19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 13: Communication and Messaging Systems<br />

If a VoIP network is not protected via network segmentation, such as a virtual<br />

local area network (VLAN), then the voice network is especially susceptible to<br />

eavesdropping, denial of service, and other attacks. But the VLAN barrier can<br />

be overcome in Cisco and Avaya environments by using a tool called VoIP<br />

Hopper (http://voiphopper.sourceforge.net). Just when you think<br />

your voice systems are secure, a tool like VoIP Hopper comes along. Gotta<br />

love innovation!<br />

Unlike typical computer security vulnerabilities, these issues with VoIP<br />

aren’t easily fixed with simple software patches. These vulnerabilities are<br />

embedded into the Session Initiation Protocol (SIP) and Real-time Transport<br />

Protocol (RTP) that VoIP uses for its communications. The following are two<br />

VoIP-centric tests you should use to assess the security of your voice systems.<br />

It’s important to note that although SIP is the most widely used VoIP protocol,<br />

there is H.323. So, don’t spin your wheels testing for SIP flaws if H.323 is the<br />

protocol in use. Refer to www.packetizer.com/ipmc/h323_vs_sip for<br />

additional details on H.323 versus SIP.<br />

Scanning for vulnerabilities<br />

Outside the basic network, OS, and web application vulnerabilities, you can<br />

uncover other VoIP issues if you use the right tools. A neat Windows-based<br />

tool that’s dedicated to finding vulnerabilities in VoIP networks is SiVuS.<br />

SiVuS allows you to perform the basic ethical hacking steps of scanning, enumerating,<br />

and rooting out vulnerabilities. You can start by downloading and<br />

running the SiVuS installation executable. (As of publication it’s available at<br />

www.voip-security.net/index.php/component/jdownloads/view.<br />

download/30/299.)<br />

After SiVuS is installed, load the program and you’re ready to get started.<br />

Figure 13-14 shows my results of the first SiVuS step — Component Discovery.<br />

You can use Component Discovery to search for one or two specific VoIP<br />

hosts, or you can scan your entire network. I recommend the latter because<br />

I find looking for one specific host is a little quirky — and you never know<br />

what other VoIP systems are out there that you could overlook.<br />

271

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!