Abstract
Voice over IP is emerging as the key technology in the current and future Internet. This paper shares some essential practical experience gathered over a two years period in searching for vulnerabilities in the VoIP space. We will show a terrifying landscape of the most dangerous vulnerabilities capable to lead to a complete compromise of an internal network. All of the described vulnerabilities have been disclosed responsibly by our group and were discovered using our in-house developed fuzzing software KIF. The paper provides also mitigation techniques for all described vulnerabilities.
Similar content being viewed by others
References
FreePBX: full-featured PBX web application. http://freepbx.org
MPack: Insight into MPACK Hacker kit. http://www.malwarehelp.org/news/article-6268.html/
The Asterisk PBX. http://www.asterisk.org/
The Voice over IP Security Alliance (VOIPSA). http://www.voipsa.org/Activities/taxonomy.php
trixbox: Asterisk-based IP-PBX. http://www.trixbox.com/
Abdelnur, H., State, R., Festor, O.: Security Advisory: “SIP Digest Access Authentication RELAY-ATTACK for Toll-Fraud”. http://voipsa.org/pipermail/voipsec_voipsa.org/2007-November/002475.html
Abdelnur, H., State, R., Festor, O.: Security Advisory: “SQL injection in asterisk-addons and XSS injection in WWW application in Areski, FreePBX and Trixbox”. http://voipsa.org/pipermail/voipsec_voipsa.org/2007-October/002466.html
Abdelnur, H., State, R., Festor, O.: KiF: a stateful SIP fuzzer. In: Proceedings of Principles, Systems and Applications of IP Telecommunications, IPTComm, pp. 47–56, New-York, NY, USA, July 2007. ACM Press, New York (2007)
Butti L., Tinnes J.: Discovering and exploiting 802.11 wireless vulnerabilities. J. Comput. Virol. 4(1), 25–37 (2008)
Crocker, D.: Augmented BNF for Syntax Specifications: ABNF. Standards Track, November 1997
Fogie, S., Grossman, J., Hansen, R., Rager, A., Petkov, P.D.: XSS Exploits: Cross Site Scripting Attacks and Defense. Syngress (2007)
Johnston, A.B., Piscitello, D.M.: Understanding Voice over Ip Security. Artech (2006)
Litchfield D., Anley C., Heasman J., Grindlay B.: The Database Hacker’s Handbook: Defending Database Servers. Wiley, New York (2005)
Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. http://www.ietf.org/rfc/rfc3261.txt, June 2002
Sutton M., Greene A., Amini P.: Fuzzing: Brute Force Vulnerability Discovery. Addison-Wesley Professional, Reading (2007)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Abdelnur, H., State, R. & Festor, O. Advanced fuzzing in the VoIP space. J Comput Virol 6, 57–64 (2010). https://doi.org/10.1007/s11416-009-0123-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-009-0123-7