SlideShare a Scribd company logo
1 of 22
VoIP(Voice over IP) Security




             Dayanand Prabhakar
Project scope

•   Understanding VoIP
•   Threat profiling of VoIP application
•   Develop the test case and
    Methodologies to test VoIP application
•   Sample testing of one VoIP application
    and report presentation
•   Mitigation strategies
•   Conclusion
What is VoIP?

 Routingof voice conversations over the
 Internet or through any other IP-based
 network.
Benefits


 VoIP enables convergence of data,
  voice, and video onto single network.
 Attractive opportunities
  –   Reducing costs
  –   Reducing complexities
  –   Enabling progressive business gains
VoIP implementations
   Business-grade VoIP telephony
     – Designed specifically for business grade usage
   Softphones
     – X-lite, 3cx , Express Talk
   Instant Messaging voice services
     – Application such as AIM, MSN, Apple iChat offer ‘voice chat’
        functionality
   Mobile VoIP
     – Requires mobile telephone with 3G or wireless connectivity
     – Using a mobile version of a Softphone mobile devices and
        telephones are capable of offering VoIP services
   VoIP handsets
     – Requires a VoIP handset from the service provider
     – Offer call functionality and services similar of typical PSTN
        services
Protocols

   Signaling Protocol
     – Create, modify, and terminate sessions
       with participants
     – Conferences
     – Proxies
     – Authentication


   Transport /Carrier Protocol
     – Manages the actual voice data
Protocols

   Session Initiation Protocol (SIP)
    –   Signaling protocol
    –   Session Initiation Protocol
    –   Application layer control protocol for
        initiating VOIP sessions
    –   Currently most favored protocol for new
        systems
Protocols
   H.323
     – One of the earliest sets of VoIP standards
       by ITU-T
     – Handles voice, video and data conferencing
     – Some limitations, but most VoIP traffic
       utilizes this today

   Real-time Transport Protocol (RTP)
     – Used for media transfer by other protocols
     – Fast, scalable and efficient
     – RTP uses UDP
Most Common VOIP Security
Mistakes

1.   Treating VOIP security the same way as Network
     security
2.   Not treating VOIP security the same way as Network
     security

 How it’s the Same         How it’s Different

 • Uses mostly the same    • Some unique protocols
   protocols               • Traditional Security devices
 • Uses mostly the same      (Firewalls can disrupt service)
   Operating Systems       • People treat it like the old phone
 • Many of the same          system
   threats
Complexities in VOIP
Architecture
Voice over IP Threats

Threats are categorized into following
parameters.

 Threats   against   availability
 Threats   against   confidentiality
 Threats   against   integrity
 Threats   against   social context
Voice over IP Threats

Against Availability   Against Confidentiality

   Call flooding         Eavesdropping
   Toll Fraud            Call pattern Tracking
   Call hijacking        Reconstruction
   Fuzzing
   TDOS
Voice over IP Threats

Against Integrity      Against Social context


   Message
                          Misrepresentation
    Alteration            Call SPIT (Spam over
   Call Rerouting         Internet Telephony )
   Media Alteration
                          Vising
What are the Threat Vectors?

   OS Exploits
   Signaling Attacks
   Endpoint Admin Privilege Exploits
   Real Time Protocol (RTP) Attacks
   DoS Attacks
   IP PBX &Telephony Server Exploits
Specialized Hacking Tools

   BackTrack Penetration Testing Distribution
     – www.backtrack-linux.org/
   Wireshark (http://www.wireshark.org)
     – Packet Sniffer
   Cain and Abel (http://www.oxid.it)
     – Password cracker
     – ARP spoofing
     – RTP Playback
   SiVuS (http://www.vopsecurity.org/html/tools.html)
     – VoIP Vulnerability Scanner
     – General Purpose VoIP packet generation, spoofing,
       testing tool.
Attack on VoIP
Mitigation Strategies

