Phree as in Phone Call
  The other end of the line




           Presented By: john@security-assessment.com
                                  © 2008 Security-Assessment.com
FILE_ID.DIZ

 Advantages of phreaking with VoIP
     Modern dialing setup
 Modern wardialing and scanning techniques
     Identifying and classifying devices
 Hacking dial-in lines
     System types and login attacks
 IVR and voicemail systems
     PIN brute-forcing
 PaBX’s
     Exploiting features
     Eavesdropping and data-mining



                                              © 2008 Security-Assessment.com
Advantages of phreaking with VoIP

 International destinations much more accessible
     VoIP is cheap
     Can scam free VoIP
 Don’t need to scan from home anymore
     Less knocks at the door
 Parallelization
     Can run savage burns
 Easier to perform certain attacks
     CallerID spoofing
 Automates hand scanning
     Callus free!



                                                    © 2008 Security-Assessment.com
Modems and VoIP

 Most people think it can’t be done
    Complex codecs cause havoc to connections
    Modems can’t connect
    Connections drop
 It can be done!
    What you need
    How to tweak it




                                                 © 2008 Security-Assessment.com
What you need

 Modems




           © 2008 Security-Assessment.com
What you need

 Analog telephony adaptors (ATA)




                                    © 2008 Security-Assessment.com
What you need

 VoIP account
    Lots of cheap providers
        voipjet.com
        voipbuster.com
    Trial accounts
        Free calls
 Asterisk server
    Routing
    Call recording
    CallerID spoofing




                               © 2008 Security-Assessment.com
Device configuration tricks

 ATA
   Compression disabled (G.711 ulaw!)
   No echo cancellation (*99 on PAP2)
 Modem
   Disable local flow control
   Error-correction
   Disable data-compression
   Limit the data rate to 1200 bps for scans




                                                      © 2008 Security-Assessment.com
Modem connection using VoIP




        © 2008 Security-Assessment.com
What can you connect to?

 Modems all over the world
     Control systems
     SCADA systems
     Alarm systems
 International x.25 networks
     India, Africa, Russia, China…
     Banking
 Other interesting stuff
     Obscure devices and networks
     Bulletin boards (yep!)
     Who knows? The PSTN is global!



                                            © 2008 Security-Assessment.com
What can you connect to?

 SCADA system example




                              © 2008 Security-Assessment.com
Wardialing

 Automatically dialing numbers to find modems
    Target identification
    Inventory building
 Risks
    Time of day
    Randomize numbers!
 Modern Wardialing
    Use VoIP, UNIX and Asterisk
    The Intelligent Wardialer (iWar)




                                                 © 2008 Security-Assessment.com
Wardialing

 iWar
    Multiple modems are no problems!
          Serial to usb adapters
          Scaleable banks of modems with limitless potentional
    Remote system identification (126 banners)
    MySQL support
    CNAM lookup feature
    Blacklist support




                                                       © 2008 Security-Assessment.com
Wardialing

 iWar in serial mode




                        © 2008 Security-Assessment.com
Wardialing

 What will we find?
    Routers
    Remote access servers
    PPP dialins
    PC Anywhere
    PaBX management systems
    IVR systems
    Network backdoors
    Outdials
    Diverters (dialtones)
    Unknown and forgotten devices



                                     © 2008 Security-Assessment.com
Wardialing

 Reducing time with blacklists
    Internal / employee directories
    DDI’s and other numbers harvested from websites
    Business directories
        Websites
        CDROMs
    Fax directories
    Do-not-call lists
 Special ranges
    Telco test equipment




                                                  © 2008 Security-Assessment.com
Wardialing

 Published research
    Peter Shipley dialed 5.7M numbers over three years
        50,000 carriers found
 Found unauthenticated access to
    Fire Department's dispatch system
    Control system for high-voltage power transmission line
    Internal networks of financial organizations
    A leased line control system
    Credit card number databases
    Medical billing records.




                                                     © 2008 Security-Assessment.com
Wardialing

 THC-Scan: Next Generation
    Distributed wardialer!
        Large modem pools
    Large scan ranges - (09) 3XXXXXX
    Global scanning efforts
        Log sharing and karma systems




                                         © 2008 Security-Assessment.com
Wardialing

 Callus-free handscanning
    iWar with IAX2 connection
        Wifi at café, etc
        Headphones
        Time and patience
    Upsides
        Safe and anonymous
        Mostly automated
        Handsfree!




