SlideShare a Scribd company logo
Security Art | August 2011




       Sounds Like Botnet
Itzik Kotler, Chief Technology Officer
Iftach Ian Amit, VP Consulting




                                         www.security-art.com
Intro to VoIP
• It’s everywhere
  – Home (Vonage, Skype, TeamSpeak, Comcast,
    etc…)
  – Office (Cisco, Avaya, Lucent, Asterisk, etc…)
• Easy to deploy
  – Most are “plug and talk” with fancy web interfaces
    to configure features such as voicemail,
    forwarding, conference calls, etc…
Overview of SIP
• Request/Response model
• Responsible for setup/teardown of
  voice/video calls
• Designed to allow “piercing” of firewalls, NAT,
  etc…
• Security? meh… (basic identification, usually
  not required in most PBXs, easily sniffed…)
VoIP as a Getaway Car
• So… VoIP can traverse firewalls easily
• And can go outside the corporate network
  over PSTN lines (no internetz needed…)
• And is rarely monitored (“can you hear me
  now” ain’t gonna pass through the DLP…)
• EXFILTRATE!
What is a VoIP Botnet
•   Take your good ol’e botnet
•   Disconnect all C&C channels
•   Replace with VoIP
•   Profit?

• Fully mobilized (NAT piercing)
• Looks more legit (try to pick THAT out of the
  traffic)
• Harder to peek into (can you spell “whazzzzup?”
  in RTP?)
Who Needs a VoIP Botnet
• Well, everyone…

• Botmaster is more mobile (literally)
• More anonymous C&C servers (conf call bridge
  numbers are aplenty…)
• Can actually transfer fair amounts of data
  back/forth (remember the modem days?)
• It’s starting to show up as alternative methods of
  covert communications
   – Sorry spooks… 
VoIP Botnet in Action
• Red Team Penetration Testing Engagement
• Botnet in No Internet/Closed Networks
• Botnet for VoIP Phones
VoIP Botnet Architecture
• Telephony systems allows both Unicast and
  Multicast communication
• Unicast:
  – Bot calls Bot Master
  – Bot Master calls Bot (registered ext. on his PBX)
• Multicast:
  – Bot A calls Conference Call
  – Bot B calls Conference Call
  – Bot Master joins Conference Call
VoIP Botnet Architecture
• Conference Call as “IRC Channel”

        Bot


                                       Bot
  Bot               Conference Call
                                      Master


              Bot
The Call
• Calling can be made via TCP/IP or PSTN

                      Bot/Bot Master




    PSTN/VoIP Trunk                     TCP/IP (SIP, H.323,…)




                      Conference Call
Moshi Moshi
• Open-source VoIP Bot written in Python
  – Uses SIP as VoIP Protocol
  – Uses Text-to-speech Engines for Output
  – Uses DTMF Tones for Input


• Download your copy at:
  – http://code.google.com/p/moshimoshi/
Press 1 to Continue in l33t Speak
• DTMF (Dual-tone multi-frequency signaling)
  are used for signaling over telephone lines in
  the voice-frequency band between telephone
  handsets and other devices and switching
  centers.
• DTMF tones are standardized and can be sent
  and received from any phone
Asterisk as C&C and DTMF
• Asterisk is free software that transforms a
  computer into a communication server
• We’re using AsteriskNow 1.7.1 Linux Distribution
• MeetMe is a conference bridge for Asterisk
  and supports passing DTMF through the
  conference.
• To pass DTMF through the conference add ‘F’
  option to MEETME_OPTS at extensions.conf
DTMF Pass through/Relaying
• Conf. Call to relay DTMF to other calls

                                                Bot A

                                          Bot A: Heard 1#
           Pressed 1#
   Bot
                        Conference Call         Bot B
  Master

