Phree As In Phone Call

  • December 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Phree As In Phone Call as PDF for free.

More details

  • Words: 1,508
  • Pages: 43
Phree as in Phone Call The other end of the line

Presented By: [email protected] © 2008 Security-Assessment.com

FILE_ID.DIZ  Advantages of phreaking with VoIP

 Modern dialing setup  Modern wardialing and scanning techniques

 Identifying and classifying devices  Hacking dial-in lines

 System types and login attacks  IVR and voicemail systems

 PIN brute-forcing  PaBX’s

 Exploiting features  Eavesdropping and data-mining

© 2008 Security-Assessment.com

Advantages of phreaking with VoIP  International destinations much more accessible

 VoIP is cheap  Can scam free VoIP  Don’t need to scan from home anymore

 Less knocks at the door  Parallelization

 Can run savage burns  Easier to perform certain attacks

 CallerID spoofing  Automates hand scanning

 Callus free!

© 2008 Security-Assessment.com

Modems and VoIP  Most people think it can’t be done

 Complex codecs cause havoc to connections  Modems can’t connect  Connections drop  It can be done!

 What you need  How to tweak it

© 2008 Security-Assessment.com

What you need  Modems

© 2008 Security-Assessment.com

What you need  Analog telephony adaptors (ATA)

© 2008 Security-Assessment.com

What you need  VoIP account

 Lots of cheap providers  voipjet.com  voipbuster.com  Trial accounts  Free calls  Asterisk server

 Routing  Call recording  CallerID spoofing

© 2008 Security-Assessment.com

Device configuration tricks  ATA

 Compression disabled (G.711 ulaw!)  No echo cancellation (*99 on PAP2)  Modem

 Disable local flow control  Error-correction  Disable data-compression  Limit the data rate to 1200 bps for scans

© 2008 Security-Assessment.com

Modem connection using VoIP

© 2008 Security-Assessment.com

What can you connect to?  Modems all over the world

 Control systems  SCADA systems  Alarm systems  International x.25 networks

 India, Africa, Russia, China…  Banking  Other interesting stuff

 Obscure devices and networks  Bulletin boards (yep!)  Who knows? The PSTN is global!

© 2008 Security-Assessment.com

What can you connect to?  SCADA system example

© 2008 Security-Assessment.com

Wardialing  Automatically dialing numbers to find modems

 Target identification  Inventory building  Risks

 Time of day  Randomize numbers!  Modern Wardialing

 Use VoIP, UNIX and Asterisk  The Intelligent Wardialer (iWar)

© 2008 Security-Assessment.com

Wardialing  iWar

 Multiple modems are no problems!  Serial to usb adapters  Scaleable banks of modems with limitless potentional  Remote system identification (126 banners)  MySQL support  CNAM lookup feature  Blacklist support

© 2008 Security-Assessment.com

Wardialing  iWar in serial mode

© 2008 Security-Assessment.com

Wardialing  What will we find?

 Routers  Remote access servers  PPP dialins  PC Anywhere  PaBX management systems  IVR systems  Network backdoors  Outdials  Diverters (dialtones)  Unknown and forgotten devices

© 2008 Security-Assessment.com

Wardialing  Reducing time with blacklists

 Internal / employee directories  DDI’s and other numbers harvested from websites  Business directories  Websites  CDROMs  Fax directories  Do-not-call lists  Special ranges

 Telco test equipment

© 2008 Security-Assessment.com

Wardialing  Published research

 Peter Shipley dialed 5.7M numbers over three years  50,000 carriers found  Found unauthenticated access to

 Fire Department's dispatch system  Control system for high-voltage power transmission line  Internal networks of financial organizations  A leased line control system  Credit card number databases  Medical billing records.

© 2008 Security-Assessment.com

Wardialing  THC-Scan: Next Generation

 Distributed wardialer!  Large modem pools  Large scan ranges - (09) 3XXXXXX  Global scanning efforts  Log sharing and karma systems

© 2008 Security-Assessment.com

Wardialing  Callus-free handscanning

 iWar with IAX2 connection  Wifi at café, etc  Headphones  Time and patience  Upsides  Safe and anonymous  Mostly automated  Handsfree!

© 2008 Security-Assessment.com

Hacking dial-in lines  Figuring out what you’re dealing with

 System types and banners  Identifying different type login prompts and methods  Building username and password lists  Google for defaults  Login Brute-forcing

 Tools  Homebrew scripting

© 2008 Security-Assessment.com

Hacking dial-in lines  System types and banners

© 2008 Security-Assessment.com

Hacking dial-in lines  System types and banners

© 2008 Security-Assessment.com

Hacking dial-in lines

 Different login prompts and methods  Single auth  Dual auth  Limited or unlimited attempts?  Username, password or both?

© 2008 Security-Assessment.com

Login brute forcing  Tools

 Commercial war dialers (lame)  Modem login hacker for Linux  X.25 NUI/NUA scanners  Homebrew

 Minicom runscript  Python serial library  Procomm plus aspect script

© 2008 Security-Assessment.com

Login brute forcing 

Modem Login Hacker

 Works against any ‘Username:’ or ‘Login:’ variations  Unix, Cisco, PaBXs  Customizable for different login formats  Includes PPP brute-forcing tool!

