Mobile VoIP – Requires mobile telephone with 3G or wireless connectivity – Using a mobile version of a Softphone mobile devices and telephones are capable of offering VoIP services VoIP handsets – Requires a VoIP handset from the service provider – Offer call functionality and services similar of typical PSTN services
  6. 6. Protocols Signaling Protocol – Create, modify, and terminate sessions with participants – Conferences – Proxies – Authentication Transport /Carrier Protocol – Manages the actual voice data
  7. 7. Protocols Session Initiation Protocol (SIP) – Signaling protocol – Session Initiation Protocol – Application layer control protocol for initiating VOIP sessions – Currently most favored protocol for new systems
  8. 8. Protocols H.323 – One of the earliest sets of VoIP standards by ITU-T – Handles voice, video and data conferencing – Some limitations, but most VoIP traffic utilizes this today Real-time Transport Protocol (RTP) – Used for media transfer by other protocols – Fast, scalable and efficient – RTP uses UDP
  9. 9. Most Common VOIP SecurityMistakes1. Treating VOIP security the same way as Network security2. Not treating VOIP security the same way as Network security How it’s the Same How it’s Different • Uses mostly the same • Some unique protocols protocols • Traditional Security devices • Uses mostly the same (Firewalls can disrupt service) Operating Systems • People treat it like the old phone • Many of the same system threats
  10. 10. Complexities in VOIPArchitecture
  11. 11. Voice over IP ThreatsThreats are categorized into followingparameters. Threats against availability Threats against confidentiality Threats against integrity Threats against social context
  12. 12. Voice over IP ThreatsAgainst Availability Against Confidentiality Call flooding  Eavesdropping Toll Fraud  Call pattern Tracking Call hijacking  Reconstruction Fuzzing TDOS
  13. 13. Voice over IP ThreatsAgainst Integrity Against Social context Message  Misrepresentation Alteration  Call SPIT (Spam over Call Rerouting Internet Telephony ) Media Alteration  Vising
  14. 14. What are the Threat Vectors? OS Exploits Signaling Attacks Endpoint Admin Privilege Exploits Real Time Protocol (RTP) Attacks DoS Attacks IP PBX &Telephony Server Exploits
  15. 15. Specialized Hacking Tools BackTrack Penetration Testing Distribution – www.backtrack-linux.org/ Wireshark (http://www.wireshark.org) – Packet Sniffer Cain and Abel (http://www.oxid.it) – Password cracker – ARP spoofing – RTP Playback SiVuS (http://www.vopsecurity.org/html/tools.html) – VoIP Vulnerability Scanner – General Purpose VoIP packet generation, spoofing, testing tool.
  16. 16. Attack on VoIP
  17. 17. Mitigation Strategies Create VOIP Specific Security Policies Segmentation as appropriate – Utilize separate VLANs for voice and data Device Hardening – Do not use default passwords – Turn off unnecessary services – Apply vendor supplied patches in a timely manner – Perform vendor installation security checklist to harden applications Pay attention to Security Risk Assessments and planning against the VOIP infrastructure
  18. 18. Key Mitigation Strategies Apply Encryption where possible Use tools to test the network Utilize VoIP aware Firewalls, Intrusion Prevention Systems Continue to protect against traditional system attacks (Toll Fraud, Modem Security, Social Networking Attacks & etc.) Avoid Single point of failure
  19. 19. Conclusion VoIP is established as the future of telephones Security is critical when designing, implementing and maintaining VoIP systems VoIP technology should there by provide a balance between security and business needs .
  20. 20. References VOIPSA – http://www.voipsa.org/ The VOIP Dilemma SANS Institute – http://www.sans.org/rr/whitepapers/voip/1452.php NIST - Security Considerations for Voice Over IP Systems, – http://csrc.nist.gov/publications/nistpubs/800- 58/SP800-58-final.pdf IP Telephony & VoIP: Security technical implementation guide – http://csrc.nist.gov/pcig/STIGs/VoIP-STIG-V2R2.pdf
  21. 21. THANK YOU Dayanand Prabhakar

×