Penetration Testing mailing list archives

Re: IP Telephony pen-test and VLAN's


From: Mark Teicher <mht3 () earthlink net>
Date: Wed, 17 May 2006 07:47:08 -0400 (GMT-04:00)

Conducting a security assessment on a Cisco IPT system, one could potentially use one of the commercially or 
non-commercial port scanners available, but the real security assessment is the configuration.  Most of the IP 
telephony systems are highly susceptible to a Ddos attack as mentioned in several books that have been published 
recently, but again this is not the real deliverable one would want to deliver to the senior exec staff.  Informing 
them that the current configuration allows for toll-fraud, call redirects, outbound forwarding, call routing mishaps 
would be more interesting, since toll-fraud may be small potatoes in a security pen-testers mind since "being ownzed" 
or "r00ting" a system is more popular, but informing a senior exec staff person that a internal or external person can 
make unlimited calls from anywhere on the universe through the IPT system will make them go out and hire a Phd in 
Biology as their CSO who has been known to wear camouflage pants and oogle all the well-endowed women in the 
organization..  Oops, am I speaking as if this really happenned, maybe it did at an organization near you..

-----Original Message-----
From: Frank Bussink <frank_bussink () hotmail com>
Sent: May 16, 2006 2:28 AM
To: pen-test () securityfocus com
Subject: IP Telephony pen-test and VLAN's 

Hello,

I'm trying to do a pen-test on a Cisco IPT system.

Cisco IP telephone are connected on the same network cable as the PC, but
are working on another vlan.
The access switches have a configuration like :
switchport mode access
switchport access vlan 123
switchport voice vlan 124

I think the negotation with the access switch is done by CDP but I'm not 
sure.

Does anyone have a tool that emulates the PC as a voice device in order to 
receive a dhcp lease on vlan 124, so I can start to inject ARP MITM with 
Cain for example ?

Kind regards
Frank

_________________________________________________________________
Express yourself instantly with MSN Messenger! Download today it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: