SlideShare a Scribd company logo
Making your Asterisk System Secure 
Who is out there looking to attack your PBX? 
How do they find it? 
How can you protect your PBX 
PRESENT BY: 
ERIC KLEIN 
SR. CONSUL TANT
/home/ericlklein/.finger 
• NEW GRANDFATHER (PICTURES UPON REQUEST) 
• VOIP FRAUD PREVENTION EVANGELIST 
• STARTUP ADVISOR AND ENTHUSIAST 
• AUTHOR, BLOGGER FOR TECHNOLOGY AND 
TRAVEL 
• AMATEUR PHOTOGRAPHER AND CHEF
Ok, just 1 picture
2013 
GLOBAL FRAUD SURVEY 
RESULTS
CFCA Global Fraud Key Findings 
Global Fraud Loss: 
 2011 $40.1 Billion (USD) annually 
 2013 $46.3 Billion (USD) annually 
Top Fraud types 2011 
 Compromised PBX/Voicemail $4.96 Billion 
 Internal/Employee Theft $1.44 Billion 
Source: www.cfca.org/fraudlosssurvey/ 
The 15% increase from 2011 is a result of 
increased fraudulent activity targeting the 
wireless industry. 
2013 
$10.03 Billion 
$2.53 Billion 
*Notes: 
 In 2011 the Global Fraud Loss Estimate was recalibrated to include the sizes of the CSPs being surveyed. 
 In 2013 fraud classifications were divided into methods and type categories
Source: www.cfca.org/fraudlosssurvey/
Why They Attack
How it Works 
Hackers sign up to lease premium-rate phone numbers, often used 
for sexual-chat or psychic lines, from one of dozens of web-based 
services that charge dialers over $1 a minute and give the lessee a 
cut. In the United States, premium-rate numbers are easily 
identified by 1-900 prefixes, and callers are informed they will be 
charged higher rates. But elsewhere, like in Latvia and Estonia, they 
can be trickier to spot. The payout to the lessees can be as high as 24 
cents for every minute spent on the phone. 
Hackers then break into a business’s phone system and make calls 
through it to their premium number, typically over a weekend, 
when nobody is there to notice. With high-speed computers, they 
can make hundreds of calls simultaneously, forwarding as many as 
220 minutes’ worth of phone calls a minute to the pay line. The 
hacker gets a cut of the charges, typically delivered through a 
Western Union, MoneyGram or wire transfer. 
In part because the plan is so profitable, premium rate number 
resellers are multiplying rapidly. There were 17 in 2009; last year 
there were 85 
www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html
Who Pays?
Who is Responsible for Losses 
from Hacks? 
In almost all cases the customer is contractually 
responsible for losses from a hacked system. 
Major carriers have sophisticated fraud systems in 
place to catch hackers before they run up false six-figure 
charges, and they can afford to credit 
customers for millions of fraudulent charges every 
year. But small businesses often use local carriers, 
which lack such antifraud systems. And some of 
those carriers are leaving customers to foot the bill.
Rare exception: Frip Finishing vs. 
Voiceflex 
Frip Finishing of Leicestershire was hacked over 
Halloween weekend of October 2011 
Internet hackers infiltrated Frip’s PBX and made 
10,366 calls international phone card calls creating a 
bill of £35,000 – most to a premium telephone 
number in Poland 
Judge David Grant rejected arguments the company 
had failed to adequately maintain the security of its. 
On the court’s interpretation of the contract, Frip 
was only obliged to pay for calls that it had actually 
made. 
http://commsbusiness.co.uk/features/halloween-bill-shocker/
Phone Hackers Dial and Redial to Steal 
Billions 
In a weekend last March Foreman Seeley 
Fountain Architecture, (in Norcross, Ga.) 
was hack for $166,000 worth of calls to 
premium- rate telephone numbers in 
Gambia, Somalia and the Maldives. 
www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html
Need to Change the Laws 
The law is not much help, because no regulations 
require carriers to reimburse customers for fraud the 
way credit card companies must. Lawmakers have 
taken the issue up from time to time, but little 
progress has been made.
What to watch for
Something New Has Started 
Mysterious fake mobile 
phone towers discovered 
across America could be 
listening in on unsuspecting 
callers. 
They were discovered by 
people using a heavily 
customised Android device 
called the CryptoPhone 
500. 
"They can listen to all of your voice calls and they can 
grab all of your text” said Buzz Bruner of EDS 
America. 
Sources: 
http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls 
http://www.myfoxdc.com/story/26610194/tech-company-finds-mysterious-fake-cell-towers-in-dc-area
Detected in Many Locations 
During a road trip from Florida to North Carolina and he found eight 
different interceptors on that trip. 
After publication an 
interceptor was detected 
near the vicinity of 
South Point Casino in 
Las Vegas. 
Several of the masts 
were situated near US 
military bases. he 
towers are located near 
the White House, the 
United States Capitol 
and the Supreme Court. 
"Whose interceptor is it? Who are they, that's listening to calls around 
military bases? Is it just the US military, or are they foreign 
governments doing it? The point is: we don't really know whose they 
are.“ - Les Goldsmith, chief executive of security firm ESD America
Detection is Hard 
“If you've been intercepted, in 
some cases it might show at the 
top that you've been forced 
from 4G down to 2G. But a 
decent interceptor won't show 
that,” says Goldsmith. “It'll be 
set up to show you [falsely] that 
you're still on 4G. You'll think 
that you're on 4G, but you're 
actually being forced back to 
2G.” 
Some devices can not only capture calls and texts, but even 
actively control the phone and send spoof texts.
How they find you
More Examples from Shodan 
Remember that last year someone in the 
room was able to hack a Polycom phone 
within 30 sec of it being displayed via 
Shodan page – Default Passwords are a 
problem.
Security Resources from
Take the updated Asterisk 
Advanced Class for the 
basics. 
Asterisk Security 
Considerations
Copyright © 2014 Digium, The Asterisk Company 22 
Goals 
• Security overview 
• Survey of common threats 
• Layer-by-layer security and best practice 
suggestions 
– physical 
– OS 
– network 
