From: Mark Teicher (mht3@earthlink.net)
Date: Fri Sep 09 2005 - 07:18:19 EDT
Here is a generic outline of what one should check for when auditing a PBX
1. Administrative Access
2. System Configuration
3. Audit Trails (i.e. History File, Audit Trail, Call Detail Recording,)
4. Station - (Basic Access Restrictions, Station Features, Hunt and Call Forwarding features, External References)
5. Trunking (Routes, Trunks)
6. Call Privileges (Code Restrictions, Scheduled Access Restrictions, Controlled Class of Service, Basic and Network Authorization Codes, Forced Accounts)
7. Feature Access Review
8. Direct Inward System Access (DISA, DISA Digit Insertion)
9. ACD (ACD Pattern Confguration, Agents)
10. Call Routing (Route List Indices, Routing Control, Translation Tables, Digit Manipulation, Incoming DID, Incoming Trunk Exclusions, Call Screening, Class of Service)
11. Mailbox Audit (Disabled Mailboxes, Unused Mailboxes, Invalid Login Attempts, External DNs, Restriction/Permission Lists, Messaging Features, Voice Services, Fax Services, Additional Features, Monitoring Access)
Mileage may vary.
-----Original Message-----
From: Hubert Seiwert <hubert@westpoint.ltd.uk>
Sent: Sep 8, 2005 8:12 AM
To: mmarrero@lloydstsb-usa.com, pen-test@securityfocus.com
Subject: Re: Pen Testing a PBX (Northern Telecom Meridian-1)
Check http://www.phrack.org/phrack/47/P47-15 - I don't know how relevant this is
to the versions that are around today but it may be a starting point. In my
experience it's very common for users to have bad passwords, i.e. the same as
their mailbox number. If you can get into any mailbox this obviously leads to
exposure of voice mails but also potentially to the ability to make outgoing or
internal phone calls, which may be useful for social engineering attacks within
the organisation or making long distance and international calls at the
organisation's expense.
mmarrero@lloydstsb-usa.com wrote:
> Hello list,
>
> I am about to start a pentest of a PBX system. I was wondering if there are any vulnerabilities against this make and model of PBX. Also, does anyone know of a paper on how to appropriately conduct a pentest. I do not want to miss anything.
>
-- Hubert Seiwert Internet Security Specialist, Westpoint Ltd Albion Wharf, 19 Albion Street, Manchester M1 5LN, United Kingdom Web: www.westpoint.ltd.uk Tel: +44-161-2371028 ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 ------------------------------------------------------------------------------- ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:51 EDT