From: Mark Teicher (mht3@earthlink.net)
Date: Wed May 17 2006 - 07:47:08 EDT
Conducting a security assessment on a Cisco IPT system, one could potentially use one of the commercially or non-commercial port scanners available, but the real security assessment is the configuration. Most of the IP telephony systems are highly susceptible to a Ddos attack as mentioned in several books that have been published recently, but again this is not the real deliverable one would want to deliver to the senior exec staff. Informing them that the current configuration allows for toll-fraud, call redirects, outbound forwarding, call routing mishaps would be more interesting, since toll-fraud may be small potatoes in a security pen-testers mind since "being ownzed" or "r00ting" a system is more popular, but informing a senior exec staff person that a internal or external person can make unlimited calls from anywhere on the universe through the IPT system will make them go out and hire a Phd in Biology as their CSO who has been known to wear camouflage pants and oogle all the well-endowed women in t
he organization.. Oops, am I speaking as if this really happenned, maybe it did at an organization near you..
-----Original Message-----
>From: Frank Bussink <frank_bussink@hotmail.com>
>Sent: May 16, 2006 2:28 AM
>To: pen-test@securityfocus.com
>Subject: IP Telephony pen-test and VLAN's
>
>Hello,
>
>I'm trying to do a pen-test on a Cisco IPT system.
>
>Cisco IP telephone are connected on the same network cable as the PC, but
>are working on another vlan.
>The access switches have a configuration like :
>switchport mode access
>switchport access vlan 123
>switchport voice vlan 124
>
>I think the negotation with the access switch is done by CDP but I'm not
>sure.
>
>Does anyone have a tool that emulates the PC as a voice device in order to
>receive a dhcp lease on vlan 124, so I can start to inject ARP MITM with
>Cain for example ?
>
>Kind regards
>Frank
>
>_________________________________________________________________
>Express yourself instantly with MSN Messenger! Download today it's FREE!
>http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
>
>
>------------------------------------------------------------------------------
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
>Choice Award from eWeek. As attacks through web applications continue to rise,
>you need to proactively protect your applications from hackers. Cenzic has the
>most comprehensive solutions to meet your application security penetration
>testing and vulnerability management needs. You have an option to go with a
>managed service (Cenzic ClickToSecure) or an enterprise software
>(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
>help you: http://www.cenzic.com/news_events/wpappsec.php
>And, now for a limited time we can do a FREE audit for you to confirm your
>results from other product. Contact us at request@cenzic.com for details.
>------------------------------------------------------------------------------
>
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:58 EDT