– Asterisk 
– SIP 
– dialplan 
• Resources
Look at the Asterisk Wiki
Asterisk Security Framework 
Article by Malcolm Davenport 
Attacks on Voice over IP networks are becoming increasingly 
more common. It has become clear that we must do 
something within Asterisk to help mitigate these attacks. 
Through a number of discussions with groups of developers in 
the Asterisk community, the general consensus is that the best 
thing that we can do within Asterisk is to build a framework 
which recognizes and reports events that could potentially 
have security implications. 
Discussion has subpages for: 
 Security Framework Overview 
 Security Event Generation 
 Asterisk Security Event Logger 
 Security Events to Log 
 Security Log File Format 
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Security+Framework
Secure Calling Specifics 
Article by Malcolm Davenport 
Asterisk supports a channel-agnostic method for 
handling secure call requirements. Since there is no 
single meaning of what constitutes a "secure call," 
Asterisk allows the administrator the control to 
define "secure" for themselves via the dialplan and 
channel-specific configuration files. 
Article includes explanations and examples for: 
 Channel-specific configuration 
 Security-based dialplan branching 
 Forcing bridged channels to be secure 
https://wiki.asterisk.org/wiki/display/AST/Secure+Calling+Specifics
Secure Calling Tutorial 
Original tutorial by Malcolm Davenport, last modified by 
Rusty Newton Transport Layer Security (TLS) provides 
encryption for call signaling. (1.8 and above) 
Tutorial outline: 
 Overview 
 Part 1 (TLS) 
Keys 
The Asterisk SIP configuration 
Configuring a TLS-enabled SIP peer within Asterisk 
Configuring a TLS-enabled SIP client to talk to Asterisk 
Problems with server verification 
 Part 2 (SRTP) 
https://wiki.asterisk.org/wiki/display/AST/Secure+Calling+Tutorial
Pay Attention to Vendor 
Warnings
FreePBX 
Very good at notifying of potential problems 
and regular updates: 
Pay attention to the FreePBX dashboard for 
update notifications 
 Critical FreePBX RCE Vulnerability (ALL Versions) 
We have been made aware of a critical Zero-Day Remote 
Code Execution and Privilege Escalation exploit within the 
legacy “FreePBX ARI Framework module/Asterisk 
Recording Interface (ARI)”. This affects any user who has 
installed FreePBX prior to version 12, and users who have 
updated to FreePBX 12 from a prior version and did not 
remove the legacy FreePBX ARI Framework module. 
http://www.freepbx.org/node/92822
Watch out for OS Level Alerts 
Shellshock on 
Shellshock, also known as Bashdoor, is a family of 
security bugs (with 6 CVE's filed at the time of this 
page) in the widely used Unix Bash shell, the first of 
which was disclosed on 24 September 2014. Many 
Internet daemons, such as web servers, use Bash to 
process certain commands, allowing an attacker to 
cause vulnerable versions of Bash to execute 
arbitrary commands. This can allow an attacker to 
gain unauthorized access to a computer system. 
http://wiki.centos.org/Security/Shellshock
Protect Your System 
Watch for and install regular updates 
Do not ignore the OS updates and fixes – Run Yum 
update at least quarterly. 
Always change the default user names and 
passwords 
Keep up on the news and new attacks – Inside fraud 
and Phishing will remain big problems for years to 
come.
VoIP Security Products 
ONES TO LOOK AT AND SEE WHAT BEST FITS 
YOUR NEEDS
Regular Firewall 
Palo Alto firewalls have known problems with SIP 
and SIP ALG, calls can complete but no audio (media 
channel). 
Checkpoint Firewalls work fine with SIP. 
Fail2Ban can still cause additional problems with 
triggering massive whois processes that take a lot of 
CPU resources. (Need to kill PID for the process – 
sometimes you need to kill multiple PIDs).
Single PBX or Phone Level 
New products have come out in the past few years to 
protect SIP at the phone or enterprise PBX level. 
Coordinate the install with your ITSP, as there may 
be configuration issues to be managed (ports to 
open, NAT, etc.).
SIP Threat Manager 
STM is installed in front of any SIP 
based PBX or gateway offering several 
layers of security against numerous 
types of attacks. Block specific IPs or 
countries, protect your PBX against 
hackers trying user names and 
passwords, someone is trying to flood 
your PBX with a DDos attacks? No 
problem! 
Using the SNORT based Real Time 
Deep packet inspection engine, our 
STM analyzes each SIP packet going to 
your phone system, identifies the 
malicious and abnormal ones blocking 
the originating IP.
Firewall Example from Allo 
On Youtube: http://www.youtube.com/watch?v=iEwfH5j9ZfE
μFirewall 
Using a revolutionary, patent 
pending process, it identifies and 
prevents toll fraud on a premise-based 
IP PBX before it happens: 
 Analyzes SIP packets through deep packet 
inspection 
 Stops abnormal SIP protocol usage based 
on pre-determined parameters 
 Prevents SIP denial-of-service attacks 
 Quietly drops malicious SIP packets rather 
than responding with an error to help 
prevent continued attacks 
 Neutralizes SIP attacks while they are 
occurring rather than identifying attacks 
after the fact
PHPARI 
ARI i s a mind bl owing jump f o r t r adi t i ona l a s t e r i s k int e g r a t o r s . 
Our obj e c t i v e i s t o c r e a t e a s impl e onl ine eng ine , tha t wi l l a l l ow 
f o r p e op l e t o de v e l op sho r t s t a s i s /ARI a p p l i c a t i ons , e i the r on 
the i r own s e r v e r s o r on a ho s t ed ins t anc e - and e xpe r iment wi th 
how ARI wo r k s . 
The s andbo x a l l ows y ou t o e xpe r iment wi th ARI and PHPARI , 
wi thout a ne ed t o a c tua l l y s t a r t c oding the ent i r e s t a s i s 
appl i c a t ion, but a c tua l l y e xpe r iment ins ide s e l f c ont a ined c ode 
snippe t s - v e r y much l i k e tha t J a v a s c r ipt t o o l s on the ne t .
Check out our Hackathon Project 
Check it out (and vote for it) at: 
http://astriconhackathon.challengepost.com/submissions/28 
916-asterisk-ari-sandbox
Thank You 
CONTACT ME AT: 
Eric.Klein@greenfieldtech.net 
www.greenfieldtech.net

