CEH.V6.-.Module.38.VoIP.Hacking

Reproduction is strictly prohibited flooding attacks

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: e fake RTP packets, resulting in quality degradation or terminal reboot Spam over Internet Telephony (SPIT) • A SPIT threat sends unsolicited calls to legitimate users that contain mostly prerecorded messages EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Flooding Attacks Flooding Attacks allows an attacker attempt to consume all available network or system resources UDP Flooding Attacks • It allows an attacker to manipulate trust relationships within an organization to bypass firewalls and other filter filter devices TCP SYN flood attacks • It subverts the TCP connection three-way handshake It th TCP th in order to overwhelm a target with connection management • Attacker sends a flood of SYN packets with spoofed source IP addresses EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Flooding Attacks (cont’d) ICMP and Smurf Flooding Attacks • It involves a flood of legitimate ICMP fl ICMP responses from the networks to the victim who was spoofed QoS QoS Manipulation with Targeted Flooding • This attack involves subverting the quality of service mechanisms within a network in order to degrade VoIP applications EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DNS Cache Poisoning DNS cache poisoning attacks involve an attacker tricking a DNS server into believing the veracity of a fake DNS response It is to redirect the victims dependent on that DNS server to other addresses It has traditionally been used in phishing schemes to di redirect a user trying to surf to their banking site to a fake site owned by the hacker EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Sniffing TFTP Configuration File Transfers Sniffing Sniffing for TFTP configuration files traveling across the network is as easy as simply watching for any and all traffic on UDP port 69 using Tcpdump or Ethereal EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Performing Number Harvesting and Call Pattern Tracking The easiest way is to simply sniff all SIP traffic on UDP and TCP port 5060 UDP and analyze the From: and To: header fields Use Use tools such as ethereal and VoIPong EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Call Eavesdropping Tools can perform call eavesdropping: Wireshark Cain and Abel Vomit VoIPong Oreka Oreka EC-Council • It captures traffic normally • It is a powerful sniffing and password-cracking tool • It is a utility that can be used with the sniffer tcpdump to convert RTP conversations to WAV files • It can be configured to output WAV files for each captured conversation • It is an open-source VoIP recording toolset that runs on Windows and flavors of Linux Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Interception through VoIP Signaling Manipulation An An attacker to send spoofed or malformed signaling requests to a misconfigured or unsecured proxy in order to redirect incoming or outgoing calls to a victim EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Man-In-The-Middle (MITM) Attack Attack An attacker is able to insert herself between two communicating parties to eavesdrop and/or alter the data traveling between them without their d/ th th knowledge This attack can perform: • • • • • • EC-Council Eavesdropping on the conversation Causing a denial of service by black-holing the conversation Altering the conversation by omitting media Altering the conversation by replaying media Altering the conversation by inserting media Redirecting the sending party to another receiving party Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Application-Level Interception Techniques Techniques Assuming a SIP deployment with application-level interception, trick the SIP phone, SIP proxy into communicating...
View Full Document

Ask a homework question - tutors are online