'network/VoIP'에 해당되는 글 5건

  1. 2010.07.16 VoIP 정리 잘된 블로그
  2. 2010.06.29 john, sipdump, sipcrack
  3. 2010.06.29 VoIP 망 구성도
  4. 2010.06.23 VoIP Security Tool List
  5. 2010.06.14 VoIP ?

VoIP 정리 잘된 블로그

network/VoIP 2010. 7. 16. 17:40

'network > VoIP' 카테고리의 다른 글

john, sipdump, sipcrack  (0) 2010.06.29
VoIP 망 구성도  (0) 2010.06.29
VoIP Security Tool List  (0) 2010.06.23
VoIP ?  (0) 2010.06.14
:

john, sipdump, sipcrack

network/VoIP 2010. 6. 29. 15:50
myLG070을 사용하시는 분들 중 상당수가 SIP를 알아내어 다른 전화기에 넣어 사용하거나 x-lite와 같은 별도의 소프트웨어에서 사용하기를 원합니다. 저는 아이팟에서 사용하기를 원하는데요, 불행히도 myLG070에서는 정책적으로 SIP계정을 고객에게 알려주지 않습니다. 아니 왜? 뭥미? 뭐 어쨌든 그렇다고 가만히 있을 우리가 아니죠. s(-_-)z


[ SIP 계정 확인하는 법 ]
아래에 나오는 0707555134는 제 전화번호가 아닙니다. 그러니 전화하셔도 소용없습니다 ^^; 그리고 이 방법은 myLG070이 아닌 다른 VoIP 서비스에서도 사용이 가능합니다. 부디 다른 사람의 SIP 계정을 훔치거나 하는 것과 같은 
악의적인 목적으로는 절대 사용하지 마시길 바랍니다.

가장 먼저 해야할 것은 Wireshark와 같은 패킷 캡쳐 툴을 이용하여 myLG070 전화기의 REGISTER 패킷을 캡쳐하는 것이다. 그리고 캡처한 파일은 파일로 저장하도록 하자. 패킷 뜨는 것도 따로 설명을 해야 할까요? 흠;; -_-; 패스

492d5616aa6a1
위의 빨간 상자로 표시한 부분이 Proxy 이다. 이건 각자 다른 것 같으므로 잘 확인하자.

REGISTER 패킷 내용을 확인하면 SIP와 비밀번호의 MD5 Hash를 확인할 수 있다.

REGISTER sip:lgdacom.net SIP/2.0
From: "07075551234"<sip:7075551234@lgdacom.net>;tag=de8910-aa64a8c0-13c4-4923588a-16533ee-4923588a
To: "07075551234"<sip:7075551234@lgdacom.net>
Call-ID: 40600d88-aa64a8c0-13c4-49235889-56954070-49235889
CSeq: 2 REGISTER
Via: SIP/2.0/UDP 192.168.100.170:5060;branch=z9hG4bK-4923588b-b211e212-214891f4
Max-Forwards: 70
Supported: replaces, 100rel
Contact: <sip:7075551234@192.168.100.170:62113;maddr=211.177.110.195>
Proxy-Require: com.nortelnetworks.firewall
User-Agent: WPN-480H-v1.1.72
x-nt-GUID: 6b365a861dd211b29dc2bb5e5dbe747a
Expires: 3600
Proxy-Authorization: Digest username="7075551234",realm="Realm",nonce="MTIyNzAyMDc1MTExNjNiY2QxZGUwZTM2OWIzMDJiNzhhNWI2NW
UwYTc3Mzk1",uri="sip:lgdacom.net",response="e5969xxxxxxc676c4301c5xxxxxxe990",algorithm=MD5,
cnonce="b211e213",qop=auth,nc=00000001
Content-Length: 0


원래 MD5 Hash는 역함수가 존재하지 않는다. 따라서 비밀번호를 알기 위해서는 브루트 포스(Brute Force)로 비밀번호를 생성한 후 일일이 해시와 비교하여 맞는지 확인하여야만 한다. 어~우 아마 여기서부터 머리가 슬슬 아파지기 시작할 것이다. 그러나 너무 걱정하지는 말자. 이미 누군가가 이 것을 해주는 프로그램을 만들어 놓았다. 우리는 그 것을 잘 이용하기만 하면 된다.

[준비물]
아래의 프로그램들을 실행하기 위한 Linux 환경. 필자는 Ubuntu 사용.
http://www.remote-exploit.org/codes/sipcrack/SIPcrack-0.2.tar.gz
http://www.openwall.com/john/g/john-1.7.3.1.tar.gz

위 프로그램들을 설치하는 방법은 생략하도록 한다. 해보면 그리 어렵지 않다. (뭥미? -_-; 사실 설명하기 귀찮다.)

john-1.7.3.1을 설치하고 아래와 같이 패스워드 목록을 생성한다.

notepad@notepad:~/SIP/john-1.7.3.1/run./john --incremental=digits --stdout=6 > 6digits.txt
최근에 myLG070에 가입한 경우는 비밀번호가 숫자 6자리가 아닐 수 있다고 한다. 어떠한 문자 조합을 사용하고 그 길이는 어떻게 되는지 모르겠습니다. 구글링 해봐도 이 정보는 알 수가 없네요. 만약 영문자 대소 + 특수문자 + 숫자 + 12자리면 대략 난감;

역시 마찬가지로 SIPcrack-0.2를 설치하고 맨 처음 파일로 저장한 패킷 캡처 파일을 SIPcrack-0.2 폴더로 복사해 넣는다. 그리고 sipdump를 이용하여 필요한 부분만 덤프를 받도록 한다.

notepad@notepad:~/SIP/SIPcrack-0.2$ ./sipdump -p mylg070.pcap 070.dump

SIPdump 0.2  ( MaJoMu | www.codito.de )
---------------------------------------

* Using pcap file 'mylg070.pcap' for sniffing
* Starting to sniff with packet filter 'tcp or udp'

* Dumped login from 210.207.255.44 -> 192.168.0.30 (User: '7075551234')

* Exiting, sniffed 1 logins

이제는 앞서 john-1.7.3.1으로 생성했던 6digits.txt 파일을 패킷 캡처 파일과 마찬가지로 SIPcrack-0.2 폴더로 복사하고 아래와 같은 명령어를 입력하여 sipcrack을 실행한다.
notepad@notepad:~/SIP/SIPcrack-0.2$ ./sipcrack -w 6digits.txt 070.dump

SIPcrack 0.2  ( MaJoMu | www.codito.de )
----------------------------------------

* Found Accounts:

Num     Server          Client          User    Hash|Password

1       192.168.0.30    210.207.255.44  7075551234      e5969xxxxxxc676c4301c5xxxxxxe990

* Select which entry to crack (1 - 1): 1
* Password already cracked: '123456'
크랙을 원하는 항목을 선택하고 잠시 기다리면 위와 같이 패스워드가 '툭' 튀어나온다. 필자의 경우 2초도 채 걸리지 않았다.

비밀번호를 알아내고 나니 정말 허무하네요. VoIP의 보안이 얼마나 취약한지 알 수 있습니다. 공개된 장소에서의 VoIP 사용은 자제해야겠다는 생각만 자꾸드네요. 거듭 말씀드리지만 악의적인 목적으로는 이용하지 말아주시기 바랍니다.
필요한 프로그램들입니다. 일단 모두 받습니다.
http://www.codito.de/prog/SIPcrack-0.2.tar.gz
http://www.codito.de/prog/SIPcrack-0.3pre.tar.gz
http://www.openwall.com/john/g/john-1.7.3.1.tar.gz
http://www.tcpdump.org/release/libpcap-0.8.1.tar.gz

Crack 하기 위한 환경을 설정해봅시다.