   Create VOIP Specific Security Policies
   Segmentation as appropriate
     – Utilize separate VLANs for voice and data
   Device Hardening
     – Do not use default passwords
     – Turn off unnecessary services
     – Apply vendor supplied patches in a timely manner
     – Perform vendor installation security checklist to harden
       applications
   Pay attention to Security Risk Assessments and
    planning against the VOIP infrastructure
Key Mitigation Strategies

   Apply Encryption where possible
   Use tools to test the network
   Utilize VoIP aware Firewalls, Intrusion Prevention Systems
   Continue to protect against traditional system attacks (Toll
    Fraud, Modem Security, Social Networking Attacks & etc.)
   Avoid Single point of failure
Conclusion


 VoIP is established as the future of
  telephones
 Security is critical when designing,
  implementing and maintaining VoIP
  systems
 VoIP technology should there by provide a
  balance between security and business
  needs .
References

   VOIPSA
     – http://www.voipsa.org/
   The VOIP Dilemma SANS Institute
     – http://www.sans.org/rr/whitepapers/voip/1452.php


   NIST - Security Considerations for Voice Over IP
    Systems,
     – http://csrc.nist.gov/publications/nistpubs/800-
       58/SP800-58-final.pdf
   IP Telephony & VoIP: Security technical
    implementation guide
     – http://csrc.nist.gov/pcig/STIGs/VoIP-STIG-V2R2.pdf
THANK YOU

 Dayanand Prabhakar

More Related Content

What's hot

What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?broadconnect
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet3Anetwork com
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllersstefansayer
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 
Internet Engineering Task Force
Internet Engineering Task ForceInternet Engineering Task Force
Internet Engineering Task ForceYatish Bathla
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS NetProtocol Xpert
 
Avaya IP Office Demo V4 2
Avaya IP Office Demo V4 2Avaya IP Office Demo V4 2
Avaya IP Office Demo V4 2sacma
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunkingorionnow
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation tofael1
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopFatih Ozavci
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Fringe Division
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSridhar Kumar N
 

What's hot (20)

What is VoIP and How it works?
What is VoIP and How it works?What is VoIP and How it works?
What is VoIP and How it works?
 
Cn lab manual 150702
Cn lab manual 150702Cn lab manual 150702
Cn lab manual 150702
 
Cisco switch commands cheat sheet
Cisco switch commands cheat sheetCisco switch commands cheat sheet
Cisco switch commands cheat sheet
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
Understanding Session Border Controllers
Understanding Session Border ControllersUnderstanding Session Border Controllers
Understanding Session Border Controllers
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
Internet Engineering Task Force
Internet Engineering Task ForceInternet Engineering Task Force
Internet Engineering Task Force
 
Network design
Network designNetwork design
Network design
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
 
Avaya IP Office Demo V4 2
Avaya IP Office Demo V4 2Avaya IP Office Demo V4 2
Avaya IP Office Demo V4 2
 
Sip
SipSip
Sip
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
 
VOIP Presentation
VOIP Presentation VOIP Presentation
VOIP Presentation
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
ccna
ccnaccna
ccna
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP)
 
Ccna command
Ccna commandCcna command
Ccna command
 
Voip
Voip Voip
Voip
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
 

Viewers also liked

Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP) Namra Afzal
 
Voice over IP (VoIP)
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)Peter R. Egli
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
VoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol ProblemsVoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol Problemsseanhn
 
Voip powerpoint
Voip powerpointVoip powerpoint
Voip powerpointGW1992
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLRajan Kumar
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGRagheb Gmira
 
VoIP Security for Dummies
VoIP Security for DummiesVoIP Security for Dummies
VoIP Security for DummiesAvaya Inc.
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)Fatih Ozavci
 
Our Internet Connection
Our Internet ConnectionOur Internet Connection
Our Internet ConnectionCSaC
 
QoS and QoE Aspects of Digital Financial Services
QoS and QoE Aspects of Digital Financial ServicesQoS and QoE Aspects of Digital Financial Services
QoS and QoE Aspects of Digital Financial ServicesITU
 
IPTV QoE Monitoring
IPTV QoE MonitoringIPTV QoE Monitoring
IPTV QoE MonitoringYoss Cohen
 
Voice and Video over IP Communications: Assessing and Improving User Experience
Voice and Video over IP Communications: Assessing and Improving User ExperienceVoice and Video over IP Communications: Assessing and Improving User Experience
Voice and Video over IP Communications: Assessing and Improving User ExperienceRADVISION Ltd.
 

Viewers also liked (16)

VOIP security
VOIP securityVOIP security
VOIP security
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
 
Voice over IP (VoIP)
Voice over IP (VoIP)Voice over IP (VoIP)
Voice over IP (VoIP)
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
VoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol ProblemsVoIP security: Implementation and Protocol Problems
VoIP security: Implementation and Protocol Problems
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
Voip powerpoint
Voip powerpointVoip powerpoint
Voip powerpoint
 
VOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOLVOICE OVER INTERNET PROTOCOL
VOICE OVER INTERNET PROTOCOL
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
 
VoIP Security for Dummies
VoIP Security for DummiesVoIP Security for Dummies
VoIP Security for Dummies
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Our Internet Connection
Our Internet ConnectionOur Internet Connection
Our Internet Connection
 
QoS and QoE Aspects of Digital Financial Services
QoS and QoE Aspects of Digital Financial ServicesQoS and QoE Aspects of Digital Financial Services
QoS and QoE Aspects of Digital Financial Services
 
IPTV QoE Monitoring
IPTV QoE MonitoringIPTV QoE Monitoring
IPTV QoE Monitoring
 
Voice over IP in Changing Times
Voice over IP in Changing TimesVoice over IP in Changing Times
Voice over IP in Changing Times
 
Voice and Video over IP Communications: Assessing and Improving User Experience
Voice and Video over IP Communications: Assessing and Improving User ExperienceVoice and Video over IP Communications: Assessing and Improving User Experience
Voice and Video over IP Communications: Assessing and Improving User Experience
 

Similar to VoIP Security

Voippresentation
VoippresentationVoippresentation
Voippresentationeliran2
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056mashiur
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open SourceSuhas Desai
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchIJMER
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)Abdullah Shah
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyCagdas Tanriover
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 
Case study about voip
Case study about voipCase study about voip
Case study about voipelmudthir
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51martinvoelk
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfOkan YILDIZ
 

Similar to VoIP Security (20)

Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
 
Voice over IP
Voice over IPVoice over IP
Voice over IP
 
Voippresentation
VoippresentationVoippresentation
Voippresentation
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
VoIP Research Paper
VoIP Research PaperVoIP Research Paper
VoIP Research Paper
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
How does VOIP work diagram
How does VOIP work diagramHow does VOIP work diagram
How does VOIP work diagram
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
 
VoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdfVoIP (Voice over Internet Protocol).pdf
VoIP (Voice over Internet Protocol).pdf
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

