1 / 27

Critical Danger:

Critical Danger:. An Introduction to Cross Site Scripting Attacks for People Who Do not Know what Cross Site Scripting Attacks Are. Agenda. Introduction to Browsers Javascript Java Indonesian spice trade Dutch East India Company Script Plays, Movie and other…

erma
Télécharger la présentation

Critical Danger:

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Critical Danger: An Introduction to Cross Site Scripting Attacks for People Who Do not Know what Cross Site Scripting Attacks Are.

  2. Agenda • Introduction to Browsers • Javascript • Java • Indonesian spice trade • Dutch East India Company • Script • Plays, Movie and other… • Browser Attacks Visualization • Text only version

  3. VoIPhreaking SIPhallis Unveiled the grugq

  4. Agenda • Introduction • VoIP Abstract • Phreaking • VoIPhreaking • VoIPhishing • Conclusion • Q&A

  5. Introduction • Voice/Video over Internet Protocol (VoIP) is hot • Grugq is hotter • Lots of years of security research • Focusing on VoIP security since forever • Snazzy haircut • VoIP is a serious security threat • Security practices are still emerging • Deployment isn’t waiting for security first

  6. VoIP Abstract Agenda • Overview • Functionality Realms • Protocol Suites • Infrastructure

  7. VoIP Overview • Provides a mechanism for people to communicate over networks • Real time multimedia exchange • In development since early 1990s • Bandwidth and services finally make it economically feasible • Cost is the major driver for VoIP deployments

  8. Functionality Realms • Signaling • Call management • Setup, location, tear down, etc. • Media • Content streams • PSTN integration • Telephone to Internet traversal • Location, media conversion, signaling propagation

  9. Protocol Suites • Signaling • Session Initiation Protocol (SIP) • H.323 • Media • Real Time Protocol (RTP) • Transported over UDP • PSTN Integration • Media Gateway Control Protocol (MGCP) • ENUM

  10. Signaling:Session Initiation Protocol • ASCII text protocol designed by Internet crunchies • Bastard child of HTTP and email • Over a decade old • Design began in 1995 • Still considered “emerging” • Commonly used for new deployments • Most used VoIP protocol on the Internet

  11. SIP Messages • Start line • Request or Response • Headers • Information about the message • Destination • Origin • Route • Body • Usually media stream location information • Session Description Protocol

  12. Start Line • Request Messages • Method based request system • INVITE, BYE, REGISTER, etc. etc. • Response Messages • Error code + reason (smells like HTTP) • 404 Not Found, 403 Forbidden • Message Headers

  13. SIP Headers • Display information • To: URI • From: URI • Routing information • Contacts: URI • Time To Live • Max-Forwards • Bad Ideas • Alert-Info:

  14. Infrastructure • User Agents / Terminals • Soft phones, Hard phones, Voice Mail, etc. • Proxies • Entry/Exit points to a VoIP network • Provide authentication services • Location Servers • Registrars, Gatekeepers • Map URIs to IP addresses • Gateways • Media Gateways, Signaling Gateways

  15. Phreaking Agenda • History • Techniques • Death of Phreaking

  16. History • Started in the 1960’s • Exploited in-band signaling • Relied heavily on hardware attacks • Famous Phreaks • Steve Jobs • Steve Wozniak • Cap’n Crunch

  17. Techniques • In band signaling @ 2600 Mhz • Typically used for toll-fraud • The “colour boxing era” • Blue boxing • Red boxing

  18. Death of Phreaking • Out of band signaling • Aggressive prosecution of phreakers • Improved fraud analysis complements improving technical solutions • “I’m not dead yet… I’m feeling better…” • The birth of VoIPhreaking

  19. VoIPhreaking Agenda • Motivations • Attacks Overview • Techniques

  20. Motivation • Hackers enjoy exploring new technology • Returning to the PSTN after being expelled in the 90s • Money.

  21. Techniques • Media attacks • Eavesdropping • Injection • Signaling attacks • Hijacking • Rerouting • Eavesdropping • PSTN attacks • MG intrusion

  22. VoIPhishing • Application of VoIPhreaking attacks for phishing • Harvesting personal information • Account numbers and access codes • Personal identification data • Wide range of possible exploitation scenarios • Expect to see these in the news next year • Or not…

  23. Techniques • Impersonating a bank • Caller ID spoofing • Hijacking • ENUM poisoning • Account theft • Man in the middle attacks • Media stream manipulation

  24. Hijacking • ENUM Poisoning • ENUM database used to route VoIP calls more cheaply • Insert a false entry for a financial institution • Account theft • Carrier level SIP Registrar mapping manipulation • Redirect inbound calls to an evil call server

  25. Hijacking, cont. • Man in the middle attacks • Manipulate media location • Send call streams to multiple locations • Signaling manipulation • Create false conference call • Can happen anywhere between the customer and the bank • Media stream manipulation • Adding content to existing call streams

  26. Conclusion • New and Improved, Internet Telephony • Make phone calls as secure as email! • Dialing a number doesn’t mean you’ll get that person • What you hear on a phone call might be more than was said

  27. Questions & Answers

More Related