More Related Content

What's hot

Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PROIDEA
 
Ce Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database ServersCe Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database Servers
Kislaychd
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
Symantec Italia
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
Brenton Mallen
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
ijsrd.com
 
News Bytes
News BytesNews Bytes
News Bytes
Megha Sahu
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
Trend Micro
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
Team Firefly
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a ride
Roen Branham
 
Botnet
Botnet Botnet
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
Yury Chemerkin
 
The software-security-risk-report
The software-security-risk-reportThe software-security-risk-report
The software-security-risk-report
Комсс Файквэе
 
Botnet
BotnetBotnet
Botnet
lokenra
 
Hack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserHack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the User
New Horizons Bulgaria
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
Sweta Leena Panda
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
padmeshagrekar
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
F-Secure Corporation
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
Bini Bs
 

What's hot (20)

Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
PLNOG 9: Paweł Wachelka - Network protection against DoS/DDoS attacks
 
Ce Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database ServersCe Hv6 Module 42 Hacking Database Servers
Ce Hv6 Module 42 Hacking Database Servers
 
Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010Spam and Phishing Report - Marzo 2010
Spam and Phishing Report - Marzo 2010
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
News Bytes
News BytesNews Bytes
News Bytes
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a ride
 
Botnet
Botnet Botnet
Botnet
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
 
The software-security-risk-report
The software-security-risk-reportThe software-security-risk-report
The software-security-risk-report
 
Botnet
BotnetBotnet
Botnet
 
Hack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserHack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the User
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Study on Botnet Architecture
Study on Botnet ArchitectureStudy on Botnet Architecture
Study on Botnet Architecture
 

Viewers also liked

Buenas prácticas para pequeños/medianos operadores de telefonía basados en Op...
Buenas prácticas para pequeños/medianos operadores de telefonía basados en Op...Buenas prácticas para pequeños/medianos operadores de telefonía basados en Op...
Buenas prácticas para pequeños/medianos operadores de telefonía basados en Op...
PaloSanto Solutions
 
VtigerCRMのasterisk連携
VtigerCRMのasterisk連携VtigerCRMのasterisk連携
VtigerCRMのasterisk連携
Shuichi Menrai
 
インタークラウドにおけるAsteriskの活用
インタークラウドにおけるAsteriskの活用インタークラウドにおけるAsteriskの活用
インタークラウドにおけるAsteriskの活用
Shuichi Menrai
 
第一回VtigerCRM勉強会
第一回VtigerCRM勉強会第一回VtigerCRM勉強会
第一回VtigerCRM勉強会
Shuichi Menrai
 
Running Asterisk on virtualized environments
Running Asterisk on virtualized environmentsRunning Asterisk on virtualized environments
Running Asterisk on virtualized environments
Saúl Ibarra Corretgé
 
Plug development
Plug developmentPlug development
Plug development
mitchello44
 
360º leadership
360º leadership360º leadership
360º leadership
Xavier Roca Torruella
 
Raport aktywności na facebooku Maj 2011
Raport aktywności na facebooku Maj 2011Raport aktywności na facebooku Maj 2011
Raport aktywności na facebooku Maj 2011NapoleonCat.com
 
Lab 1: Generating document-style reports
Lab 1: Generating document-style reportsLab 1: Generating document-style reports
Lab 1: Generating document-style reports
IBM Rational software
 
