Soumettre la recherche
Mettre en ligne
Internet of Terrible: Can you hear me meow?
•
Télécharger en tant que PPTX, PDF
•
0 j'aime
•
190 vues
B
Brandon McCrillis
Suivre
Brandon McCrillis BSides Augusta 2016 -- Attacking VoIP and other Embedded Devices
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 71
Télécharger maintenant
Recommandé
Living with the threat of Determined Attackers - RANT0214
Living with the threat of Determined Attackers - RANT0214
James '-- Mckinlay
IPv6 Performance
IPv6 Performance
APNIC
Mirai botnet
Mirai botnet
OWASP
Living with Determined Attackers MOSI Edition
Living with Determined Attackers MOSI Edition
James '-- Mckinlay
Optimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX Plus
Christian Folini
Mod Security
Mod Security
Abhishek Singh
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy
Slides from IPv6 Threats
Slides from IPv6 Threats
Cyren, Inc
Recommandé
Living with the threat of Determined Attackers - RANT0214
Living with the threat of Determined Attackers - RANT0214
James '-- Mckinlay
IPv6 Performance
IPv6 Performance
APNIC
Mirai botnet
Mirai botnet
OWASP
Living with Determined Attackers MOSI Edition
Living with Determined Attackers MOSI Edition
James '-- Mckinlay
Optimizing ModSecurity on NGINX and NGINX Plus
Optimizing ModSecurity on NGINX and NGINX Plus
Christian Folini
Mod Security
Mod Security
Abhishek Singh
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy
Slides from IPv6 Threats
Slides from IPv6 Threats
Cyren, Inc
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber Security
Cisco Canada
Umbrella roaming-customer-facing
Umbrella roaming-customer-facing
Ricardo Mendizabal
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
Scalar Decisions
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
Shain Singh
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Canada
LambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless Application
James Wickett
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Canada
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6
SalmenHAJJI1
Novosco Zero day protection webinar
Novosco Zero day protection webinar
Novosco
CCNP Security-Firewall
CCNP Security-Firewall
mohannadalhanahnah
Shape your remote connection to your GCE instance
Shape your remote connection to your GCE instance
DevOps Indonesia
Security and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
How to Build Advanced Voice Assistants and Chatbots
How to Build Advanced Voice Assistants and Chatbots
Cisco DevNet
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
ITCamp
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Canada
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
PCI Compliance for Hipsters
PCI Compliance for Hipsters
Phillip Jackson
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
centralohioissa
Accelerating IoT Development: Developerweek SF 2018
Accelerating IoT Development: Developerweek SF 2018
Soracom Global, Inc.
Cisco Spark & Tropo API Workshop
Cisco Spark & Tropo API Workshop
Cisco DevNet
Build advanced Voice Assistants and Chat Bots - Stève Sfartz - Codemotion Mil...
Build advanced Voice Assistants and Chat Bots - Stève Sfartz - Codemotion Mil...
Codemotion
Contenu connexe
Tendances
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber Security
Cisco Canada
Umbrella roaming-customer-facing
Umbrella roaming-customer-facing
Ricardo Mendizabal
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
Scalar Decisions
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
Shain Singh
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Canada
LambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless Application
James Wickett
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Canada
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6
SalmenHAJJI1
Novosco Zero day protection webinar
Novosco Zero day protection webinar
Novosco
CCNP Security-Firewall
CCNP Security-Firewall
mohannadalhanahnah
Shape your remote connection to your GCE instance
Shape your remote connection to your GCE instance
DevOps Indonesia
Tendances
(11)
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber Security
Umbrella roaming-customer-facing
Umbrella roaming-customer-facing
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
Decrypting and Selectively Inspecting Modern Traffic
Decrypting and Selectively Inspecting Modern Traffic
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
LambHack: A Vulnerable Serverless Application
LambHack: A Vulnerable Serverless Application
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Ccna sv2 instructor_ppt_ch6
Ccna sv2 instructor_ppt_ch6
Novosco Zero day protection webinar
Novosco Zero day protection webinar
CCNP Security-Firewall
CCNP Security-Firewall
Shape your remote connection to your GCE instance
Shape your remote connection to your GCE instance
Similaire à Internet of Terrible: Can you hear me meow?
Security and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
How to Build Advanced Voice Assistants and Chatbots
How to Build Advanced Voice Assistants and Chatbots
Cisco DevNet
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
ITCamp
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Canada
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
PCI Compliance for Hipsters
PCI Compliance for Hipsters
Phillip Jackson
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
centralohioissa
Accelerating IoT Development: Developerweek SF 2018
Accelerating IoT Development: Developerweek SF 2018
Soracom Global, Inc.
Cisco Spark & Tropo API Workshop
Cisco Spark & Tropo API Workshop
Cisco DevNet
Build advanced Voice Assistants and Chat Bots - Stève Sfartz - Codemotion Mil...
Build advanced Voice Assistants and Chat Bots - Stève Sfartz - Codemotion Mil...
Codemotion
Cisco Live: Containers on Enterprise Compute and Networks
Cisco Live: Containers on Enterprise Compute and Networks
Michael Duarte
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
APNIC
Today's Predictions for Tomorrow's Connected World
Today's Predictions for Tomorrow's Connected World
Symantec
Cisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful Technology
Cisco Canada
Brksec 2048-demystifying aci-security
Brksec 2048-demystifying aci-security
Cisco
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Canada
Ignite your network digitize your business
Ignite your network digitize your business
Cisco Canada
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
Cyren, Inc
Using the SDACK Architecture on Security Event Inspection
Using the SDACK Architecture on Security Event Inspection
Yu-Lun Chen
Similaire à Internet of Terrible: Can you hear me meow?
(20)
Security and Virtualization in the Data Center
Security and Virtualization in the Data Center
How to Build Advanced Voice Assistants and Chatbots
How to Build Advanced Voice Assistants and Chatbots
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
PCI Compliance for Hipsters
PCI Compliance for Hipsters
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Accelerating IoT Development: Developerweek SF 2018
Accelerating IoT Development: Developerweek SF 2018
Cisco Spark & Tropo API Workshop
Cisco Spark & Tropo API Workshop
Build advanced Voice Assistants and Chat Bots - Stève Sfartz - Codemotion Mil...
Build advanced Voice Assistants and Chat Bots - Stève Sfartz - Codemotion Mil...
Cisco Live: Containers on Enterprise Compute and Networks
Cisco Live: Containers on Enterprise Compute and Networks
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
Today's Predictions for Tomorrow's Connected World
Today's Predictions for Tomorrow's Connected World
Cisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful Technology
Brksec 2048-demystifying aci-security
Brksec 2048-demystifying aci-security
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Ignite your network digitize your business
Ignite your network digitize your business
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
Using the SDACK Architecture on Security Event Inspection
Using the SDACK Architecture on Security Event Inspection
Dernier
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Remote DBA Services
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Dernier
(20)
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Internet of Terrible: Can you hear me meow?
1.
Internet of Terrible Can you
hear me meow?
2.
©2016 RSEC.US -=-
Brandon McCrillis • Name: Brandon McCrillis • Company: Rendition InfoSec • Email: brandon@renditioninfosec.com • URL: RSEC.US • Twitter: @13M4C • Model: DA243A-ABA 6415cl NA910 • TotalPhysicalMemory: 804765696 Get-WmiObject -Class Win32_ComputerSystem
3.
©2016 RSEC.US -=-
Brandon McCrillis Objectives: Discuss case studies of conducting network enumeration using VoIP infrastructure and other embedded devices
4.
©2016 RSEC.US -=-
Brandon McCrillis Objectives: Highlight attack methodologies that can be used for credential harvesting, enumeration, denial of service, and persistence
5.
©2016 RSEC.US -=-
Brandon McCrillis Objectives: Practical Defensive techniques and real-world attacker mitigations via monitoring and secure configuration
6.
©2016 RSEC.US -=-
Brandon McCrillis Objectives: Therapeutically work through some *minor* cat issues
7.
©2016 RSEC.US -=-
Brandon McCrillis Times have changed…
8.
©2016 RSEC.US -=-
Brandon McCrillis The Internet of Terrible CSI++
9.
©2016 RSEC.US -=-
Brandon McCrillis IoT: All the things!
10.
©2016 RSEC.US -=-
Brandon McCrillis©2016 RSEC.US Spy-on-you Barbie!
11.
Embedded Devices …Doing things
with stuff
12.
©2016 RSEC.US -=-
Brandon McCrillis Embedded Devices In-flight Entertainment
13.
Much Services, Many
Lulz Y’know, living off the land…
14.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
15.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
16.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
17.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
18.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
19.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
20.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
21.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
22.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
23.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
24.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
25.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
26.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
27.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
28.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
29.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
30.
©2016 RSEC.US -=-
Brandon McCrillis Real-world Assessments…
31.
Voice over IP …Teh
VoIP
32.
©2016 RSEC.US -=-
Brandon McCrillis What is VoIP?
33.
©2016 RSEC.US -=-
Brandon McCrillis What is Asterisk?
34.
Where it’s at.. Two
turn-tables and a Polycom phone
35.
©2016 RSEC.US -=-
Brandon McCrillis What’s in the box…
36.
©2016 RSEC.US -=-
Brandon McCrillis Reduce, Reuse, Recycle
37.
©2016 RSEC.US -=-
Brandon McCrillis Can you hear me meow?
38.
©2016 RSEC.US -=-
Brandon McCrillis Factory Reset Devices pls!
39.
©2016 RSEC.US -=-
Brandon McCrillis Meh?
40.
©2016 RSEC.US -=-
Brandon McCrillis I have wut u need…
41.
©2016 RSEC.US -=-
Brandon McCrillis Default SoundPoint 501 Creds • Default TFTP || FTP: username: PlcmSpIp password: PlcmSpIp • DEFAULT HTTP: username: Polycom password: 456 Default User Pass: 123 Default Admin Pass: 456
42.
©2016 RSEC.US -=-
Brandon McCrillis Ye Old Web GUI
43.
©2016 RSEC.US -=-
Brandon McCrillis Sure, I’ll bite…
44.
©2016 RSEC.US -=-
Brandon McCrillis Sure, I’ll bite…
45.
©2016 RSEC.US -=-
Brandon McCrillis Base64 Decode Polycom : 456
46.
©2016 RSEC.US -=-
Brandon McCrillis AsteriskNOW
47.
©2016 RSEC.US -=-
Brandon McCrillis AsteriskNOW
48.
©2016 RSEC.US -=-
Brandon McCrillis AsteriskNOW
49.
Attacking VoIP …Calling your
mother
50.
©2016 RSEC.US -=-
Brandon McCrillis • Information Gathering / Enumeration • Monitoring and Eavesdropping • Attacking Authentication • VLAN Hopping • Denial of Service / Flooding • Spoofing Caller ID Common Attack Vectors
51.
VoIP Weaponized I shouldn’t
be able to do this!
52.
©2016 RSEC.US -=-
Brandon McCrillis Oh so sexy….
53.
©2016 RSEC.US -=-
Brandon McCrillis CHECK-SYNC Many vendors allow for a remote reboot of phones to facilitate SIP configuration updates. When an attacker 0wn yer VoIP
54.
©2016 RSEC.US -=-
Brandon McCrillis CHECK-SYNC When an attacker 0wn yer VoIP
55.
©2016 RSEC.US -=-
Brandon McCrillis CHECK-SYNC Using this for pure evil, an attacker can force consumption of a tampered configuration to the phone… unauthenticated. When an attacker 0wn yer VoIP
56.
©2016 RSEC.US -=-
Brandon McCrillis CHECK-SYNC Check-sync DoS When an attacker 0wn yer VoIP
57.
©2016 RSEC.US -=-
Brandon McCrillis • Python-based SIP Packet Forging Tool by Pietro Bertera (bertera.it) https://github.com/pbertera/SIPPing Also, wrote a blog post regarding SIP packet filtering using iptables SIPPing …FTW!
58.
©2016 RSEC.US -=-
Brandon McCrillis Crafted check-sync packet
59.
©2016 RSEC.US -=-
Brandon McCrillis SPECIAL EXTENSIONS Configuration of a “special extension” with auto-answer can force the phone to answer a call (without ringing) and immediately force the speakerphone mic to listen. …a real time audio feed… without user interaction or knowledge. When an attacker 0wn yer VoIP
60.
©2016 RSEC.US -=-
Brandon McCrillis SPECIAL EXTENSIONS When an attacker 0wn yer VoIP
61.
©2016 RSEC.US -=-
Brandon McCrillis SPECIAL EXTENSIONS When an attacker 0wn yer VoIP
62.
©2016 RSEC.US -=-
Brandon McCrillis VLAN Hopping Often times VoIP VLANs are not monitored (read: trusted) -- “Plug and Play” hopping… When an attacker 0wn yer VoIP
63.
©2016 RSEC.US -=-
Brandon McCrillis VLAN Hopping When an attacker 0wn yer VoIP
64.
©2016 RSEC.US -=-
Brandon McCrillis VLAN Hopping When an attacker 0wn yer VoIP
65.
©2016 RSEC.US -=-
Brandon McCrillis More phun with VoIP auxillary/voip auxillary/scanner/sip SIPvicious / SIPdump / SIPCrack Kali/Metasploit
66.
©2016 RSEC.US -=-
Brandon McCrillis Future Development • SIP Tunneling • Exploit and Exfiltration Framework • Enumeration of trusted devices within the information system • Flashing Custom Firmware
67.
©2016 RSEC.US -=-
Brandon McCrillis Trusted can’t be trusted Wrapping it up… ©2016 RSEC.US
68.
©2016 RSEC.US -=-
Brandon McCrillis Secure configuration and Monitoring FTW! Wrapping it up… ©2016 RSEC.US
69.
©2016 RSEC.US -=-
Brandon McCrillis Know your network better than I will Wrapping it up… ©2016 RSEC.US
70.
©2016 RSEC.US -=-
Brandon McCrillis The Last Meow…
71.
QUESTIONS? Brandon McCrillis brandon@renditioninfosec.com @13M4C
Télécharger maintenant