                                 © 2008 Security-Assessment.com
Hacking dial-in lines

 Figuring out what you’re dealing with
    System types and banners
    Identifying different type login prompts and methods
    Building username and password lists
        Google for defaults
 Login Brute-forcing
    Tools
    Homebrew scripting




                                                     © 2008 Security-Assessment.com
Hacking dial-in lines

 System types and banners




                             © 2008 Security-Assessment.com
Hacking dial-in lines

 System types and banners




                             © 2008 Security-Assessment.com
Hacking dial-in lines

 Different login prompts and methods
    Single auth
    Dual auth
    Limited or unlimited attempts?
    Username, password or both?




                                        © 2008 Security-Assessment.com
Login brute forcing

 Tools
    Commercial war dialers (lame)
    Modem login hacker for Linux
    X.25 NUI/NUA scanners
 Homebrew
    Minicom runscript
    Python serial library
    Procomm plus aspect script




                                     © 2008 Security-Assessment.com
Login brute forcing

   Modem Login Hacker
     Works against any ‘Username:’ or ‘Login:’ variations
         Unix, Cisco, PaBXs
     Customizable for different login formats
     Includes PPP brute-forcing tool!




                                                         © 2008 Security-Assessment.com
IVRs and voicemail

 Fingerprinting voicemail systems
    Default prompts
        Default mailbox numbers and PINs
        Admin mailbox
    “Nudges” (*8, *81, *, #, 0)
    Can you find the admin console?
 CallerID spoofing attacks
    ANI or CID authentication is very bad!
 Call forwarding and out-dials
    Free calls




                                              © 2008 Security-Assessment.com
IVRs and voicemail

 Launching a PIN brute force attack
    Things to figure out
        Dial-in numbers and PIN length
        Numbering format for mailboxes
        Method of getting to the PIN prompt




                                               © 2008 Security-Assessment.com
PIN brute forcing

 Metalstorms mighty Hai2IVR
    SIP-client for brute forcing DTMF prompts
    Can record calls and scan in parallel
    GUI for sorting and listening to the results
    Doubles as PaBX extension war dialer




                                                    © 2008 Security-Assessment.com
PIN brute forcing

 Components
    Hai2IVR GTK interface
        Handles the parallelization
        GUI for reviewing results
    metlodtmfzor
        Makes the calls and sends the DTMF
        Command line scriptable
 Hai2IVR setup
    Route through Asterisk
        Authenticated SIP
        CID spoofing



                                              © 2008 Security-Assessment.com
Predictable PINs

 Keypad patterns
     Making shapes
         L, X, O
     Repeating numbers
         2244, 9988
     Patterns
 Other lists
     Birth dates
     Pop culture references
         1984, 1337 (WiteRabits PIN)
     Word numbers
         Hell, love, krad, sexy

                                        © 2008 Security-Assessment.com
Predictable PINs




© 2008 Security-Assessment.com
Predictable PINs

 PINPop.com
    Research project into predictable PINs
    PIN database analysis
 Goals
    Secure PIN selection patches to Asterisk
    Whitepaper on PIN selection psychology




                                                © 2008 Security-Assessment.com
PaBX hacking

 Attack categories
    Theft of service
    Routing manipulation
    Traffic analysis (stealing CDR’s)
    Social engineering
    Eavesdropping




                                         © 2008 Security-Assessment.com
PaBX hacking

   The Holy Grail
      Access to the maintenance console
          Dial-in lines, extensions, computers
   Feature exploits
      Conferencing
      Three-way calling
      Call forwarding
      Direct Inwards System Access (DISA)
      Test features that remotely activate mics
   Theft of CDR’s
      Industrial espionage
   Advanced auditing
      Free Space Invaders: reverse engineering


                                                   © 2008 Security-Assessment.com
PaBX hacking

 Maintenance console banners




                                © 2008 Security-Assessment.com
PaBX hacking

 A hacked Meridian management console can:
    Setup trunks to allow outgoing calls
    Manipulate trunks
        Re-route incoming / outgoing calls
    Eavesdrop extensions
    Set a Meridian Mail box to auto logon temporarily
    Shut down the PaBX
    Make phones ring infinitely
    Trace calls through CDR records
    Steal CDRs




                                                     © 2008 Security-Assessment.com
PaBX hacking

 Lockdown methods
    Restricted out dialing
    Forwarding features disabled
    Enforced minimum PIN size
    Unused boxes deactivated
    Lockout counters with manual reset
    Timeouts on setup of new mailboxes
    Challenge response systems
        US Government classified VMSs need SecureID’s
    Logging




                                                   © 2008 Security-Assessment.com
PaBX hacking

 CDR’s and datamining
    Sensitive information can be gleaned from call records
        Who called who and when
        Current and potential clients, contractors
        Recent company activities
 AMDOCS Example
    Handles billing for most American telcos
    FBI and NSA investigation into sending CDRs offshore
    Possibility of Israeli's spying on American's through CDRs




                                                      © 2008 Security-Assessment.com
The infinite power of Asterisk

 Custom setups
    Testing environment for tools
    Anonymous voicemail servers
    Encrypted voice
    Private networks like DetoVoIP and Telephreak
    Rogue PaBX’s for evesdropping
 Custom features
    ProjectMF: A trip down phone-phreak memory lane
        Asterisk patches to support MF in-band signaling
        Lets you bluebox telephone calls
        Simulation of old (but not dead?) networks



                                                      © 2008 Security-Assessment.com
The infinite power of Asterisk

 Blueboxing through a ProjectMF test server




                                                        © 2008 Security-Assessment.com
The infinite power of Asterisk

 Call the ProjectMF server
    Get dropped to a C5 trunk
    Hold the phone up to the speakers
    Seize the trunk with a 1 second burst of 2600Hz
    Send KP + 12588+ ST in multi-frequency tones (MF)
    Call connects
    Re-seize, repeat




                                                       © 2008 Security-Assessment.com
Thanks

 Thanks & greats to:
    SA.com
    SLi
    Andrew Horton
    Metlstorm
    Detonate
    Kiwicon crew
    Beave
    Jfalcon
    M4phr1k




                        © 2008 Security-Assessment.com
NO CARRIER




http://www.security-assessment.com
   john@security-assessment.com




                                © 2008 Security-Assessment.com

Phree As In Phone Call

  • 1.
    Phree as inPhone Call The other end of the line Presented By: [email protected] © 2008 Security-Assessment.com
  • 2.
    FILE_ID.DIZ  Advantages ofphreaking with VoIP  Modern dialing setup  Modern wardialing and scanning techniques  Identifying and classifying devices  Hacking dial-in lines  System types and login attacks  IVR and voicemail systems  PIN brute-forcing  PaBX’s  Exploiting features  Eavesdropping and data-mining © 2008 Security-Assessment.com
  • 3.
    Advantages of phreakingwith VoIP  International destinations much more accessible  VoIP is cheap  Can scam free VoIP  Don’t need to scan from home anymore  Less knocks at the door  Parallelization  Can run savage burns  Easier to perform certain attacks  CallerID spoofing  Automates hand scanning  Callus free! © 2008 Security-Assessment.com
  • 4.
    Modems and VoIP Most people think it can’t be done  Complex codecs cause havoc to connections  Modems can’t connect  Connections drop  It can be done!  What you need  How to tweak it © 2008 Security-Assessment.com
  • 5.
    What you need Modems © 2008 Security-Assessment.com
  • 6.
    What you need Analog telephony adaptors (ATA) © 2008 Security-Assessment.com
  • 7.
    What you need VoIP account  Lots of cheap providers  voipjet.com  voipbuster.com  Trial accounts  Free calls  Asterisk server  Routing  Call recording  CallerID spoofing © 2008 Security-Assessment.com
  • 8.
    Device configuration tricks ATA  Compression disabled (G.711 ulaw!)  No echo cancellation (*99 on PAP2)  Modem  Disable local flow control  Error-correction  Disable data-compression  Limit the data rate to 1200 bps for scans © 2008 Security-Assessment.com
  • 9.
    Modem connection usingVoIP © 2008 Security-Assessment.com
  • 10.
    What can youconnect to?  Modems all over the world  Control systems  SCADA systems  Alarm systems  International x.25 networks  India, Africa, Russia, China…  Banking  Other interesting stuff  Obscure devices and networks  Bulletin boards (yep!)  Who knows? The PSTN is global! © 2008 Security-Assessment.com
  • 11.
    What can youconnect to?  SCADA system example © 2008 Security-Assessment.com
  • 12.
    Wardialing  Automatically dialingnumbers to find modems  Target identification  Inventory building  Risks  Time of day  Randomize numbers!  Modern Wardialing  Use VoIP, UNIX and Asterisk  The Intelligent Wardialer (iWar) © 2008 Security-Assessment.com
  • 13.
    Wardialing  iWar  Multiple modems are no problems!  Serial to usb adapters  Scaleable banks of modems with limitless potentional  Remote system identification (126 banners)  MySQL support  CNAM lookup feature  Blacklist support © 2008 Security-Assessment.com
  • 14.
    Wardialing  iWar inserial mode © 2008 Security-Assessment.com
  • 15.
    Wardialing  What willwe find?  Routers  Remote access servers  PPP dialins  PC Anywhere  PaBX management systems  IVR systems  Network backdoors  Outdials  Diverters (dialtones)  Unknown and forgotten devices © 2008 Security-Assessment.com
  • 16.
    Wardialing  Reducing timewith blacklists  Internal / employee directories  DDI’s and other numbers harvested from websites  Business directories  Websites  CDROMs  Fax directories  Do-not-call lists  Special ranges  Telco test equipment © 2008 Security-Assessment.com
  • 17.
    Wardialing  Published research  Peter Shipley dialed 5.7M numbers over three years  50,000 carriers found  Found unauthenticated access to  Fire Department's dispatch system  Control system for high-voltage power transmission line  Internal networks of financial organizations  A leased line control system  Credit card number databases  Medical billing records. © 2008 Security-Assessment.com
  • 18.
    Wardialing  THC-Scan: NextGeneration  Distributed wardialer!  Large modem pools  Large scan ranges - (09) 3XXXXXX  Global scanning efforts  Log sharing and karma systems © 2008 Security-Assessment.com
  • 19.
    Wardialing  Callus-free handscanning  iWar with IAX2 connection  Wifi at café, etc  Headphones  Time and patience  Upsides  Safe and anonymous  Mostly automated  Handsfree! © 2008 Security-Assessment.com
  • 20.
    Hacking dial-in lines Figuring out what you’re dealing with  System types and banners  Identifying different type login prompts and methods  Building username and password lists  Google for defaults  Login Brute-forcing  Tools  Homebrew scripting © 2008 Security-Assessment.com
  • 21.
    Hacking dial-in lines System types and banners © 2008 Security-Assessment.com
  • 22.
    Hacking dial-in lines System types and banners © 2008 Security-Assessment.com
  • 23.
    Hacking dial-in lines Different login prompts and methods  Single auth  Dual auth  Limited or unlimited attempts?  Username, password or both? © 2008 Security-Assessment.com
