CEH.V6.-.Module.38.VoIP.Hacking

Reproduction is strictly prohibited enumerating

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: sed Operating system Mac address Ports of UDP services EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Enumerating VxWorks VoIP Devices Many IP Phones are developed on VxWorks embedded operating system system Vendors forget to turn off the remote debugging feature that allows for administrative administrative debugging access to the device VxWorks debugger listens on UDP or TCP port 17185 It allows connection from remote debugging client Visit www.vxworks.com EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Exploiting Exploiting The Network EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Steps to Exploit the Network 1 2 3 4 5 EC-Council • Launch various attacks based on the vulnerability existing • Compromise a network node • Gain access to the network • Now access the network and start sniffing • Intercept through VoIP Signaling Manipulation to Insert Rogue Applications Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Denial-of-Service (DoS) DoS attacks occurs when a large volume of packets are sent towards the victim’s computer with or without involvement of the attacker directly Attack occurs: • When data packets flood the target network from multiple external sources causing Distributed Denial-of-Service (DDoS) attack • When devices within the internal network are targeted by a flood of packets causing Internal DoS Attack • When viruses and worms in infected network systems generate false network traffic • By infiltrating a hidden control program into network-attached computers computers EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Denial-of-Service (DoS) (cont’d) Effects on VoIP • Service degradation or disruption leads to resource depletion • Bandwidth and CPU resource starvation It disrupts VoIP di service by • Preventing successful call placement (including emergency/911) • Disconnecting existing calls, or preventing use of related services like voicemail • Overloading call control servers and gateways EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Distributed Denial-of-Service (DDoS) (DDoS) Attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Internal Denial-of-Service Attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DoS Attack Scenarios TLS Connection Reset • It sends junk packet and the TLS connection resets, interrupting the signaling channel between the phone and call server VoIP Packet Replay Attack • It captures and resends out-of-sequence VoIP packets adding delay to the call and degrades the call quality Wireless DoS • Initiates a DoS attack against wireless VoIP endpoints by sending 802.11 or 802.1X frames that causes network disconnection EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DoS Attack Scenarios (cont’d) QoS Modification Attack • Modifies non-VoIP-specific protocol control information fields in VoIP data packets to and from endpoints to degrade voice service VoIP Packet Injection • It sends forged VoIP packets to endpoints, injecting speech, or noise or gaps into active call Bogus Message DoS • It sends VoIP servers or endpoints valid-but-forged VoIP protocol packets to cause call disconnection EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DoS Attack Scenarios (cont’d) DoS against Supplementary Services • Initiates a DoS attack against other network services upon which the VoIP service depends Control Packet Flood • Attacker’s intent is to deplete/exhaust device, system, or network resources to the extent that VoIP service is unusable...
View Full Document

This note was uploaded on 02/12/2013 for the course CEH v6 taught by Professor John during the Summer '13 term at West Point.

Ask a homework question - tutors are online