1. 아무 리눅스 OS를 설치하고 root계정으로 로긴합니다. (gcc는 반드시 깔아야합니다)
2. libpcap-0.8.1.tar.gz 파일 압축을 풀고 컴파일 합니다. ./configure ./make install
3. 생성된 화일중 libpcap.a 화일을 /usr/lib 폴더에 복사하고, pcap.h bpf.h 화일을 /usr/include 로 복사합니다.
4. 3의 파일들은 sipcrack와 sipdump를 컴파일할때 필요한 라이브러리입니다.
5. sipcrack0.2에 있는 pcapstuff.h 화일을 0.3에 복사합니다.
6. make 하면 인스톨을 합니다. make install 하면 /usr/bin 에 복사되서... 어디서는 사용가능하게 됩니다.
7. john-1.7.3.1.tar.gz 의 압축을 푼뒤 src 폴더에서 make clean generic 으로 실행화일을 만듭니다.

sip 크래킹에 필요한 요소는 완료되었습니다.
이제 lg070 의 통화패킷을 가져올 차례입니다.
간편하게 얻을 수 있는 WireShark 를 이용합니다.

패킷을 뜨는 방법은 각자에게 맞겨두겠습니다.
집에 Dummy Hub 가 있다면 070 Ap 를 그쪽에 물리고 다른포트를 노트북에 연결해서 Dump를 뜨거나
Windows 의 공유기능을 이용해 두개의 랜카드 중 하나는 인터넷이 되도록 하고 하나는 070 Ap와 연결하여
공유기능을 통해 통화가 가능하도록 환경을 만들면 AP 와 연결된 랜카드를 통해서 Dump를 뜰 수 있을 것입니다.
방법은 많이 있으니 각자 환경에 맞는 방법을 찾으시기 바랍니다.
이렇게 얻어진 070.pcap 파일을 가지고 암호를 풀어보겠습니다.

1. ./john --incremental=digits --stdout=6 > 6number.txt
2. 캡쳐받은 화일의 을 가져온뒤 sipdump -p 070.pcap 070.dump
3. sipcrack -w 6number.txt 070.dump 
만일 하나의 정보만 들어있다면 그냥 암호가 나올 것입니다.
아닐 경우는 자신의 070번호가 들어있는 메뉴를 선택해주면 됩니다.
4. 드디어 암호가 나왔습니다!
5. 이때 Client 라고 표기된 IP 주소를 기억해둡니다.

이제 X-Lite 에서 설정하는 일만 남았습니다.
SIP Account에 다음을 입력합니다.

1. Display Name : 07012341234(자신의 번호)
2. User Name : 7012341234(자신의 번호에서 맨앞의 0을 뺍니다)
3. Password : 아까 알아내셨죠?
4. Authorization user name : User name 과 같습니다.
5. Domain : lgdacom.net
6. Proxy : xxx.xxx.xxx.xxx:5060 (주소에 아까 기억해 두셨던 IP주소를 넣어주시고 뒤에 :5060을 붙입니다.)


'network > VoIP' 카테고리의 다른 글

VoIP 정리 잘된 블로그  (0) 2010.07.16
VoIP 망 구성도  (0) 2010.06.29
VoIP Security Tool List  (0) 2010.06.23
VoIP ?  (0) 2010.06.14
:

VoIP 망 구성도

network/VoIP 2010. 6. 29. 00:40




'network > VoIP' 카테고리의 다른 글

VoIP 정리 잘된 블로그  (0) 2010.07.16
john, sipdump, sipcrack  (0) 2010.06.29
VoIP Security Tool List  (0) 2010.06.23
VoIP ?  (0) 2010.06.14
:

VoIP Security Tool List

network/VoIP 2010. 6. 23. 10:48

http://www.hackingvoip.com/sec_tools.html

VoIP Security Tool List


This VoIP Security Tool List provides categories, descriptions and links to current free and commercial VoIP security tools. Each commercial tool is indicated by the following icon next to it:

The key objectives of this list are as follows:

  1. Provide links to tools that help test the efficacy of implemented best practices outlined by VOIPSA's Best Practices Project.
  2. Facilitate the open discussion of VoIP security tool information to help users better audit and defend their VoIP devices and deployments.
  3. Provide vendors the information needed to proactively test their VoIP devices' ability to function and withstand real-world attacks.
DISCLAIMER: Many of these tools can cause harm to the normal operation of your VoIP network if used improperly. Before using any tools, we recommend that you read the instructions and other d0cumentation available on each of the individual tool's websites. By selecting almost any of these links, you will be leaving VOIPSA's web space. These links and pointers are provided for our visitors' convenience. Please be aware that we do not control or guarantee the accuracy, relevance, timeliness, or completeness of this outside information. No inferences should be drawn because some sites are referenced, or not, from this page. There may be other tools that are more appropriate for your purpose. In no event shall VOIPSA be liable for any direct, indirect, incidental, punitive, or consequential damages of any kind whatsoever with respect to this list. Further, VOIPSA does not endorse any commercial products that may be mentioned in this list. These tools are only meant to be used on networks with the permission of the network owner and in compliance with the law.


Contents Quick Navigation


VoIP Sniffing Tools
  • AuthTool - Tool that attempts to determine the password of a user by analyzing SIP traffic.
  • Cain & Abel - Multi-purpose tool with the capability to reconstruct RTP media calls.
  • CommView VoIP Analyzer - VoIP analysis module for CommView that is suited for real-time capturing and analyzing Internet telephony (VoIP) events, such as call flow, signaling sessions, registrations, media streams, errors, etc.
  • Etherpeek - general purpose VoIP and general ethernet sniffer.
  • ILTY ("I'm Listening To You") - Open-source, multi-channel SKINNY sniffer.
  • NetDude - A framework for inspection, analysis and manipulation of tcpdump trace files.
  • Oreka - Oreka is a modular and cross-platform system for recording and retrieval of audio streams.
  • PSIPDump - psipdump is a tool for dumping SIP sessions (+RTP traffic, if available) from pcap to disk in a fashion similar to "tcpdump -w".
  • rtpBreak - rtpBreak detects, reconstructs and analyzes any RTP session through heuristics over the UDP network traffic. It works well with SIP, H.323, SCCP and any other signaling protocol. In particular, it doesn't require the presence of RTCP packets.
  • SIPomatic - SIP listener that's part of LinPhone
  • SIPv6 Analyzer - An Analyzer for SIP and IPv6.
  • UCSniff - UCSniff is an assessment tool that allows users to rapidly test for the threat of unauthorized VoIP eavesdropping. UCSniff supports SIP and Skinny signaling, G.711-ulaw and G.722 codecs, and a MITM ARP Poisoning mode.
  • VoiPong - VoIPong is a utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to separate wave files. It supports SIP, H323, Cisco's Skinny Client Protocol, RTP and RTCP.
  • VoIPong ISO Bootable - Bootable "Live-CD" disc version of VoIPong.
  • VOMIT - The vomit utility converts a Cisco IP phone conversation into a wave file that can be played with ordinary sound players.
  • Wireshark - Formerly Ethereal, the premier multi-platform network traffic analyzer.
  • WIST - Web Interface for SIP Trace - a PHP Web Interface that permits you to connect on a remote host/port and capture/filter a SIP dialog.


VoIP Scanning and Enumeration Tools
  • EnableSecurity VoIPPack for CANVAS - VoIPPack is a set of tools that are designed to work with Immunity CANVAS. The tools perform scans, enumeration, and password attacks.
  • enumIAX - An IAX2 (Asterisk) login enumerator using REGREQ messages.
  • iaxscan - iaxscan is a Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts.
  • iWar - IAX2 protocol Wardialer
  • Nessus - The premier free network vulnerability scanner.
  • nmap - the premier open source network port scanner.
  • Passive Vulnerability Scanner - The Tenable Passive Vulnerability Scanner (PVS) can find out what is happening on your network without actively scanning it. PVS detects the actual protocol, various administrative interfaces, and VoIP scanner(s). Currently includes over 40 VoIP checks.
  • SCTPScan - This tool enumerates open SCTP ports without establishing a full SCTP association with the remote host. You can also scan whole networks to find SCTP-speaking machines.
  • SIP Forum Test Framework (SFTF) - The SIP Forum Test Framework (SFTF) was created to allow SIP device vendors to test their devices for common errors.
  • SIP-Scan - A fast SIP network scanner
  • SIPcrack - SIPcrack is a SIP protocol login cracker. It contains 2 programs, SIPdump to sniff SIP logins over the network and SIPcrack to bruteforce the passwords of the sniffed login.
  • Sipflanker - Sipflanker will help you find SIP devices with potentially vulnerable Web GUIs in your network.
  • SIPSCAN - SIPSCAN is a SIP username enumerator that uses INVITE, REGISTER, and OPTIONS methods.
  • SIPVicious Tool Suite - svmap, svwar, svcrack - svmap is a sip scanner. It lists SIP devices found on an IP range. svwar identifies active extensions on a PBX. svcrack is an online password cracker for SIP PBX
  • SiVuS - A SIP Vulnerability Scanner.
  • SMAP - SIP Stack Fingerprinting Scanner
  • VLANping - VLANPing is a network pinging utility that can work with a VLAN tag.
  • VoIPAudit - VoIP specific scanning and vulnerability scanner.


VoIP Packet Creation and Flooding Tools
  • IAXFlooder - A packet flooder that creates IAX packets.
  • INVITE Flooder - Send a flurry of SIP INVITE messages to a phone or proxy.
  • iThinkTest FlowCoder: SiPBlast - SIP Flood/Capacity testing of infrastructure by emulating mass CPE call traffic
  • kphone-ddos - Using KPhone for flooding attacks with spoofed SIP packets
  • NSAUDITOR - SIP UDP Traffic Generator - Flooder - SIP UDP traffic generator / flooder generates SIP traffic to stress test voice over IP systems, SIP programs and implementations under heavy network load. It is a very simple and fast program which can simulate SIP client and call activity.
  • RTP Flooder - Creates "well formed" RTP Packets that can flood a phone or proxy.
  • Scapy - Scapy is a powerful interactive packet manipulation program. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery.
  • Seagull - a multi-protocol traffic generator especially targeted towards IMS.
  • SIPBomber - SIPBomber is sip-protocol testing tool for Linux.
  • SIPNess - SIPness Messenger is a SIP testing tool which is used for testing SIP applications.
  • SIPp - SIPp is a free Open Source test tool / traffic generator for the SIP protocol.
  • SIPsak - SIP swiss army knife.


VoIP Fuzzing Tools
  • Asteroid - this is a set of malformed SIP methods (INVITE, CANCEL, BYE, etc.) that can be crafted to send to any phone or proxy.
  • Codenomicon VoIP Fuzzers - Commercial versions of the free PROTOS toolset
  • Fuzzy Packet - Fuzzy packet is a tool to manipulate messages through the injection, capturing, receiving or sending of packets generated over a network. Can fuzz RTP and includes built-in ARP poisoner.
  • Interstate Fuzzer - VoIP Fuzzer
  • Mu Dynamics VoIP, IPTV, IMS Fuzzing Platform - Fuzzing appliance for SIP, Diameter, H.323 and MGCP protocols.
  • ohrwurm - ohrwurm is a small and simple RTP fuzzer.
  • PROTOS H.323 Fuzzer - a java tool that sends a set of malformed H.323 messages designed by the University of OULU in Finland.
  • PROTOS SIP Fuzzer - a java tool that sends a set of malformed SIP messages designed by the University of OULU in Finland.
  • SIP Forum Test Framework (SFTF) - SFTF was created to allow SIP device vendors to test their devices for common errors. And as a result of these tests improve the interoperability of the devices on the market in general.
  • Sip-Proxy - Acts as a proxy between a VoIP UserAgent and a VoIP PBX. Exchanged SIP messages pass through the application and can be recorded, manipulated, or fuzzed.
  • Spirent ThreatEx - a commercial protocol fuzzer and ribustness tester.
  • VoIPER - VoIPER is a security toolkit that aims to allow developers and security researchers to easily, extensively and automatically test VoIP devices for security vulnerabilties.


