SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Security Art | August 2011




       Sounds Like Botnet
Itzik Kotler, Chief Technology Officer
Iftach Ian Amit, VP Consulting




                                         www.security-art.com
Intro to VoIP
• It’s everywhere
  – Home (Vonage, Skype, TeamSpeak, Comcast,
    etc…)
  – Office (Cisco, Avaya, Lucent, Asterisk, etc…)
• Easy to deploy
  – Most are “plug and talk” with fancy web interfaces
    to configure features such as voicemail,
    forwarding, conference calls, etc…
Overview of SIP
• Request/Response model
• Responsible for setup/teardown of
  voice/video calls
• Designed to allow “piercing” of firewalls, NAT,
  etc…
• Security? meh… (basic identification, usually
  not required in most PBXs, easily sniffed…)
VoIP as a Getaway Car
• So… VoIP can traverse firewalls easily
• And can go outside the corporate network
  over PSTN lines (no internetz needed…)
• And is rarely monitored (“can you hear me
  now” ain’t gonna pass through the DLP…)
• EXFILTRATE!
What is a VoIP Botnet
•   Take your good ol’e botnet
•   Disconnect all C&C channels
•   Replace with VoIP
•   Profit?

• Fully mobilized (NAT piercing)
• Looks more legit (try to pick THAT out of the
  traffic)
• Harder to peek into (can you spell “whazzzzup?”
  in RTP?)
Who Needs a VoIP Botnet
• Well, everyone…

• Botmaster is more mobile (literally)
• More anonymous C&C servers (conf call bridge
  numbers are aplenty…)
• Can actually transfer fair amounts of data
  back/forth (remember the modem days?)
• It’s starting to show up as alternative methods of
  covert communications
   – Sorry spooks… 
VoIP Botnet in Action
• Red Team Penetration Testing Engagement
• Botnet in No Internet/Closed Networks
• Botnet for VoIP Phones
VoIP Botnet Architecture
• Telephony systems allows both Unicast and
  Multicast communication
• Unicast:
  – Bot calls Bot Master
  – Bot Master calls Bot (registered ext. on his PBX)
• Multicast:
  – Bot A calls Conference Call
  – Bot B calls Conference Call
  – Bot Master joins Conference Call
VoIP Botnet Architecture
• Conference Call as “IRC Channel”

        Bot


                                       Bot
  Bot               Conference Call
                                      Master


              Bot
The Call
• Calling can be made via TCP/IP or PSTN

                      Bot/Bot Master




    PSTN/VoIP Trunk                     TCP/IP (SIP, H.323,…)




                      Conference Call
Moshi Moshi
• Open-source VoIP Bot written in Python
  – Uses SIP as VoIP Protocol
  – Uses Text-to-speech Engines for Output
  – Uses DTMF Tones for Input


• Download your copy at:
  – http://code.google.com/p/moshimoshi/
Press 1 to Continue in l33t Speak
• DTMF (Dual-tone multi-frequency signaling)
  are used for signaling over telephone lines in
  the voice-frequency band between telephone
  handsets and other devices and switching
  centers.
• DTMF tones are standardized and can be sent
  and received from any phone
Asterisk as C&C and DTMF
• Asterisk is free software that transforms a
  computer into a communication server
• We’re using AsteriskNow 1.7.1 Linux Distribution
• MeetMe is a conference bridge for Asterisk
  and supports passing DTMF through the
  conference.
• To pass DTMF through the conference add ‘F’
  option to MEETME_OPTS at extensions.conf
DTMF Pass through/Relaying
• Conf. Call to relay DTMF to other calls

                                                Bot A

                                          Bot A: Heard 1#
           Pressed 1#
   Bot
                        Conference Call         Bot B
  Master

                                          Bot B: Heard 1#

                                                Bot C

                                          Bot C: Heard 1#
DTMF Tones as C&C
• The (made-up) Rules
  – ‘*’ is End of Line (EOL)
  – ‘#’ is a delimiter (i.e. Space)
• Examples
  – ‘0#*’ invoke command 0 without arguments
  – ‘1#123#*’ invoke command 1 with one arg ‘123’
  – ‘2#1#2#*’ invoke command 2 with args ‘1’ and ‘2’
• It’s your rules – go wild…
Ring, Ring!
Text-to-Speech as Data Leakage
• It's only natural that since we don’t have visuals
  in phone conversation, to use voice
• Passwords, documents, settings and
  acknowledgements can all be read back
• Some systems (Mac, Windows) includes built-in
  Text-to-Speech engines, others requires
  installation
• External utilities can be used to convert different
  formats (e.g. Microsoft Word) into simpler text
  files
Talk to me… Woo hoo!
The Getaway: Modulation
• Take any arbitrary binary data
• Devise a way to transform bytes to sounds
  – PoC: every ½ byte  one of 16 octaves within the
    human audible range (~200Hz - ~2000Hz)
• Record each ½ byte octave
  – PoC uses ½ second tones (for legibility in a
    conference )
• Music to my ears…
Demo: Binary Data Modulation -> Data
             Exfiltration
• Transform data to sound