© 2008 Security-Assessment.com

IVRs and voicemail  Fingerprinting voicemail systems

 Default prompts  Default mailbox numbers and PINs  Admin mailbox  “Nudges” (*8, *81, *, #, 0)  Can you find the admin console?  CallerID spoofing attacks

 ANI or CID authentication is very bad!  Call forwarding and out-dials

 Free calls

© 2008 Security-Assessment.com

IVRs and voicemail  Launching a PIN brute force attack

 Things to figure out  Dial-in numbers and PIN length  Numbering format for mailboxes  Method of getting to the PIN prompt

© 2008 Security-Assessment.com

PIN brute forcing  Metalstorms mighty Hai2IVR

 SIP-client for brute forcing DTMF prompts  Can record calls and scan in parallel  GUI for sorting and listening to the results  Doubles as PaBX extension war dialer

© 2008 Security-Assessment.com

PIN brute forcing  Components

 Hai2IVR GTK interface  Handles the parallelization  GUI for reviewing results  metlodtmfzor  Makes the calls and sends the DTMF  Command line scriptable  Hai2IVR setup

 Route through Asterisk  Authenticated SIP  CID spoofing

© 2008 Security-Assessment.com

Predictable PINs  Keypad patterns

 Making shapes  L, X, O  Repeating numbers  2244, 9988  Patterns  Other lists

 Birth dates  Pop culture references  1984, 1337 (WiteRabits PIN)  Word numbers  Hell, love, krad, sexy © 2008 Security-Assessment.com

Predictable PINs

© 2008 Security-Assessment.com

Predictable PINs  PINPop.com

 Research project into predictable PINs  PIN database analysis  Goals

 Secure PIN selection patches to Asterisk  Whitepaper on PIN selection psychology

© 2008 Security-Assessment.com

PaBX hacking  Attack categories

 Theft of service  Routing manipulation  Traffic analysis (stealing CDR’s)  Social engineering  Eavesdropping

© 2008 Security-Assessment.com

PaBX hacking 

The Holy Grail

 Access to the maintenance console  Dial-in lines, extensions, computers 

Feature exploits

 Conferencing  Three-way calling  Call forwarding  Direct Inwards System Access (DISA)  Test features that remotely activate mics 

Theft of CDR’s

 Industrial espionage 

Advanced auditing

 Free Space Invaders: reverse engineering

© 2008 Security-Assessment.com

PaBX hacking  Maintenance console banners

© 2008 Security-Assessment.com

PaBX hacking  A hacked Meridian management console can:

 Setup trunks to allow outgoing calls  Manipulate trunks  Re-route incoming / outgoing calls  Eavesdrop extensions  Set a Meridian Mail box to auto logon temporarily  Shut down the PaBX  Make phones ring infinitely  Trace calls through CDR records  Steal CDRs

© 2008 Security-Assessment.com

PaBX hacking  Lockdown methods

 Restricted out dialing  Forwarding features disabled  Enforced minimum PIN size  Unused boxes deactivated  Lockout counters with manual reset  Timeouts on setup of new mailboxes  Challenge response systems  US Government classified VMSs need SecureID’s  Logging

© 2008 Security-Assessment.com

PaBX hacking  CDR’s and datamining

 Sensitive information can be gleaned from call records  Who called who and when  Current and potential clients, contractors  Recent company activities  AMDOCS Example

 Handles billing for most American telcos  FBI and NSA investigation into sending CDRs offshore  Possibility of Israeli's spying on American's through CDRs

© 2008 Security-Assessment.com

The infinite power of Asterisk  Custom setups

 Testing environment for tools  Anonymous voicemail servers  Encrypted voice  Private networks like DetoVoIP and Telephreak  Rogue PaBX’s for evesdropping  Custom features

 ProjectMF: A trip down phone-phreak memory lane  Asterisk patches to support MF in-band signaling  Lets you bluebox telephone calls  Simulation of old (but not dead?) networks

© 2008 Security-Assessment.com

The infinite power of Asterisk  Blueboxing through a ProjectMF test server

© 2008 Security-Assessment.com

The infinite power of Asterisk  Call the ProjectMF server

 Get dropped to a C5 trunk  Hold the phone up to the speakers  Seize the trunk with a 1 second burst of 2600Hz  Send KP + 12588+ ST in multi-frequency tones (MF)  Call connects  Re-seize, repeat

© 2008 Security-Assessment.com

Thanks  Thanks & greats to:

 SA.com  SLi  Andrew Horton  Metlstorm  Detonate  Kiwicon crew  Beave  Jfalcon  M4phr1k

© 2008 Security-Assessment.com

NO CARRIER

http://www.security-assessment.com [email protected]

© 2008 Security-Assessment.com

Related Documents

Phree As In Phone Call
December 2019 4
5 Making A Phone Call
November 2019 15
Call Ad It As
November 2019 17
Phone
November 2019 53
Phone
August 2019 54
Phone
October 2019 56