                                          Bot B: Heard 1#

                                                Bot C

                                          Bot C: Heard 1#
DTMF Tones as C&C
• The (made-up) Rules
  – ‘*’ is End of Line (EOL)
  – ‘#’ is a delimiter (i.e. Space)
• Examples
  – ‘0#*’ invoke command 0 without arguments
  – ‘1#123#*’ invoke command 1 with one arg ‘123’
  – ‘2#1#2#*’ invoke command 2 with args ‘1’ and ‘2’
• It’s your rules – go wild…
Ring, Ring!
Text-to-Speech as Data Leakage
• It's only natural that since we don’t have visuals
  in phone conversation, to use voice
• Passwords, documents, settings and
  acknowledgements can all be read back
• Some systems (Mac, Windows) includes built-in
  Text-to-Speech engines, others requires
  installation
• External utilities can be used to convert different
  formats (e.g. Microsoft Word) into simpler text
  files
Talk to me… Woo hoo!
The Getaway: Modulation
• Take any arbitrary binary data
• Devise a way to transform bytes to sounds
  – PoC: every ½ byte  one of 16 octaves within the
    human audible range (~200Hz - ~2000Hz)
• Record each ½ byte octave
  – PoC uses ½ second tones (for legibility in a
    conference )
• Music to my ears…
Demo: Binary Data Modulation -> Data
             Exfiltration
• Transform data to sound

• Dial, leave a message…

• Transform recorded message to data

• Profit?
ET Phone Home!
VoIP as VPN
• Alternative unmonitored Internet access
  – No DLP
  – No Firewalls
  – No IDS/IPS/DPI
• Allows using already-existing C&C protocols
  – IRC
  – HTTP
• Bot Master can easily explore his Botnet
  – nmap –sS 10.0.0.0/8
TCP/IP over VoIP
• Bring back Modems to the game
• Use V.42/HDLC/PPP protocols
                      • Works with Hardware Modems
       TCP
                      • Works with Software Modems
        IP
                      • Works within Voice frequency band
   V.42/HDLC/PPP
                      • Works under poor connectivity conditions
     SIP/RTSP
                      • Two-way communication channel
       UDP
        IP
Did You Hear That?
• VoIP Botnets are as good and even better in
  some cases, than IRC, P2P, and HTTP Botnets.
• VoIP Botnets strengths:
  – Can be operated from a payphone, or a Mobile.
  – Can be accessed from both PSTN and Internet
  – Are not blocked by your typical IDS/IPS signatures
Countermeasures
• Separate VoIP from Corporate Network
  – Yes, COMPLETELY!
• Monitor VoIP Activity
  – It’s your data. Same as you do for web/emails…
• Consider whitelisting Conf. Call Numbers
The Future Sound of Botnets
• Hearing is Believing
  – Speech-to-Text as Input
• Going Mobile
  – Text-to-SMS as Output
  – SMS-to-Voice Calls as Input
• Meeting new Appliances
  – T.38 (Fax) as Output (e.g. “Screen Shots”)
• Meeting old Appliances
  – Modem (PPP) as Input/Output (e.g. “Internal VPN”)
Questions?

Itzik Kotler (itzik.kotler@security-art.com)
Iftach Ian Amit (iamit@security-art.com)
Thanks!

Itzik Kotler (Twitter: @itzikkotler)
Iftach Ian Amit (Twitter: @iiamit)

More Related Content

What's hot

Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
Chris McAndrew
 
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIDevelop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Enablex io
 
Vo ip
Vo ipVo ip
Fortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIPFortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIP
Suministros Obras y Sistemas
 
Polycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheetPolycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheet
best4systems
 
Designing Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource BoardsDesigning Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource Boards
Videoguy
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Living Online
 
Matrix vision presentation
Matrix vision presentationMatrix vision presentation
Matrix vision presentation
matrixtelesol
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
ThousandEyes
 
Pi Is For Python
Pi Is For PythonPi Is For Python
Pi Is For Python
Brad Fortner
 
Voip In College
Voip In CollegeVoip In College
voip gateway
 voip gateway voip gateway
voip gateway
Nayomi Ranamuka
 
Pbx Presentation V021
Pbx Presentation V021Pbx Presentation V021
Pbx Presentation V021
nicklacey
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
Er Aadarsh Srivastava
 
Voip
VoipVoip
Voip
Abd17m
 
DTMF-project
DTMF-projectDTMF-project
DTMF-project
Abdelrahman Elewah
 
IPv6: A Digital Game Changer
IPv6: A Digital Game ChangerIPv6: A Digital Game Changer
IPv6: A Digital Game Changer
CARLOS RALLI-UCENDO
 
Audio conferencing
Audio conferencingAudio conferencing
Audio conferencing
Grand Stream India
 
small production house
small production house small production house
small production house
Elmohanad Karoum
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
Zack Chou
 

What's hot (20)

Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIDevelop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
 
Vo ip
Vo ipVo ip
Vo ip
 
Fortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIPFortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIP
 
Polycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheetPolycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheet
 
Designing Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource BoardsDesigning Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource Boards
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
Matrix vision presentation
Matrix vision presentationMatrix vision presentation
Matrix vision presentation
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
 
Pi Is For Python
Pi Is For PythonPi Is For Python
Pi Is For Python
 
Voip In College
Voip In CollegeVoip In College
Voip In College
 
voip gateway
 voip gateway voip gateway
voip gateway
 
Pbx Presentation V021
Pbx Presentation V021Pbx Presentation V021
Pbx Presentation V021
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
Voip
VoipVoip
Voip
 
DTMF-project
DTMF-projectDTMF-project
DTMF-project
 
IPv6: A Digital Game Changer
IPv6: A Digital Game ChangerIPv6: A Digital Game Changer
IPv6: A Digital Game Changer
 
Audio conferencing
Audio conferencingAudio conferencing
Audio conferencing
 
small production house
small production house small production house
small production house
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
 

Viewers also liked

Cross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brandsCross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brands
diwakar sharma
 
Protecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and MalwareProtecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and Malware
Scott McDermott
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
Raja Kiran
 
Malware
MalwareMalware
Botnets
BotnetsBotnets
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
diwakar sharma
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Ronson Fernandes
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
karanwayne
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
Dasun Hegoda
 
Getting Started With bots
Getting Started With botsGetting Started With bots
Getting Started With bots
Gaurav sharma
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
Venafi
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
rubal_9
 
Bot and Botnet Taxonomy
Bot and Botnet TaxonomyBot and Botnet Taxonomy
Bot and Botnet Taxonomy
digitallibrary
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Network servers
Network serversNetwork servers
Network servers
Online
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

Viewers also liked (20)

Cross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brandsCross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brands
 
Protecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and MalwareProtecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and Malware
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Malware
MalwareMalware
Malware
 
Botnets
BotnetsBotnets
Botnets
 
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
Getting Started With bots
Getting Started With botsGetting Started With bots
Getting Started With bots
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Bot and Botnet Taxonomy
Bot and Botnet TaxonomyBot and Botnet Taxonomy
Bot and Botnet Taxonomy
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Network servers
Network serversNetwork servers
Network servers
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 

Similar to Sounds Like Botnet

Linux VOIP
Linux VOIP Linux VOIP
Linux VOIP
chanmyaeag
 
Voip introduction
Voip introductionVoip introduction
Voip introduction
daksh bhatt
 
VOIP security
VOIP securityVOIP security
VOIP security
Rohit Gurjar
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppt
hajAli4
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
Videoguy
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP
Kaushal Bhavsar
 
Fun with Linux Telephony
Fun with Linux TelephonyFun with Linux Telephony
Fun with Linux Telephony
Donald Burr
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
Ragheb Gmira
 
Gaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMECGaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMEC
Gaurav Kumar
 
[Carius] Skype Online, Teams, and PSTN
[Carius] Skype Online, Teams, and PSTN[Carius] Skype Online, Teams, and PSTN
[Carius] Skype Online, Teams, and PSTN
European Collaboration Summit
 
VOIP services
VOIP servicesVOIP services
VOIP services
Pankaj Saharan
 
Yeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationYeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configuration
Hossein Yavari
 
Asterisk
Asterisk Asterisk
Asterisk
m_esmat25
 
Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)
Aakura Pyakura
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius
 
Voip
Voip Voip
Voip
VoipVoip
Voip
VoipVoip
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
Abdullah Shah
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
Adebayo Ojo
 

Similar to Sounds Like Botnet (20)

Linux VOIP
Linux VOIP Linux VOIP
Linux VOIP
 
Voip introduction
Voip introductionVoip introduction
Voip introduction
 
VOIP security
VOIP securityVOIP security
VOIP security
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppt
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP
 
Fun with Linux Telephony
Fun with Linux TelephonyFun with Linux Telephony
Fun with Linux Telephony
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
 
Gaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMECGaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMEC
 
[Carius] Skype Online, Teams, and PSTN
[Carius] Skype Online, Teams, and PSTN[Carius] Skype Online, Teams, and PSTN
[Carius] Skype Online, Teams, and PSTN
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
Yeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationYeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configuration
 
Asterisk
Asterisk Asterisk
Asterisk
 
Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Voip
Voip Voip
Voip
 
Voip
VoipVoip
Voip
 
Voip
VoipVoip
Voip
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
 

More from Itzik Kotler

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
Itzik Kotler
 
Goodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationGoodbye Data, Hello Exfiltration
Goodbye Data, Hello Exfiltration
Itzik Kotler
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)
Itzik Kotler
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation Botnet
Itzik Kotler
 
The Day of the Updates
The Day of the UpdatesThe Day of the Updates
The Day of the Updates
Itzik Kotler
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0
Itzik Kotler
 

More from Itzik Kotler (6)

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
 
Goodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationGoodbye Data, Hello Exfiltration
Goodbye Data, Hello Exfiltration
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation Botnet
 
The Day of the Updates
The Day of the UpdatesThe Day of the Updates
The Day of the Updates
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0
 

Recently uploaded

Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 

Recently uploaded (20)

Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 

Sounds Like Botnet

  • 1. Security Art | August 2011 Sounds Like Botnet Itzik Kotler, Chief Technology Officer Iftach Ian Amit, VP Consulting www.security-art.com
  • 2. Intro to VoIP • It’s everywhere – Home (Vonage, Skype, TeamSpeak, Comcast, etc…) – Office (Cisco, Avaya, Lucent, Asterisk, etc…) • Easy to deploy – Most are “plug and talk” with fancy web interfaces to configure features such as voicemail, forwarding, conference calls, etc…
  • 3. Overview of SIP • Request/Response model • Responsible for setup/teardown of voice/video calls • Designed to allow “piercing” of firewalls, NAT, etc… • Security? meh… (basic identification, usually not required in most PBXs, easily sniffed…)
  • 4. VoIP as a Getaway Car • So… VoIP can traverse firewalls easily • And can go outside the corporate network over PSTN lines (no internetz needed…) • And is rarely monitored (“can you hear me now” ain’t gonna pass through the DLP…) • EXFILTRATE!
  • 5. What is a VoIP Botnet • Take your good ol’e botnet • Disconnect all C&C channels • Replace with VoIP • Profit? • Fully mobilized (NAT piercing) • Looks more legit (try to pick THAT out of the traffic) • Harder to peek into (can you spell “whazzzzup?” in RTP?)
  • 6. Who Needs a VoIP Botnet • Well, everyone… • Botmaster is more mobile (literally) • More anonymous C&C servers (conf call bridge numbers are aplenty…) • Can actually transfer fair amounts of data back/forth (remember the modem days?) • It’s starting to show up as alternative methods of covert communications – Sorry spooks… 
  • 7. VoIP Botnet in Action • Red Team Penetration Testing Engagement • Botnet in No Internet/Closed Networks • Botnet for VoIP Phones
  • 8. VoIP Botnet Architecture • Telephony systems allows both Unicast and Multicast communication • Unicast: – Bot calls Bot Master – Bot Master calls Bot (registered ext. on his PBX) • Multicast: – Bot A calls Conference Call – Bot B calls Conference Call – Bot Master joins Conference Call
  • 9. VoIP Botnet Architecture • Conference Call as “IRC Channel” Bot Bot Bot Conference Call Master Bot
  • 10. The Call • Calling can be made via TCP/IP or PSTN Bot/Bot Master PSTN/VoIP Trunk TCP/IP (SIP, H.323,…) Conference Call
  • 11. Moshi Moshi • Open-source VoIP Bot written in Python – Uses SIP as VoIP Protocol – Uses Text-to-speech Engines for Output – Uses DTMF Tones for Input • Download your copy at: – http://code.google.com/p/moshimoshi/
  • 12. Press 1 to Continue in l33t Speak • DTMF (Dual-tone multi-frequency signaling) are used for signaling over telephone lines in the voice-frequency band between telephone handsets and other devices and switching centers. • DTMF tones are standardized and can be sent and received from any phone
  • 13. Asterisk as C&C and DTMF • Asterisk is free software that transforms a computer into a communication server • We’re using AsteriskNow 1.7.1 Linux Distribution • MeetMe is a conference bridge for Asterisk and supports passing DTMF through the conference. • To pass DTMF through the conference add ‘F’ option to MEETME_OPTS at extensions.conf
  • 14. DTMF Pass through/Relaying • Conf. Call to relay DTMF to other calls Bot A Bot A: Heard 1# Pressed 1# Bot Conference Call Bot B Master Bot B: Heard 1# Bot C Bot C: Heard 1#
  • 15. DTMF Tones as C&C • The (made-up) Rules – ‘*’ is End of Line (EOL) – ‘#’ is a delimiter (i.e. Space) • Examples – ‘0#*’ invoke command 0 without arguments – ‘1#123#*’ invoke command 1 with one arg ‘123’ – ‘2#1#2#*’ invoke command 2 with args ‘1’ and ‘2’ • It’s your rules – go wild…
  • 17. Text-to-Speech as Data Leakage • It's only natural that since we don’t have visuals in phone conversation, to use voice • Passwords, documents, settings and acknowledgements can all be read back • Some systems (Mac, Windows) includes built-in Text-to-Speech engines, others requires installation • External utilities can be used to convert different formats (e.g. Microsoft Word) into simpler text files
  • 18. Talk to me… Woo hoo!
  • 19. The Getaway: Modulation • Take any arbitrary binary data • Devise a way to transform bytes to sounds – PoC: every ½ byte  one of 16 octaves within the human audible range (~200Hz - ~2000Hz) • Record each ½ byte octave – PoC uses ½ second tones (for legibility in a conference ) • Music to my ears…
  • 20. Demo: Binary Data Modulation -> Data Exfiltration • Transform data to sound • Dial, leave a message… • Transform recorded message to data • Profit?
  • 22. VoIP as VPN • Alternative unmonitored Internet access – No DLP – No Firewalls – No IDS/IPS/DPI • Allows using already-existing C&C protocols – IRC – HTTP • Bot Master can easily explore his Botnet – nmap –sS 10.0.0.0/8
  • 23. TCP/IP over VoIP • Bring back Modems to the game • Use V.42/HDLC/PPP protocols • Works with Hardware Modems TCP • Works with Software Modems IP • Works within Voice frequency band V.42/HDLC/PPP • Works under poor connectivity conditions SIP/RTSP • Two-way communication channel UDP IP
  • 24. Did You Hear That? • VoIP Botnets are as good and even better in some cases, than IRC, P2P, and HTTP Botnets. • VoIP Botnets strengths: – Can be operated from a payphone, or a Mobile. – Can be accessed from both PSTN and Internet – Are not blocked by your typical IDS/IPS signatures
  • 25. Countermeasures • Separate VoIP from Corporate Network – Yes, COMPLETELY! • Monitor VoIP Activity – It’s your data. Same as you do for web/emails… • Consider whitelisting Conf. Call Numbers
  • 26. The Future Sound of Botnets • Hearing is Believing – Speech-to-Text as Input • Going Mobile – Text-to-SMS as Output – SMS-to-Voice Calls as Input • Meeting new Appliances – T.38 (Fax) as Output (e.g. “Screen Shots”) • Meeting old Appliances – Modem (PPP) as Input/Output (e.g. “Internal VPN”)
  • 28. Thanks! Itzik Kotler (Twitter: @itzikkotler) Iftach Ian Amit (Twitter: @iiamit)