VoIP Security

  • 1. VoIP(Voice over IP) Security Dayanand Prabhakar
  • 2. Project scope • Understanding VoIP • Threat profiling of VoIP application • Develop the test case and Methodologies to test VoIP application • Sample testing of one VoIP application and report presentation • Mitigation strategies • Conclusion
  • 3. What is VoIP?  Routingof voice conversations over the Internet or through any other IP-based network.
  • 4. Benefits  VoIP enables convergence of data, voice, and video onto single network.  Attractive opportunities – Reducing costs – Reducing complexities – Enabling progressive business gains
  • 5. VoIP implementations  Business-grade VoIP telephony – Designed specifically for business grade usage  Softphones – X-lite, 3cx , Express Talk  Instant Messaging voice services – Application such as AIM, MSN, Apple iChat offer ‘voice chat’ functionality  Mobile VoIP – Requires mobile telephone with 3G or wireless connectivity – Using a mobile version of a Softphone mobile devices and telephones are capable of offering VoIP services  VoIP handsets – Requires a VoIP handset from the service provider – Offer call functionality and services similar of typical PSTN services
  • 6. Protocols  Signaling Protocol – Create, modify, and terminate sessions with participants – Conferences – Proxies – Authentication  Transport /Carrier Protocol – Manages the actual voice data
  • 7. Protocols  Session Initiation Protocol (SIP) – Signaling protocol – Session Initiation Protocol – Application layer control protocol for initiating VOIP sessions – Currently most favored protocol for new systems
  • 8. Protocols  H.323 – One of the earliest sets of VoIP standards by ITU-T – Handles voice, video and data conferencing – Some limitations, but most VoIP traffic utilizes this today  Real-time Transport Protocol (RTP) – Used for media transfer by other protocols – Fast, scalable and efficient – RTP uses UDP
  • 9. Most Common VOIP Security Mistakes 1. Treating VOIP security the same way as Network security 2. Not treating VOIP security the same way as Network security How it’s the Same How it’s Different • Uses mostly the same • Some unique protocols protocols • Traditional Security devices • Uses mostly the same (Firewalls can disrupt service) Operating Systems • People treat it like the old phone • Many of the same system threats
  • 11. Voice over IP Threats Threats are categorized into following parameters.  Threats against availability  Threats against confidentiality  Threats against integrity  Threats against social context
  • 12. Voice over IP Threats Against Availability Against Confidentiality  Call flooding  Eavesdropping  Toll Fraud  Call pattern Tracking  Call hijacking  Reconstruction  Fuzzing  TDOS
  • 13. Voice over IP Threats Against Integrity Against Social context  Message  Misrepresentation Alteration  Call SPIT (Spam over  Call Rerouting Internet Telephony )  Media Alteration  Vising
  • 14. What are the Threat Vectors?  OS Exploits  Signaling Attacks  Endpoint Admin Privilege Exploits  Real Time Protocol (RTP) Attacks  DoS Attacks  IP PBX &Telephony Server Exploits
  • 15. Specialized Hacking Tools  BackTrack Penetration Testing Distribution – www.backtrack-linux.org/  Wireshark (http://www.wireshark.org) – Packet Sniffer  Cain and Abel (http://www.oxid.it) – Password cracker – ARP spoofing – RTP Playback  SiVuS (http://www.vopsecurity.org/html/tools.html) – VoIP Vulnerability Scanner – General Purpose VoIP packet generation, spoofing, testing tool.
  • 17.
  • 18. Mitigation Strategies  Create VOIP Specific Security Policies  Segmentation as appropriate – Utilize separate VLANs for voice and data  Device Hardening – Do not use default passwords – Turn off unnecessary services – Apply vendor supplied patches in a timely manner – Perform vendor installation security checklist to harden applications  Pay attention to Security Risk Assessments and planning against the VOIP infrastructure
  • 19. Key Mitigation Strategies  Apply Encryption where possible  Use tools to test the network  Utilize VoIP aware Firewalls, Intrusion Prevention Systems  Continue to protect against traditional system attacks (Toll Fraud, Modem Security, Social Networking Attacks & etc.)  Avoid Single point of failure
  • 20. Conclusion  VoIP is established as the future of telephones  Security is critical when designing, implementing and maintaining VoIP systems  VoIP technology should there by provide a balance between security and business needs .
  • 21. References  VOIPSA – http://www.voipsa.org/  The VOIP Dilemma SANS Institute – http://www.sans.org/rr/whitepapers/voip/1452.php  NIST - Security Considerations for Voice Over IP Systems, – http://csrc.nist.gov/publications/nistpubs/800- 58/SP800-58-final.pdf  IP Telephony & VoIP: Security technical implementation guide – http://csrc.nist.gov/pcig/STIGs/VoIP-STIG-V2R2.pdf
  • 22. THANK YOU Dayanand Prabhakar