VoIP Signaling Manipulation Tools
  • BYE Teardown - This tool attempts to disconnect an active VoIP conversation by spoofing the SIP BYE message from the receiving party.
  • Check Sync Phone Rebooter - Transmits a special NOTIFY SIP message which will reboot certain phones.
  • H225regregject - H225regreject is a tool is used to disconnect H.323 calls. It first monitors the network in order to determine if a call is taking place. Once a call has been identified, it then injects a Registration Reject packet into the call.
  • IAXAuthJack - IAXAuthJack is a tool used to actively perform an authentication downgrade attack and force an endpoint to reveal its password in plaintext over the network.
  • IAXHangup - The IAXHangup is a tool is used to disconnect IAX calls. It first monitors the network in order to determine if a call is taking place. Once a call has been identified, it then injects a HANGUP control frame into the call.
  • iThinkTest FlowCoder: SiPCPE - Evaluate SIP infrastructure protocol compliance using inserted SIP messages.
  • RedirectPoison - this tool works in a SIP signaling environment, to monitor for an INVITE request and respond with a SIP redirect response, causing the issuing system to direct a new INVITE to another location.
  • Registration Adder - this tool attempts to bind another SIP address to the target, effectively making a phone call ring in two places (the legitimate user's desk and the attacker's)
  • Registration Eraser - this tool will effectively cause a denial of service by sending a spoofed SIP REGISTER message to convince the proxy that a phone/user is unavailable.
  • Registration Hijacker - this tool tries to spoof SIP REGISTER messages in order to cause all incoming calls to be rerouted to the attacker.
  • SIP-Kill - Sniff for SIP-INVITEs and tear down the call.
  • SIP-Proxy-Kill - Tears down a SIP-Session at the last proxy before the opposite endpoint in the signaling path.
  • SIP-RedirectRTP - Manipulate SDP headers so that RTP packets are redirected to an RTP-proxy.
  • SipRogue - a multifunctional SIP proxy that can be inserted between two talking parties
  • vnak - VoIP Network Attack Toolkit - vnak combines a number of attacks against multiple protocols in to one easy to use tool. Its aim is to be the one tool a user needs to attack multiple VoIP protocols.
  • VoIPHopper - VoIP Hopper is a security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.


VoIP Media Manipulation Tools
  • RTP InsertSound - this tool takes the contents of a .wav or tcpdump format file and inserts the sound into an active conversation.
  • RTP MixSound - this tool takes the contents of a .wav or tcpdump format file and mixes the sound into an active conversation.
  • RTPInject - RTPInject is a minimal-setup prerequisites attack tool that injects arbitrary audio into established RTP connections. The tool identifies active conversations, enumerates the media codec in use, and allows for the injection of an arbitrary audio file.
  • RTPProxy - Wait for incoming RTP packets and send them to wanted (signaled by a tiny protocol) destination.
  • SteganRTP - SteganRTP is a steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell.
  • Vo²IP - With Vo2IP, you can establish a hidden conversation by embedding further compressed voice data into regular PCM-based voice traffic (i.e. G.711 codec).


Miscellaneous Tools
  • IAX.Brute - IAX.Brute is a passive dictionary attack tool on IAX's challenge/response authentication method. This attack allows malicious users to steal passwords and hijack endpoint identities.
  • SIP-Send-Fun - Sip Send Fun is a tiny command-line based Script, which exploits specific vulnerabilites.
  • SIP.Tastic - SIP.Tastic is a passive dictionary attack tool on SIP's digest authentication method. This attack allows malicious users to steal passwords and hijack endpoint identities.
  • Spitter - A set of tools for Asterisk to perform VoIP spam testing.
  • VoIP Security Audit Program (VSAP) - VSAP is an automated question/answer tool to audit the security of VoIP networks (SIP/H.323/RTP). It provides security topics and audit questions for the end user to complete. Once all the questions are answered, VSAP will provide a final score.
  • XTest - A simple, practical, and free, wired 802.1x supplicant security tool implementing the RFC 3847 EAP-MD5 Authentication method.


Tool Tutorials and Presentations

'network > VoIP' 카테고리의 다른 글

VoIP 정리 잘된 블로그  (0) 2010.07.16
john, sipdump, sipcrack  (0) 2010.06.29
VoIP 망 구성도  (0) 2010.06.29
VoIP ?  (0) 2010.06.14
:

VoIP ?

network/VoIP 2010. 6. 14. 18:24
http://voip.ssu.ac.kr/wiki.php/VoIP

'network > VoIP' 카테고리의 다른 글

VoIP 정리 잘된 블로그  (0) 2010.07.16
john, sipdump, sipcrack  (0) 2010.06.29
VoIP 망 구성도  (0) 2010.06.29
VoIP Security Tool List  (0) 2010.06.23
: