Notice
Tags
Recent Entries
Recent Comments
Recent Trackbacks
Archives
network/VoIP 2010. 7. 16. 17:40
network/VoIP 2010. 6. 29. 15:50
myLG070을 사용하시는 분들 중 상당수가 SIP를 알아내어 다른 전화기에 넣어 사용하거나 x-lite와 같은 별도의 소프트웨어에서 사용하기를 원합니다. 저는 아이팟에서 사용하기를 원하는데요, 불행히도 myLG070에서는 정책적으로 SIP계정을 고객에게 알려주지 않습니다. 아니 왜? 뭥미? 뭐 어쨌든 그렇다고 가만히 있을 우리가 아니죠. s(-_-)z
[ SIP 계정 확인하는 법 ]
아래에 나오는 0707555134는 제 전화번호가 아닙니다. 그러니 전화하셔도 소용없습니다 ^^; 그리고 이 방법은 myLG070이 아닌 다른 VoIP 서비스에서도 사용이 가능합니다. 부디 다른 사람의 SIP 계정을 훔치거나 하는 것과 같은 악의적인 목적으로는 절대 사용하지 마시길 바랍니다 .
가장 먼저 해야할 것은 Wireshark와 같은 패킷 캡쳐 툴을 이용하여 myLG070 전화기의 REGISTER 패킷을 캡쳐하는 것이다. 그리고 캡처한 파일은 파일로 저장하도록 하자. 패킷 뜨는 것도 따로 설명을 해야 할까요? 흠;; -_-; 패스
위의 빨간 상자로 표시한 부분이 Proxy 이다. 이건 각자 다른 것 같으므로 잘 확인하자.
REGISTER 패킷 내용을 확인하면 SIP와 비밀번호의 MD5 Hash를 확인할 수 있다.
REGISTER sip:lgdacom.net SIP/2.0
From: "07075551234"<sip:7075551234@lgdacom.net>;tag=de8910-aa64a8c0-13c4-4923588a-16533ee-4923588a
To: "07075551234 "<sip:7075551234@lgdacom.net>
Call-ID: 40600d88-aa64a8c0-13c4-49235889-56954070-49235889
CSeq: 2 REGISTER
Via: SIP/2.0/UDP 192.168.100.170:5060;branch=z9hG4bK-4923588b-b211e212-214891f4
Max-Forwards: 70
Supported: replaces, 100rel
Contact: <sip:7075551234@192.168.100.170:62113;maddr=211.177.110.195>
Proxy-Require: com.nortelnetworks.firewall
User-Agent: WPN-480H-v1.1.72
x-nt-GUID: 6b365a861dd211b29dc2bb5e5dbe747a
Expires: 3600
Proxy-Authorization: Digest username="7075551234",realm="Realm",nonce="MTIyNzAyMDc1MTExNjNiY2QxZGUwZTM2OWIzMDJiNzhhNWI2NW
UwYTc3Mzk1",uri="sip:lgdacom.net",response="e5969xxxxxxc676c4301c5xxxxxxe990 ",algorithm=MD5,
cnonce="b211e213",qop=auth,nc=00000001
Content-Length: 0
원래 MD5 Hash는 역함수가 존재하지 않는다. 따라서 비밀번호를 알기 위해서는 브루트 포스(Brute Force)로 비밀번호를 생성한 후 일일이 해시와 비교하여 맞는지 확인하여야만 한다. 어~우 아마 여기서부터 머리가 슬슬 아파지기 시작할 것이다. 그러나 너무 걱정하지는 말자. 이미 누군가가 이 것을 해주는 프로그램을 만들어 놓았다. 우리는 그 것을 잘 이용하기만 하면 된다.
[준비물]
아래의 프로그램들을 실행하기 위한 Linux 환경. 필자는 Ubuntu 사용.
http://www.remote-exploit.org/codes/sipcrack/SIPcrack-0.2.tar.gz
http://www.openwall.com/john/g/john-1.7.3.1.tar.gz
위 프로그램들을 설치하는 방법은 생략하도록 한다. 해보면 그리 어렵지 않다. (뭥미? -_-; 사실 설명하기 귀찮다.)
john-1.7.3.1을 설치하고 아래와 같이 패스워드 목록을 생성한다.
notepad@notepad:~/SIP/john-1.7.3.1/run #
./john --incremental=digits --stdout=6 > 6digits.txt
최근에 myLG070에 가입한 경우는 비밀번호가 숫자 6자리가 아닐 수 있다고 한다. 어떠한 문자 조합을 사용하고 그 길이는 어떻게 되는지 모르겠습니다. 구글링 해봐도 이 정보는 알 수가 없네요. 만약 영문자 대소 + 특수문자 + 숫자 + 12자리면 대략 난감;
역시 마찬가지로 SIPcrack-0.2를 설치하고 맨 처음 파일로 저장한 패킷 캡처 파일을 SIPcrack-0.2 폴더로 복사해 넣는다. 그리고 sipdump를 이용하여 필요한 부분만 덤프를 받도록 한다.
notepad@notepad:~/SIP/SIPcrack-0.2$ ./sipdump -p mylg070.pcap 070.dump
SIPdump 0.2 ( MaJoMu |
www.codito.de )
---------------------------------------
* Using pcap file 'mylg070.pcap' for sniffing
* Starting to sniff with packet filter 'tcp or udp'
* Dumped login from 210.207.255.44 -> 192.168.0.30 (User: '7075551234')
* Exiting, sniffed 1 logins
이제는 앞서 john-1.7.3.1으로 생성했던 6digits.txt 파일을 패킷 캡처 파일과 마찬가지로 SIPcrack-0.2 폴더로 복사하고 아래와 같은 명령어를 입력하여 sipcrack을 실행한다.
notepad@notepad:~/SIP/SIPcrack-0.2$ ./sipcrack -w 6digits.txt 070.dump
SIPcrack 0.2 ( MaJoMu |
www.codito.de )
----------------------------------------
* Found Accounts:
Num Server Client User Hash|Password
1 192.168.0.30 210.207.255.44 7075551234 e5969xxxxxxc676c4301c5xxxxxxe990
* Select which entry to crack (1 - 1): 1
* Password already cracked: '
123456 '
크랙을 원하는 항목을 선택하고 잠시 기다리면 위와 같이 패스워드가 '툭' 튀어나온다. 필자의 경우 2초도 채 걸리지 않았다.
비밀번호를 알아내고 나니 정말 허무하네요. VoIP의 보안이 얼마나 취약한지 알 수 있습니다. 공개된 장소에서의 VoIP 사용은 자제해야겠다는 생각만 자꾸드네요. 거듭 말씀드리지만 악의적인 목적으로는 이용하지 말아주시기 바랍니다. 필요한 프로그램들입니다. 일단 모두 받습니다.
http://www.codito.de/prog/SIPcrack-0.2.tar.gz
http://www.codito.de/prog/SIPcrack-0.3pre.tar.gz
http://www.openwall.com/john/g/john-1.7.3.1.tar.gz
http://www.tcpdump.org/release/libpcap-0.8.1.tar.gz
Crack 하기 위한 환경을 설정해봅시다.
1. 아무 리눅스 OS를 설치하고 root계정으로 로긴합니다. (gcc는 반드시 깔아야합니다)
2. libpcap-0.8.1.tar.gz 파일 압축을 풀고 컴파일 합니다. ./configure ./make install
3. 생성된 화일중 libpcap.a 화일을 /usr/lib 폴더에 복사하고, pcap.h bpf.h 화일을 /usr/include 로 복사합니다.
4. 3의 파일들은 sipcrack와 sipdump를 컴파일할때 필요한 라이브러리입니다.
5. sipcrack0.2에 있는 pcapstuff.h 화일을 0.3에 복사합니다.
6. make 하면 인스톨을 합니다. make install 하면 /usr/bin 에 복사되서... 어디서는 사용가능하게 됩니다.
7. john-1.7.3.1.tar.gz 의 압축을 푼뒤 src 폴더에서 make clean generic 으로 실행화일을 만듭니다.
sip 크래킹에 필요한 요소는 완료되었습니다.
이제 lg070 의 통화패킷을 가져올 차례입니다.
간편하게 얻을 수 있는 WireShark 를 이용합니다.
패킷을 뜨는 방법은 각자에게 맞겨두겠습니다.
집에 Dummy Hub 가 있다면 070 Ap 를 그쪽에 물리고 다른포트를 노트북에 연결해서 Dump를 뜨거나
Windows 의 공유기능을 이용해 두개의 랜카드 중 하나는 인터넷이 되도록 하고 하나는 070 Ap와 연결하여
공유기능을 통해 통화가 가능하도록 환경을 만들면 AP 와 연결된 랜카드를 통해서 Dump를 뜰 수 있을 것입니다.
방법은 많이 있으니 각자 환경에 맞는 방법을 찾으시기 바랍니다.
이렇게 얻어진 070.pcap 파일을 가지고 암호를 풀어보겠습니다.
1. ./john --incremental=digits --stdout=6 > 6number.txt
2. 캡쳐받은 화일의 을 가져온뒤 sipdump -p 070.pcap 070.dump
3. sipcrack -w 6number.txt 070.dump
만일 하나의 정보만 들어있다면 그냥 암호가 나올 것입니다.
아닐 경우는 자신의 070번호가 들어있는 메뉴를 선택해주면 됩니다.
4. 드디어 암호가 나왔습니다!
5. 이때 Client 라고 표기된 IP 주소를 기억해둡니다.
이제 X-Lite 에서 설정하는 일만 남았습니다.
SIP Account에 다음을 입력합니다.
1. Display Name : 07012341234(자신의 번호)
2. User Name : 7012341234(자신의 번호에서 맨앞의 0을 뺍니다)
3. Password : 아까 알아내셨죠?
4. Authorization user name : User name 과 같습니다.
5. Domain : lgdacom.net
6. Proxy : xxx.xxx.xxx.xxx:5060 (주소에 아까 기억해 두셨던 IP주소를 넣어주시고 뒤에 :5060을 붙입니다.)
network/VoIP 2010. 6. 29. 00:40
network/VoIP 2010. 6. 23. 10:48
http://www.hackingvoip.com/sec_tools.html
VoIP Security Tool List
This VoIP Security Tool List
provides categories, descriptions and links to current free and commercial VoIP
security tools. Each commercial tool is indicated by the following icon next to
it:
The key objectives of this list are as follows:
Provide links to tools that help test the efficacy of implemented best
practices outlined by VOIPSA's
Best Practices Project .
Facilitate the open discussion of VoIP security tool information to help
users better audit and defend their VoIP devices and deployments.
Provide vendors the information needed to proactively test their VoIP
devices' ability to function and withstand real-world attacks.
DISCLAIMER : Many of these tools can cause harm to
the normal operation of your VoIP network if used improperly. Before using any
tools, we recommend that you read the instructions and other d0cumentation
available on each of the individual tool's websites. By selecting almost any of
these links, you will be leaving VOIPSA's web space. These links and pointers
are provided for our visitors' convenience. Please be aware that we do not
control or guarantee the accuracy, relevance, timeliness, or completeness of
this outside information. No inferences should be drawn because some sites are
referenced, or not, from this page. There may be other tools that are more
appropriate for your purpose. In no event shall VOIPSA be liable for any direct,
indirect, incidental, punitive, or consequential damages of any kind whatsoever
with respect to this list. Further, VOIPSA does not endorse any commercial
products that may be mentioned in this list. These tools are only meant to be
used on networks with the permission of the network owner and in compliance with
the law.
Contents Quick Navigation
VoIP Sniffing
Tools
AuthTool - Tool that attempts to determine the password of a
user by analyzing SIP traffic.
Cain & Abel -
Multi-purpose tool with the capability to reconstruct RTP media calls.
CommView VoIP Analyzer - VoIP analysis module
for CommView that is suited for real-time capturing and analyzing Internet
telephony (VoIP) events, such as call flow, signaling sessions, registrations,
media streams, errors, etc.
Etherpeek - general purpose VoIP
and general ethernet sniffer.
ILTY ("I'm Listening To
You") - Open-source, multi-channel SKINNY sniffer.
NetDude - A
framework for inspection, analysis and manipulation of tcpdump trace files.
Oreka - Oreka is a
modular and cross-platform system for recording and retrieval of audio streams.
PSIPDump - psipdump is a tool for dumping SIP sessions (+RTP
traffic, if available) from pcap to disk in a fashion similar to "tcpdump -w".
rtpBreak - rtpBreak detects, reconstructs and analyzes any RTP
session through heuristics over the UDP network traffic. It works well with SIP,
H.323, SCCP and any other signaling protocol. In particular, it doesn't require
the presence of RTCP packets.
SIPomatic - SIP listener that's part of LinPhone
SIPv6 Analyzer - An Analyzer for SIP and IPv6.
UCSniff -
UCSniff is an assessment tool that allows users to rapidly test for the threat
of unauthorized VoIP eavesdropping. UCSniff supports SIP and Skinny signaling,
G.711-ulaw and G.722 codecs, and a MITM ARP Poisoning mode.
VoiPong - VoIPong is a utility which detects all Voice Over IP
calls on a pipeline, and for those which are G711 encoded, dumps actual
conversation to separate wave files. It supports SIP, H323, Cisco's Skinny
Client Protocol, RTP and RTCP.
VoIPong ISO Bootable - Bootable "Live-CD" disc version of
VoIPong.
VOMIT - The vomit
utility converts a Cisco IP phone conversation into a wave file that can be
played with ordinary sound players.
Wireshark - Formerly
Ethereal, the premier multi-platform network traffic analyzer.
WIST - Web Interface for SIP Trace - a PHP Web Interface that
permits you to connect on a remote host/port and capture/filter a SIP
dialog.
VoIP Scanning
and Enumeration Tools
EnableSecurity VoIPPack for CANVAS - VoIPPack is a set of
tools that are designed to work with Immunity CANVAS. The tools perform scans,
enumeration, and password attacks.
enumIAX
- An IAX2 (Asterisk) login enumerator using REGREQ messages.
iaxscan -
iaxscan is a Python based scanner for detecting live IAX/2 hosts and then
enumerating (by bruteforce) users on those hosts.
iWar - IAX2
protocol Wardialer
Nessus - The premier free
network vulnerability scanner.
nmap -
the premier open source network port scanner.
Passive Vulnerability Scanner - The Tenable Passive
Vulnerability Scanner (PVS) can find out what is happening on your network
without actively scanning it. PVS detects the actual protocol, various
administrative interfaces, and VoIP scanner(s). Currently includes over 40 VoIP
checks.
SCTPScan - This tool enumerates open SCTP ports without
establishing a full SCTP association with the remote host. You can also scan
whole networks to find SCTP-speaking machines.
SIP Forum Test Framework (SFTF) - The SIP Forum Test Framework
(SFTF) was created to allow SIP device vendors to test their devices for common
errors.
SIP-Scan - A
fast SIP network scanner
SIPcrack - SIPcrack is a SIP protocol login cracker. It
contains 2 programs, SIPdump to sniff SIP logins over the network and SIPcrack
to bruteforce the passwords of the sniffed login.
Sipflanker
- Sipflanker will help you find SIP devices with potentially vulnerable Web GUIs
in your network.
SIPSCAN - SIPSCAN is a SIP username enumerator that uses
INVITE, REGISTER, and OPTIONS methods.
SIPVicious Tool Suite - svmap, svwar, svcrack - svmap is a sip
scanner. It lists SIP devices found on an IP range. svwar identifies active
extensions on a PBX. svcrack is an online password cracker for SIP PBX
SiVuS
- A SIP Vulnerability Scanner.
SMAP - SIP Stack Fingerprinting Scanner
VLANping - VLANPing is a network pinging utility that can work
with a VLAN tag.
VoIPAudit - VoIP
specific scanning and vulnerability
scanner.
VoIP
Packet Creation and Flooding Tools
IAXFlooder - A packet flooder that creates IAX packets.
INVITE
Flooder - Send a flurry of SIP INVITE messages to a phone or proxy.
iThinkTest FlowCoder: SiPBlast - SIP Flood/Capacity
testing of infrastructure by emulating mass CPE call traffic
kphone-ddos -
Using KPhone for flooding attacks with spoofed SIP packets
NSAUDITOR - SIP UDP Traffic Generator - Flooder - SIP UDP
traffic generator / flooder generates SIP traffic to stress test voice over IP
systems, SIP programs and implementations under heavy network load. It is a very
simple and fast program which can simulate SIP client and call activity.
RTP
Flooder - Creates "well formed" RTP Packets that can flood a phone or proxy.
Scapy -
Scapy is a powerful interactive packet manipulation program. It can easily
handle most classical tasks like scanning, tracerouting, probing, unit tests,
attacks or network discovery.
Seagull
- a multi-protocol traffic generator especially targeted towards IMS.
SIPBomber - SIPBomber is sip-protocol testing tool for Linux.
SIPNess - SIPness Messenger is a SIP testing tool which is
used for testing SIP applications.
SIPp - SIPp is a
free Open Source test tool / traffic generator for the SIP protocol.
SIPsak - SIP swiss army
knife.
VoIP Fuzzing
Tools
Asteroid -
this is a set of malformed SIP methods (INVITE, CANCEL, BYE, etc.) that can be
crafted to send to any phone or proxy.
Codenomicon VoIP Fuzzers - Commercial versions of
the free PROTOS toolset
Fuzzy Packet - Fuzzy packet is a tool to manipulate messages
through the injection, capturing, receiving or sending of packets generated over
a network. Can fuzz RTP and includes built-in ARP poisoner.
Interstate
Fuzzer - VoIP Fuzzer
Mu
Dynamics VoIP, IPTV, IMS Fuzzing Platform - Fuzzing appliance for
SIP, Diameter, H.323 and MGCP protocols.
ohrwurm
- ohrwurm is a small and simple RTP fuzzer.
PROTOS H.323 Fuzzer - a java tool that sends a set of
malformed H.323 messages designed by the University of OULU in Finland.
PROTOS SIP Fuzzer - a java tool that sends a set of malformed
SIP messages designed by the University of OULU in Finland.
SIP Forum Test Framework (SFTF) - SFTF was created to allow
SIP device vendors to test their devices for common errors. And as a result of
these tests improve the interoperability of the devices on the market in
general.
Sip-Proxy - Acts as a proxy between a VoIP UserAgent and a
VoIP PBX. Exchanged SIP messages pass through the application and can be
recorded, manipulated, or fuzzed.
Spirent ThreatEx - a commercial protocol
fuzzer and ribustness tester.
VoIPER - VoIPER
is a security toolkit that aims to allow developers and security researchers to
easily, extensively and automatically test VoIP devices for security
vulnerabilties.
VoIP Signaling
Manipulation Tools
BYE
Teardown - This tool attempts to disconnect an active VoIP conversation by
spoofing the SIP BYE message from the receiving party.
Check Sync
Phone Rebooter - Transmits a special NOTIFY SIP message which will reboot
certain phones.
H225regregject - H225regreject is a tool is used to disconnect
H.323 calls. It first monitors the network in order to determine if a call is
taking place. Once a call has been identified, it then injects a Registration
Reject packet into the call.
IAXAuthJack - IAXAuthJack is a tool used to actively perform
an authentication downgrade attack and force an endpoint to reveal its password
in plaintext over the network.
IAXHangup - The IAXHangup is a tool is used to disconnect IAX
calls. It first monitors the network in order to determine if a call is taking
place. Once a call has been identified, it then injects a HANGUP control frame
into the call.
iThinkTest FlowCoder: SiPCPE - Evaluate SIP
infrastructure protocol compliance using inserted SIP messages.
RedirectPoison - this tool works in a SIP signaling
environment, to monitor for an INVITE request and respond with a SIP redirect
response, causing the issuing system to direct a new INVITE to another location.
Registration Adder - this tool attempts to bind another SIP
address to the target, effectively making a phone call ring in two places (the
legitimate user's desk and the attacker's)
Registration Eraser - this tool will effectively cause a
denial of service by sending a spoofed SIP REGISTER message to convince the
proxy that a phone/user is unavailable.
Registration Hijacker - this tool tries to spoof SIP REGISTER
messages in order to cause all incoming calls to be rerouted to the attacker.
SIP-Kill - Sniff
for SIP-INVITEs and tear down the call.
SIP-Proxy-Kill -
Tears down a SIP-Session at the last proxy before the opposite endpoint in the
signaling path.
SIP-RedirectRTP
- Manipulate SDP headers so that RTP packets are redirected to an RTP-proxy.
SipRogue - a multifunctional SIP proxy that can be inserted
between two talking parties
vnak - VoIP
Network Attack Toolkit - vnak combines a number of attacks against multiple
protocols in to one easy to use tool. Its aim is to be the one tool a user needs
to attack multiple VoIP protocols.
VoIPHopper - VoIP Hopper is a security validation tool that
tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates
a VLAN Hop into the Voice
VLAN.
VoIP Media
Manipulation Tools
RTP
InsertSound - this tool takes the contents of a .wav or tcpdump format file
and inserts the sound into an active conversation.
RTP
MixSound - this tool takes the contents of a .wav or tcpdump format file and
mixes the sound into an active conversation.
RTPInject - RTPInject is a minimal-setup prerequisites attack
tool that injects arbitrary audio into established RTP connections. The tool
identifies active conversations, enumerates the media codec in use, and allows
for the injection of an arbitrary audio file.
RTPProxy - Wait
for incoming RTP packets and send them to wanted (signaled by a tiny protocol)
destination.
SteganRTP - SteganRTP is a steganography tool which
establishes a full-duplex steganographic data transfer protocol utilizing
Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool
provides interactive chat, file transfer, and remote shell.
Vo²IP - With Vo2IP, you can establish a hidden conversation by
embedding further compressed voice data into regular PCM-based voice traffic
(i.e. G.711 codec).
Miscellaneous
Tools
IAX.Brute - IAX.Brute is a passive dictionary attack tool on
IAX's challenge/response authentication method. This attack allows malicious
users to steal passwords and hijack endpoint identities.
SIP-Send-Fun - Sip Send Fun is a tiny command-line based
Script, which exploits specific vulnerabilites.
SIP.Tastic - SIP.Tastic is a passive dictionary attack tool on
SIP's digest authentication method. This attack allows malicious users to steal
passwords and hijack endpoint identities.
Spitter - A set of tools for Asterisk to perform VoIP spam
testing.
VoIP
Security Audit Program (VSAP) - VSAP is an automated question/answer tool to
audit the security of VoIP networks (SIP/H.323/RTP). It provides security topics
and audit questions for the end user to complete. Once all the questions are
answered, VSAP will provide a final score.
XTest - A simple,
practical, and free, wired 802.1x supplicant security tool implementing the RFC
3847 EAP-MD5 Authentication
method.
Tool Tutorials
and Presentations
network/VoIP 2010. 6. 14. 18:24
http://voip.ssu.ac.kr/wiki.php/VoIP