ΕΡΓΑΣΙΑ ΜΑΘΗΤΩΝ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΙΣΤΟΡΙΑΣ -ΥΠΕΥΘΥΝΗ ΚΑΘΗΓΗΤΡΙΑ ΖΑΡΚΟΓΙΑΝΝΗ ΕΥΑ
ΕΡΓΑΣΙΑ ΜΑΘΗΤΩΝ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΙΣΤΟΡΙΑΣ -ΥΠΕΥΘΥΝΗ ΚΑΘΗΓΗΤΡΙΑ ΖΑΡΚΟΓΙΑΝΝΗ ΕΥΑΕΡΓΑΣΙΑ ΜΑΘΗΤΩΝ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΙΣΤΟΡΙΑΣ -ΥΠΕΥΘΥΝΗ ΚΑΘΗΓΗΤΡΙΑ ΖΑΡΚΟΓΙΑΝΝΗ ΕΥΑ
ΕΡΓΑΣΙΑ ΜΑΘΗΤΩΝ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΙΣΤΟΡΙΑΣ -ΥΠΕΥΘΥΝΗ ΚΑΘΗΓΗΤΡΙΑ ΖΑΡΚΟΓΙΑΝΝΗ ΕΥΑΕύα Ζαρκογιάννη
 
Tweetup Polska - blogi na Twitterze
Tweetup Polska - blogi na TwitterzeTweetup Polska - blogi na Twitterze
Tweetup Polska - blogi na Twitterze
NapoleonCat.com
 
Dez1
Dez1Dez1
Product Overview Hex New Jenny
Product Overview Hex New JennyProduct Overview Hex New Jenny
Product Overview Hex New Jenny
jaguilar1018
 
Kυβερνείο - Παλατάκι - Μνημεία Θεσσαλονίκης
Kυβερνείο - Παλατάκι - Μνημεία ΘεσσαλονίκηςKυβερνείο - Παλατάκι - Μνημεία Θεσσαλονίκης
Kυβερνείο - Παλατάκι - Μνημεία ΘεσσαλονίκηςΕύα Ζαρκογιάννη
 
Installation of EM 12c
Installation of EM 12cInstallation of EM 12c
Installation of EM 12c
Jon Petter Hjulstad
 
Istanbul Declaration, 3 Nov 2010
Istanbul Declaration, 3 Nov 2010Istanbul Declaration, 3 Nov 2010
Istanbul Declaration, 3 Nov 2010
Jerry_Nombri_Garry
 
Five tips for improving the ROI of your software investments
Five tips for improving the ROI of your software investmentsFive tips for improving the ROI of your software investments
Five tips for improving the ROI of your software investments
IBM Rational software
 
真5 -伊甸園的故事
真5 -伊甸園的故事真5 -伊甸園的故事
真5 -伊甸園的故事childrenmeeting
 
Agency1 full keynote_22_07_13
Agency1 full keynote_22_07_13Agency1 full keynote_22_07_13
Agency1 full keynote_22_07_13Sergey Vorobyov
 

Viewers also liked (20)

Buenas prácticas para pequeños/medianos operadores de telefonía basados en Op...
Buenas prácticas para pequeños/medianos operadores de telefonía basados en Op...Buenas prácticas para pequeños/medianos operadores de telefonía basados en Op...
Buenas prácticas para pequeños/medianos operadores de telefonía basados en Op...
 
VtigerCRMのasterisk連携
VtigerCRMのasterisk連携VtigerCRMのasterisk連携
VtigerCRMのasterisk連携
 
インタークラウドにおけるAsteriskの活用
インタークラウドにおけるAsteriskの活用インタークラウドにおけるAsteriskの活用
インタークラウドにおけるAsteriskの活用
 
第一回VtigerCRM勉強会
第一回VtigerCRM勉強会第一回VtigerCRM勉強会
第一回VtigerCRM勉強会
 
Running Asterisk on virtualized environments
Running Asterisk on virtualized environmentsRunning Asterisk on virtualized environments
Running Asterisk on virtualized environments
 
Plug development
Plug developmentPlug development
Plug development
 
360º leadership
360º leadership360º leadership
360º leadership
 
Raport aktywności na facebooku Maj 2011
Raport aktywności na facebooku Maj 2011Raport aktywności na facebooku Maj 2011
Raport aktywności na facebooku Maj 2011
 
Lab 1: Generating document-style reports
Lab 1: Generating document-style reportsLab 1: Generating document-style reports
Lab 1: Generating document-style reports
 
ΕΡΓΑΣΙΑ ΜΑΘΗΤΩΝ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΙΣΤΟΡΙΑΣ -ΥΠΕΥΘΥΝΗ ΚΑΘΗΓΗΤΡΙΑ ΖΑΡΚΟΓΙΑΝΝΗ ΕΥΑ
ΕΡΓΑΣΙΑ ΜΑΘΗΤΩΝ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΙΣΤΟΡΙΑΣ -ΥΠΕΥΘΥΝΗ ΚΑΘΗΓΗΤΡΙΑ ΖΑΡΚΟΓΙΑΝΝΗ ΕΥΑΕΡΓΑΣΙΑ ΜΑΘΗΤΩΝ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΙΣΤΟΡΙΑΣ -ΥΠΕΥΘΥΝΗ ΚΑΘΗΓΗΤΡΙΑ ΖΑΡΚΟΓΙΑΝΝΗ ΕΥΑ
ΕΡΓΑΣΙΑ ΜΑΘΗΤΩΝ ΣΤΟ ΜΑΘΗΜΑ ΤΗΣ ΙΣΤΟΡΙΑΣ -ΥΠΕΥΘΥΝΗ ΚΑΘΗΓΗΤΡΙΑ ΖΑΡΚΟΓΙΑΝΝΗ ΕΥΑ
 
Tweetup Polska - blogi na Twitterze
Tweetup Polska - blogi na TwitterzeTweetup Polska - blogi na Twitterze
Tweetup Polska - blogi na Twitterze
 
Dez1
Dez1Dez1
Dez1
 
Product Overview Hex New Jenny
Product Overview Hex New JennyProduct Overview Hex New Jenny
Product Overview Hex New Jenny
 
Kυβερνείο - Παλατάκι - Μνημεία Θεσσαλονίκης
Kυβερνείο - Παλατάκι - Μνημεία ΘεσσαλονίκηςKυβερνείο - Παλατάκι - Μνημεία Θεσσαλονίκης
Kυβερνείο - Παλατάκι - Μνημεία Θεσσαλονίκης
 
Installation of EM 12c
Installation of EM 12cInstallation of EM 12c
Installation of EM 12c
 
Istanbul Declaration, 3 Nov 2010
Istanbul Declaration, 3 Nov 2010Istanbul Declaration, 3 Nov 2010
Istanbul Declaration, 3 Nov 2010
 
Rotational motion
Rotational motionRotational motion
Rotational motion
 
Five tips for improving the ROI of your software investments
Five tips for improving the ROI of your software investmentsFive tips for improving the ROI of your software investments
Five tips for improving the ROI of your software investments
 
真5 -伊甸園的故事
真5 -伊甸園的故事真5 -伊甸園的故事
真5 -伊甸園的故事
 
Agency1 full keynote_22_07_13
Agency1 full keynote_22_07_13Agency1 full keynote_22_07_13
Agency1 full keynote_22_07_13
 

Similar to Making your Asterisk System Secure

The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
 
Secure your Voice over IP (VoIP)
Secure your Voice over IP (VoIP)Secure your Voice over IP (VoIP)
Secure your Voice over IP (VoIP)
Techso
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
Karwan Mustafa Kareem
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
Eric Klein
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
Priyanka Aash
 
The_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdfThe_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdf
manthanpandit1
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Tyler Shields
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
Get up to Speed
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
TomParker
 
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PROIDEA
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
Al Ewers
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
GaytriDhingra1
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
Felipe Prado
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
MAXfocus
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud
2600Hz
 

Similar to Making your Asterisk System Secure (20)

The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Secure your Voice over IP (VoIP)
Secure your Voice over IP (VoIP)Secure your Voice over IP (VoIP)
Secure your Voice over IP (VoIP)
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
The_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdfThe_SIMbox_fraud_survey.pdf
The_SIMbox_fraud_survey.pdf
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud2600Hz - Detecting and Managing VoIP Fraud
2600Hz - Detecting and Managing VoIP Fraud
 

More from Digium

AstriCon 2017 Recap
AstriCon 2017 RecapAstriCon 2017 Recap
AstriCon 2017 Recap
Digium
 
MegaFreight - South Africa’s largest independent freight forwarder
MegaFreight - South Africa’s largest independent freight forwarderMegaFreight - South Africa’s largest independent freight forwarder
MegaFreight - South Africa’s largest independent freight forwarder
Digium
 
Becker School District
Becker School DistrictBecker School District
Becker School District
Digium
 
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, MiamiiDanny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Digium
 
AstriCon 2014 keynote: Russell Bryant
AstriCon 2014 keynote: Russell BryantAstriCon 2014 keynote: Russell Bryant
AstriCon 2014 keynote: Russell Bryant
Digium
 
Distribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPSDistribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPS
Digium
 
Getting the best out of WebRTC
Getting the best out of WebRTCGetting the best out of WebRTC
Getting the best out of WebRTC
Digium
 
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Digium
 
Scaling FastAGI Applications with Go
Scaling FastAGI Applications with GoScaling FastAGI Applications with Go
Scaling FastAGI Applications with Go
Digium
 
WebRTC: The Big Debate, Shut Up and Build Something
WebRTC: The Big Debate, Shut Up and Build SomethingWebRTC: The Big Debate, Shut Up and Build Something
WebRTC: The Big Debate, Shut Up and Build Something
Digium
 
Connecting Non-SIP IP Camera to Your PBX
Connecting Non-SIP IP Camera to Your PBXConnecting Non-SIP IP Camera to Your PBX
Connecting Non-SIP IP Camera to Your PBX
Digium
 
The Past and Future of VoIP
The Past and Future of VoIPThe Past and Future of VoIP
The Past and Future of VoIP
Digium
 
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Digium
 
More than a phone system. A better way to communicate.
More than a phone system. A better way to communicate.More than a phone system. A better way to communicate.
More than a phone system. A better way to communicate.
Digium
 
Real Success Stories from IT Heroes
Real Success Stories from IT HeroesReal Success Stories from IT Heroes
Real Success Stories from IT Heroes
Digium
 
Smart Deductions for Small Business
Smart Deductions for Small BusinessSmart Deductions for Small Business
Smart Deductions for Small Business
Digium
 
How to Build Your Brand with UC
How to Build Your Brand with UCHow to Build Your Brand with UC
How to Build Your Brand with UC
Digium
 
6 Ways a New Phone System can make your Life Easier
6 Ways a New Phone System can make your Life Easier6 Ways a New Phone System can make your Life Easier
6 Ways a New Phone System can make your Life Easier
Digium
 
Security Strategies for UC
Security Strategies for UCSecurity Strategies for UC
Security Strategies for UC
Digium
 
Switchvox - The Best Value in Unified Communications
Switchvox - The Best Value in Unified CommunicationsSwitchvox - The Best Value in Unified Communications
Switchvox - The Best Value in Unified Communications
Digium
 

More from Digium (20)

AstriCon 2017 Recap
AstriCon 2017 RecapAstriCon 2017 Recap
AstriCon 2017 Recap
 
MegaFreight - South Africa’s largest independent freight forwarder
MegaFreight - South Africa’s largest independent freight forwarderMegaFreight - South Africa’s largest independent freight forwarder
MegaFreight - South Africa’s largest independent freight forwarder
 
Becker School District
Becker School DistrictBecker School District
Becker School District
 
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, MiamiiDanny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
Danny Windham, Digium CEO, Keynote address - ITEXPO East 2015, Miamii
 
AstriCon 2014 keynote: Russell Bryant
AstriCon 2014 keynote: Russell BryantAstriCon 2014 keynote: Russell Bryant
AstriCon 2014 keynote: Russell Bryant
 
Distribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPSDistribution, redundancy and high availability using OpenSIPS
Distribution, redundancy and high availability using OpenSIPS
 
Getting the best out of WebRTC
Getting the best out of WebRTCGetting the best out of WebRTC
Getting the best out of WebRTC
 
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
Automatic Configuration Management for Kamailio and Asterisk in the era of Pu...
 
Scaling FastAGI Applications with Go
Scaling FastAGI Applications with GoScaling FastAGI Applications with Go
Scaling FastAGI Applications with Go
 
WebRTC: The Big Debate, Shut Up and Build Something
WebRTC: The Big Debate, Shut Up and Build SomethingWebRTC: The Big Debate, Shut Up and Build Something
WebRTC: The Big Debate, Shut Up and Build Something
 
Connecting Non-SIP IP Camera to Your PBX
Connecting Non-SIP IP Camera to Your PBXConnecting Non-SIP IP Camera to Your PBX
Connecting Non-SIP IP Camera to Your PBX
 
The Past and Future of VoIP
The Past and Future of VoIPThe Past and Future of VoIP
The Past and Future of VoIP
 
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
Developing an ivr payment system with asterisk (astricon 2014 las vegas nevada)
 
More than a phone system. A better way to communicate.
More than a phone system. A better way to communicate.More than a phone system. A better way to communicate.
More than a phone system. A better way to communicate.
 
Real Success Stories from IT Heroes
Real Success Stories from IT HeroesReal Success Stories from IT Heroes
Real Success Stories from IT Heroes
 
Smart Deductions for Small Business
Smart Deductions for Small BusinessSmart Deductions for Small Business
Smart Deductions for Small Business
 
How to Build Your Brand with UC
How to Build Your Brand with UCHow to Build Your Brand with UC
How to Build Your Brand with UC
 
6 Ways a New Phone System can make your Life Easier
6 Ways a New Phone System can make your Life Easier6 Ways a New Phone System can make your Life Easier
6 Ways a New Phone System can make your Life Easier
 
Security Strategies for UC
Security Strategies for UCSecurity Strategies for UC
Security Strategies for UC
 
Switchvox - The Best Value in Unified Communications
Switchvox - The Best Value in Unified CommunicationsSwitchvox - The Best Value in Unified Communications
Switchvox - The Best Value in Unified Communications
 

Recently uploaded

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 

Recently uploaded (20)

Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 

Making your Asterisk System Secure

  • 1. Making your Asterisk System Secure Who is out there looking to attack your PBX? How do they find it? How can you protect your PBX PRESENT BY: ERIC KLEIN SR. CONSUL TANT
  • 2. /home/ericlklein/.finger • NEW GRANDFATHER (PICTURES UPON REQUEST) • VOIP FRAUD PREVENTION EVANGELIST • STARTUP ADVISOR AND ENTHUSIAST • AUTHOR, BLOGGER FOR TECHNOLOGY AND TRAVEL • AMATEUR PHOTOGRAPHER AND CHEF
  • 3. Ok, just 1 picture
  • 4. 2013 GLOBAL FRAUD SURVEY RESULTS
  • 5. CFCA Global Fraud Key Findings Global Fraud Loss:  2011 $40.1 Billion (USD) annually  2013 $46.3 Billion (USD) annually Top Fraud types 2011  Compromised PBX/Voicemail $4.96 Billion  Internal/Employee Theft $1.44 Billion Source: www.cfca.org/fraudlosssurvey/ The 15% increase from 2011 is a result of increased fraudulent activity targeting the wireless industry. 2013 $10.03 Billion $2.53 Billion *Notes:  In 2011 the Global Fraud Loss Estimate was recalibrated to include the sizes of the CSPs being surveyed.  In 2013 fraud classifications were divided into methods and type categories
  • 8. How it Works Hackers sign up to lease premium-rate phone numbers, often used for sexual-chat or psychic lines, from one of dozens of web-based services that charge dialers over $1 a minute and give the lessee a cut. In the United States, premium-rate numbers are easily identified by 1-900 prefixes, and callers are informed they will be charged higher rates. But elsewhere, like in Latvia and Estonia, they can be trickier to spot. The payout to the lessees can be as high as 24 cents for every minute spent on the phone. Hackers then break into a business’s phone system and make calls through it to their premium number, typically over a weekend, when nobody is there to notice. With high-speed computers, they can make hundreds of calls simultaneously, forwarding as many as 220 minutes’ worth of phone calls a minute to the pay line. The hacker gets a cut of the charges, typically delivered through a Western Union, MoneyGram or wire transfer. In part because the plan is so profitable, premium rate number resellers are multiplying rapidly. There were 17 in 2009; last year there were 85 www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html
  • 10. Who is Responsible for Losses from Hacks? In almost all cases the customer is contractually responsible for losses from a hacked system. Major carriers have sophisticated fraud systems in place to catch hackers before they run up false six-figure charges, and they can afford to credit customers for millions of fraudulent charges every year. But small businesses often use local carriers, which lack such antifraud systems. And some of those carriers are leaving customers to foot the bill.
  • 11. Rare exception: Frip Finishing vs. Voiceflex Frip Finishing of Leicestershire was hacked over Halloween weekend of October 2011 Internet hackers infiltrated Frip’s PBX and made 10,366 calls international phone card calls creating a bill of £35,000 – most to a premium telephone number in Poland Judge David Grant rejected arguments the company had failed to adequately maintain the security of its. On the court’s interpretation of the contract, Frip was only obliged to pay for calls that it had actually made. http://commsbusiness.co.uk/features/halloween-bill-shocker/
  • 12. Phone Hackers Dial and Redial to Steal Billions In a weekend last March Foreman Seeley Fountain Architecture, (in Norcross, Ga.) was hack for $166,000 worth of calls to premium- rate telephone numbers in Gambia, Somalia and the Maldives. www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html
  • 13. Need to Change the Laws The law is not much help, because no regulations require carriers to reimburse customers for fraud the way credit card companies must. Lawmakers have taken the issue up from time to time, but little progress has been made.
  • 15. Something New Has Started Mysterious fake mobile phone towers discovered across America could be listening in on unsuspecting callers. They were discovered by people using a heavily customised Android device called the CryptoPhone 500. "They can listen to all of your voice calls and they can grab all of your text” said Buzz Bruner of EDS America. Sources: http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls http://www.myfoxdc.com/story/26610194/tech-company-finds-mysterious-fake-cell-towers-in-dc-area
  • 16. Detected in Many Locations During a road trip from Florida to North Carolina and he found eight different interceptors on that trip. After publication an interceptor was detected near the vicinity of South Point Casino in Las Vegas. Several of the masts were situated near US military bases. he towers are located near the White House, the United States Capitol and the Supreme Court. "Whose interceptor is it? Who are they, that's listening to calls around military bases? Is it just the US military, or are they foreign governments doing it? The point is: we don't really know whose they are.“ - Les Goldsmith, chief executive of security firm ESD America
  • 17. Detection is Hard “If you've been intercepted, in some cases it might show at the top that you've been forced from 4G down to 2G. But a decent interceptor won't show that,” says Goldsmith. “It'll be set up to show you [falsely] that you're still on 4G. You'll think that you're on 4G, but you're actually being forced back to 2G.” Some devices can not only capture calls and texts, but even actively control the phone and send spoof texts.
  • 19. More Examples from Shodan Remember that last year someone in the room was able to hack a Polycom phone within 30 sec of it being displayed via Shodan page – Default Passwords are a problem.
  • 21. Take the updated Asterisk Advanced Class for the basics. Asterisk Security Considerations
  • 22. Copyright © 2014 Digium, The Asterisk Company 22 Goals • Security overview • Survey of common threats • Layer-by-layer security and best practice suggestions – physical – OS – network – Asterisk – SIP – dialplan • Resources
  • 23. Look at the Asterisk Wiki
  • 24. Asterisk Security Framework Article by Malcolm Davenport Attacks on Voice over IP networks are becoming increasingly more common. It has become clear that we must do something within Asterisk to help mitigate these attacks. Through a number of discussions with groups of developers in the Asterisk community, the general consensus is that the best thing that we can do within Asterisk is to build a framework which recognizes and reports events that could potentially have security implications. Discussion has subpages for:  Security Framework Overview  Security Event Generation  Asterisk Security Event Logger  Security Events to Log  Security Log File Format https://wiki.asterisk.org/wiki/display/AST/Asterisk+Security+Framework
  • 25. Secure Calling Specifics Article by Malcolm Davenport Asterisk supports a channel-agnostic method for handling secure call requirements. Since there is no single meaning of what constitutes a "secure call," Asterisk allows the administrator the control to define "secure" for themselves via the dialplan and channel-specific configuration files. Article includes explanations and examples for:  Channel-specific configuration  Security-based dialplan branching  Forcing bridged channels to be secure https://wiki.asterisk.org/wiki/display/AST/Secure+Calling+Specifics
  • 26. Secure Calling Tutorial Original tutorial by Malcolm Davenport, last modified by Rusty Newton Transport Layer Security (TLS) provides encryption for call signaling. (1.8 and above) Tutorial outline:  Overview  Part 1 (TLS) Keys The Asterisk SIP configuration Configuring a TLS-enabled SIP peer within Asterisk Configuring a TLS-enabled SIP client to talk to Asterisk Problems with server verification  Part 2 (SRTP) https://wiki.asterisk.org/wiki/display/AST/Secure+Calling+Tutorial
  • 27. Pay Attention to Vendor Warnings
  • 28. FreePBX Very good at notifying of potential problems and regular updates: Pay attention to the FreePBX dashboard for update notifications  Critical FreePBX RCE Vulnerability (ALL Versions) We have been made aware of a critical Zero-Day Remote Code Execution and Privilege Escalation exploit within the legacy “FreePBX ARI Framework module/Asterisk Recording Interface (ARI)”. This affects any user who has installed FreePBX prior to version 12, and users who have updated to FreePBX 12 from a prior version and did not remove the legacy FreePBX ARI Framework module. http://www.freepbx.org/node/92822
  • 29. Watch out for OS Level Alerts Shellshock on Shellshock, also known as Bashdoor, is a family of security bugs (with 6 CVE's filed at the time of this page) in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014. Many Internet daemons, such as web servers, use Bash to process certain commands, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system. http://wiki.centos.org/Security/Shellshock
  • 30. Protect Your System Watch for and install regular updates Do not ignore the OS updates and fixes – Run Yum update at least quarterly. Always change the default user names and passwords Keep up on the news and new attacks – Inside fraud and Phishing will remain big problems for years to come.
  • 31. VoIP Security Products ONES TO LOOK AT AND SEE WHAT BEST FITS YOUR NEEDS
  • 32. Regular Firewall Palo Alto firewalls have known problems with SIP and SIP ALG, calls can complete but no audio (media channel). Checkpoint Firewalls work fine with SIP. Fail2Ban can still cause additional problems with triggering massive whois processes that take a lot of CPU resources. (Need to kill PID for the process – sometimes you need to kill multiple PIDs).
  • 33. Single PBX or Phone Level New products have come out in the past few years to protect SIP at the phone or enterprise PBX level. Coordinate the install with your ITSP, as there may be configuration issues to be managed (ports to open, NAT, etc.).
  • 34. SIP Threat Manager STM is installed in front of any SIP based PBX or gateway offering several layers of security against numerous types of attacks. Block specific IPs or countries, protect your PBX against hackers trying user names and passwords, someone is trying to flood your PBX with a DDos attacks? No problem! Using the SNORT based Real Time Deep packet inspection engine, our STM analyzes each SIP packet going to your phone system, identifies the malicious and abnormal ones blocking the originating IP.
  • 35. Firewall Example from Allo On Youtube: http://www.youtube.com/watch?v=iEwfH5j9ZfE
  • 36. μFirewall Using a revolutionary, patent pending process, it identifies and prevents toll fraud on a premise-based IP PBX before it happens:  Analyzes SIP packets through deep packet inspection  Stops abnormal SIP protocol usage based on pre-determined parameters  Prevents SIP denial-of-service attacks  Quietly drops malicious SIP packets rather than responding with an error to help prevent continued attacks  Neutralizes SIP attacks while they are occurring rather than identifying attacks after the fact
  • 37. PHPARI ARI i s a mind bl owing jump f o r t r adi t i ona l a s t e r i s k int e g r a t o r s . Our obj e c t i v e i s t o c r e a t e a s impl e onl ine eng ine , tha t wi l l a l l ow f o r p e op l e t o de v e l op sho r t s t a s i s /ARI a p p l i c a t i ons , e i the r on the i r own s e r v e r s o r on a ho s t ed ins t anc e - and e xpe r iment wi th how ARI wo r k s . The s andbo x a l l ows y ou t o e xpe r iment wi th ARI and PHPARI , wi thout a ne ed t o a c tua l l y s t a r t c oding the ent i r e s t a s i s appl i c a t ion, but a c tua l l y e xpe r iment ins ide s e l f c ont a ined c ode snippe t s - v e r y much l i k e tha t J a v a s c r ipt t o o l s on the ne t .
  • 38. Check out our Hackathon Project Check it out (and vote for it) at: http://astriconhackathon.challengepost.com/submissions/28 916-asterisk-ari-sandbox
  • 39. Thank You CONTACT ME AT: Eric.Klein@greenfieldtech.net www.greenfieldtech.net

Editor's Notes

  1. Over the past few years Eric has shown that telecom fraud is a growing problem, and basic fixes for protecting your (and your customers) PBX. This time he will show the basic configuration considerations that you can take to protect a PBX. Come to this session to find out: Who is out there looking to attack your PBX? How do they find it? How can you protect your PBX
  2. 21
  3. * Layer-by-layer security and best practice suggestions ;; physical, OS, network, Asterisk, SIP, dialplan
  4. Palo Alto link https://live.paloaltonetworks.com/docs/DOC-6214