• Dial, leave a message…

• Transform recorded message to data

• Profit?
ET Phone Home!
VoIP as VPN
• Alternative unmonitored Internet access
  – No DLP
  – No Firewalls
  – No IDS/IPS/DPI
• Allows using already-existing C&C protocols
  – IRC
  – HTTP
• Bot Master can easily explore his Botnet
  – nmap –sS 10.0.0.0/8
TCP/IP over VoIP
• Bring back Modems to the game
• Use V.42/HDLC/PPP protocols
                      • Works with Hardware Modems
       TCP
                      • Works with Software Modems
        IP
                      • Works within Voice frequency band
   V.42/HDLC/PPP
                      • Works under poor connectivity conditions
     SIP/RTSP
                      • Two-way communication channel
       UDP
        IP
Did You Hear That?
• VoIP Botnets are as good and even better in
  some cases, than IRC, P2P, and HTTP Botnets.
• VoIP Botnets strengths:
  – Can be operated from a payphone, or a Mobile.
  – Can be accessed from both PSTN and Internet
  – Are not blocked by your typical IDS/IPS signatures
Countermeasures
• Separate VoIP from Corporate Network
  – Yes, COMPLETELY!
• Monitor VoIP Activity
  – It’s your data. Same as you do for web/emails…
• Consider whitelisting Conf. Call Numbers
The Future Sound of Botnets
• Hearing is Believing
  – Speech-to-Text as Input
• Going Mobile
  – Text-to-SMS as Output
  – SMS-to-Voice Calls as Input
• Meeting new Appliances
  – T.38 (Fax) as Output (e.g. “Screen Shots”)
• Meeting old Appliances
  – Modem (PPP) as Input/Output (e.g. “Internal VPN”)
Questions?

Itzik Kotler (itzik.kotler@security-art.com)
Iftach Ian Amit (iamit@security-art.com)
Thanks!

Itzik Kotler (Twitter: @itzikkotler)
Iftach Ian Amit (Twitter: @iiamit)

Contenu connexe

Tendances

Designing Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource BoardsDesigning Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource Boards
Videoguy
 
Matrix vision presentation
Matrix vision presentationMatrix vision presentation
Matrix vision presentation
matrixtelesol
 
Pbx Presentation V021
Pbx Presentation V021Pbx Presentation V021
Pbx Presentation V021
nicklacey
 

Tendances (20)

Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video APIDevelop Smart Solutions with Raspberry Pi and EnableX Live Video API
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
 
Vo ip
Vo ipVo ip
Vo ip
 
Fortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIPFortinet Fortivoice - Solucion de UTM + VoIP
Fortinet Fortivoice - Solucion de UTM + VoIP
 
Polycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheetPolycom soundpoint ip450 data sheet
Polycom soundpoint ip450 data sheet
 
Designing Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource BoardsDesigning Triple-Play Apps Using DSP Resource Boards
Designing Triple-Play Apps Using DSP Resource Boards
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
Matrix vision presentation
Matrix vision presentationMatrix vision presentation
Matrix vision presentation
 
VoIP Monitoring and Troubleshooting
VoIP Monitoring and TroubleshootingVoIP Monitoring and Troubleshooting
VoIP Monitoring and Troubleshooting
 
Pi Is For Python
Pi Is For PythonPi Is For Python
Pi Is For Python
 
Voip In College
Voip In CollegeVoip In College
Voip In College
 
voip gateway
 voip gateway voip gateway
voip gateway
 
Pbx Presentation V021
Pbx Presentation V021Pbx Presentation V021
Pbx Presentation V021
 
Introduction to VoIP
Introduction to VoIPIntroduction to VoIP
Introduction to VoIP
 
Voip
VoipVoip
Voip
 
DTMF-project
DTMF-projectDTMF-project
DTMF-project
 
IPv6: A Digital Game Changer
IPv6: A Digital Game ChangerIPv6: A Digital Game Changer
IPv6: A Digital Game Changer
 
Audio conferencing
Audio conferencingAudio conferencing
Audio conferencing
 
small production house
small production house small production house
small production house
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
 

En vedette

Protecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and MalwareProtecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and Malware
Scott McDermott
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

En vedette (20)

Cross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brandsCross references- Proximity Switches among the known brands
Cross references- Proximity Switches among the known brands
 
Protecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and MalwareProtecting E-mail From SPAM and Malware
Protecting E-mail From SPAM and Malware
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Malware
MalwareMalware
Malware
 
Botnets
BotnetsBotnets
Botnets
 
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
Getting Started With bots
Getting Started With botsGetting Started With bots
Getting Started With bots
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Bot and Botnet Taxonomy
Bot and Botnet TaxonomyBot and Botnet Taxonomy
Bot and Botnet Taxonomy
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Network servers
Network serversNetwork servers
Network servers
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 

Similaire à Sounds Like Botnet

Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
Videoguy
 
Gaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMECGaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMEC
Gaurav Kumar
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
Adebayo Ojo
 

Similaire à Sounds Like Botnet (20)

Linux VOIP
Linux VOIP Linux VOIP
Linux VOIP
 
Voip introduction
Voip introductionVoip introduction
Voip introduction
 
VOIP security
VOIP securityVOIP security
VOIP security
 
cs522_presentation.ppt
cs522_presentation.pptcs522_presentation.ppt
cs522_presentation.ppt
 
Voice over IP: Issues and Protocols
Voice over IP: Issues and ProtocolsVoice over IP: Issues and Protocols
Voice over IP: Issues and Protocols
 
Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP Introduction to IP telephony & VoIP
Introduction to IP telephony & VoIP
 
Fun with Linux Telephony
Fun with Linux TelephonyFun with Linux Telephony
Fun with Linux Telephony
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
 
Gaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMECGaurav kumar VOIP MMMEC
Gaurav kumar VOIP MMMEC
 
[Carius] Skype Online, Teams, and PSTN
[Carius] Skype Online, Teams, and PSTN[Carius] Skype Online, Teams, and PSTN
[Carius] Skype Online, Teams, and PSTN
 
VOIP services
VOIP servicesVOIP services
VOIP services
 
Yeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configurationYeastar MyPBX-Basic configuration
Yeastar MyPBX-Basic configuration
 
Asterisk
Asterisk Asterisk
Asterisk
 
Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)Voice Over Internet Protocol (VOIP)
Voice Over Internet Protocol (VOIP)
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Voip
Voip Voip
Voip
 
Voip
VoipVoip
Voip
 
Voip
VoipVoip
Voip
 
VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)VoIP (Voice over Internet Protocol)
VoIP (Voice over Internet Protocol)
 
Understanding VoIP - 1
Understanding VoIP - 1Understanding VoIP - 1
Understanding VoIP - 1
 

Plus de Itzik Kotler

Plus de Itzik Kotler (6)

In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
 
Goodbye Data, Hello Exfiltration
Goodbye Data, Hello ExfiltrationGoodbye Data, Hello Exfiltration
Goodbye Data, Hello Exfiltration
 
Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)Hack Like It's 2013 (The Workshop)
Hack Like It's 2013 (The Workshop)
 
Turbot - A Next Generation Botnet
Turbot - A Next Generation BotnetTurbot - A Next Generation Botnet
Turbot - A Next Generation Botnet
 
The Day of the Updates
The Day of the UpdatesThe Day of the Updates
The Day of the Updates
 
Jinx - Malware 2.0
Jinx - Malware 2.0Jinx - Malware 2.0
Jinx - Malware 2.0
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Sounds Like Botnet

  • 1. Security Art | August 2011 Sounds Like Botnet Itzik Kotler, Chief Technology Officer Iftach Ian Amit, VP Consulting www.security-art.com
  • 2. Intro to VoIP • It’s everywhere – Home (Vonage, Skype, TeamSpeak, Comcast, etc…) – Office (Cisco, Avaya, Lucent, Asterisk, etc…) • Easy to deploy – Most are “plug and talk” with fancy web interfaces to configure features such as voicemail, forwarding, conference calls, etc…
  • 3. Overview of SIP • Request/Response model • Responsible for setup/teardown of voice/video calls • Designed to allow “piercing” of firewalls, NAT, etc… • Security? meh… (basic identification, usually not required in most PBXs, easily sniffed…)
  • 4. VoIP as a Getaway Car • So… VoIP can traverse firewalls easily • And can go outside the corporate network over PSTN lines (no internetz needed…) • And is rarely monitored (“can you hear me now” ain’t gonna pass through the DLP…) • EXFILTRATE!
  • 5. What is a VoIP Botnet • Take your good ol’e botnet • Disconnect all C&C channels • Replace with VoIP • Profit? • Fully mobilized (NAT piercing) • Looks more legit (try to pick THAT out of the traffic) • Harder to peek into (can you spell “whazzzzup?” in RTP?)
  • 6. Who Needs a VoIP Botnet • Well, everyone… • Botmaster is more mobile (literally) • More anonymous C&C servers (conf call bridge numbers are aplenty…) • Can actually transfer fair amounts of data back/forth (remember the modem days?) • It’s starting to show up as alternative methods of covert communications – Sorry spooks… 
  • 7. VoIP Botnet in Action • Red Team Penetration Testing Engagement • Botnet in No Internet/Closed Networks • Botnet for VoIP Phones
  • 8. VoIP Botnet Architecture • Telephony systems allows both Unicast and Multicast communication • Unicast: – Bot calls Bot Master – Bot Master calls Bot (registered ext. on his PBX) • Multicast: – Bot A calls Conference Call – Bot B calls Conference Call – Bot Master joins Conference Call
  • 9. VoIP Botnet Architecture • Conference Call as “IRC Channel” Bot Bot Bot Conference Call Master Bot
  • 10. The Call • Calling can be made via TCP/IP or PSTN Bot/Bot Master PSTN/VoIP Trunk TCP/IP (SIP, H.323,…) Conference Call
  • 11. Moshi Moshi • Open-source VoIP Bot written in Python – Uses SIP as VoIP Protocol – Uses Text-to-speech Engines for Output – Uses DTMF Tones for Input • Download your copy at: – http://code.google.com/p/moshimoshi/
  • 12. Press 1 to Continue in l33t Speak • DTMF (Dual-tone multi-frequency signaling) are used for signaling over telephone lines in the voice-frequency band between telephone handsets and other devices and switching centers. • DTMF tones are standardized and can be sent and received from any phone
  • 13. Asterisk as C&C and DTMF • Asterisk is free software that transforms a computer into a communication server • We’re using AsteriskNow 1.7.1 Linux Distribution • MeetMe is a conference bridge for Asterisk and supports passing DTMF through the conference. • To pass DTMF through the conference add ‘F’ option to MEETME_OPTS at extensions.conf
  • 14. DTMF Pass through/Relaying • Conf. Call to relay DTMF to other calls Bot A Bot A: Heard 1# Pressed 1# Bot Conference Call Bot B Master Bot B: Heard 1# Bot C Bot C: Heard 1#
  • 15. DTMF Tones as C&C • The (made-up) Rules – ‘*’ is End of Line (EOL) – ‘#’ is a delimiter (i.e. Space) • Examples – ‘0#*’ invoke command 0 without arguments – ‘1#123#*’ invoke command 1 with one arg ‘123’ – ‘2#1#2#*’ invoke command 2 with args ‘1’ and ‘2’ • It’s your rules – go wild…
  • 17. Text-to-Speech as Data Leakage • It's only natural that since we don’t have visuals in phone conversation, to use voice • Passwords, documents, settings and acknowledgements can all be read back • Some systems (Mac, Windows) includes built-in Text-to-Speech engines, others requires installation • External utilities can be used to convert different formats (e.g. Microsoft Word) into simpler text files
  • 18. Talk to me… Woo hoo!
  • 19. The Getaway: Modulation • Take any arbitrary binary data • Devise a way to transform bytes to sounds – PoC: every ½ byte  one of 16 octaves within the human audible range (~200Hz - ~2000Hz) • Record each ½ byte octave – PoC uses ½ second tones (for legibility in a conference ) • Music to my ears…
  • 20. Demo: Binary Data Modulation -> Data Exfiltration • Transform data to sound • Dial, leave a message… • Transform recorded message to data • Profit?
  • 22. VoIP as VPN • Alternative unmonitored Internet access – No DLP – No Firewalls – No IDS/IPS/DPI • Allows using already-existing C&C protocols – IRC – HTTP • Bot Master can easily explore his Botnet – nmap –sS 10.0.0.0/8
  • 23. TCP/IP over VoIP • Bring back Modems to the game • Use V.42/HDLC/PPP protocols • Works with Hardware Modems TCP • Works with Software Modems IP • Works within Voice frequency band V.42/HDLC/PPP • Works under poor connectivity conditions SIP/RTSP • Two-way communication channel UDP IP
  • 24. Did You Hear That? • VoIP Botnets are as good and even better in some cases, than IRC, P2P, and HTTP Botnets. • VoIP Botnets strengths: – Can be operated from a payphone, or a Mobile. – Can be accessed from both PSTN and Internet – Are not blocked by your typical IDS/IPS signatures
  • 25. Countermeasures • Separate VoIP from Corporate Network – Yes, COMPLETELY! • Monitor VoIP Activity – It’s your data. Same as you do for web/emails… • Consider whitelisting Conf. Call Numbers
  • 26. The Future Sound of Botnets • Hearing is Believing – Speech-to-Text as Input • Going Mobile – Text-to-SMS as Output – SMS-to-Voice Calls as Input • Meeting new Appliances – T.38 (Fax) as Output (e.g. “Screen Shots”) • Meeting old Appliances – Modem (PPP) as Input/Output (e.g. “Internal VPN”)
  • 28. Thanks! Itzik Kotler (Twitter: @itzikkotler) Iftach Ian Amit (Twitter: @iiamit)