  • 24.
    Login brute forcing Tools  Commercial war dialers (lame)  Modem login hacker for Linux  X.25 NUI/NUA scanners  Homebrew  Minicom runscript  Python serial library  Procomm plus aspect script © 2008 Security-Assessment.com
  • 25.
    Login brute forcing  Modem Login Hacker  Works against any ‘Username:’ or ‘Login:’ variations  Unix, Cisco, PaBXs  Customizable for different login formats  Includes PPP brute-forcing tool! © 2008 Security-Assessment.com
  • 26.
    IVRs and voicemail Fingerprinting voicemail systems  Default prompts  Default mailbox numbers and PINs  Admin mailbox  “Nudges” (*8, *81, *, #, 0)  Can you find the admin console?  CallerID spoofing attacks  ANI or CID authentication is very bad!  Call forwarding and out-dials  Free calls © 2008 Security-Assessment.com
  • 27.
    IVRs and voicemail Launching a PIN brute force attack  Things to figure out  Dial-in numbers and PIN length  Numbering format for mailboxes  Method of getting to the PIN prompt © 2008 Security-Assessment.com
  • 28.
    PIN brute forcing Metalstorms mighty Hai2IVR  SIP-client for brute forcing DTMF prompts  Can record calls and scan in parallel  GUI for sorting and listening to the results  Doubles as PaBX extension war dialer © 2008 Security-Assessment.com
  • 29.
    PIN brute forcing Components  Hai2IVR GTK interface  Handles the parallelization  GUI for reviewing results  metlodtmfzor  Makes the calls and sends the DTMF  Command line scriptable  Hai2IVR setup  Route through Asterisk  Authenticated SIP  CID spoofing © 2008 Security-Assessment.com
  • 30.
    Predictable PINs  Keypadpatterns  Making shapes  L, X, O  Repeating numbers  2244, 9988  Patterns  Other lists  Birth dates  Pop culture references  1984, 1337 (WiteRabits PIN)  Word numbers  Hell, love, krad, sexy © 2008 Security-Assessment.com
  • 31.
    Predictable PINs © 2008Security-Assessment.com
  • 32.
    Predictable PINs  PINPop.com  Research project into predictable PINs  PIN database analysis  Goals  Secure PIN selection patches to Asterisk  Whitepaper on PIN selection psychology © 2008 Security-Assessment.com
  • 33.
    PaBX hacking  Attackcategories  Theft of service  Routing manipulation  Traffic analysis (stealing CDR’s)  Social engineering  Eavesdropping © 2008 Security-Assessment.com
  • 34.
    PaBX hacking  The Holy Grail  Access to the maintenance console  Dial-in lines, extensions, computers  Feature exploits  Conferencing  Three-way calling  Call forwarding  Direct Inwards System Access (DISA)  Test features that remotely activate mics  Theft of CDR’s  Industrial espionage  Advanced auditing  Free Space Invaders: reverse engineering © 2008 Security-Assessment.com
  • 35.
    PaBX hacking  Maintenanceconsole banners © 2008 Security-Assessment.com
  • 36.
    PaBX hacking  Ahacked Meridian management console can:  Setup trunks to allow outgoing calls  Manipulate trunks  Re-route incoming / outgoing calls  Eavesdrop extensions  Set a Meridian Mail box to auto logon temporarily  Shut down the PaBX  Make phones ring infinitely  Trace calls through CDR records  Steal CDRs © 2008 Security-Assessment.com
  • 37.
    PaBX hacking  Lockdownmethods  Restricted out dialing  Forwarding features disabled  Enforced minimum PIN size  Unused boxes deactivated  Lockout counters with manual reset  Timeouts on setup of new mailboxes  Challenge response systems  US Government classified VMSs need SecureID’s  Logging © 2008 Security-Assessment.com
  • 38.
    PaBX hacking  CDR’sand datamining  Sensitive information can be gleaned from call records  Who called who and when  Current and potential clients, contractors  Recent company activities  AMDOCS Example  Handles billing for most American telcos  FBI and NSA investigation into sending CDRs offshore  Possibility of Israeli's spying on American's through CDRs © 2008 Security-Assessment.com
  • 39.
    The infinite powerof Asterisk  Custom setups  Testing environment for tools  Anonymous voicemail servers  Encrypted voice  Private networks like DetoVoIP and Telephreak  Rogue PaBX’s for evesdropping  Custom features  ProjectMF: A trip down phone-phreak memory lane  Asterisk patches to support MF in-band signaling  Lets you bluebox telephone calls  Simulation of old (but not dead?) networks © 2008 Security-Assessment.com
  • 40.
    The infinite powerof Asterisk  Blueboxing through a ProjectMF test server © 2008 Security-Assessment.com
  • 41.
    The infinite powerof Asterisk  Call the ProjectMF server  Get dropped to a C5 trunk  Hold the phone up to the speakers  Seize the trunk with a 1 second burst of 2600Hz  Send KP + 12588+ ST in multi-frequency tones (MF)  Call connects  Re-seize, repeat © 2008 Security-Assessment.com
  • 42.
    Thanks  Thanks &greats to:  SA.com  SLi  Andrew Horton  Metlstorm  Detonate  Kiwicon crew  Beave  Jfalcon  M4phr1k © 2008 Security-Assessment.com
  • 43.