Penetration Testing mailing list archives

Re: Pen Testing a PBX (Northern Telecom Meridian-1)


From: Mark Teicher <mht3 () earthlink net>
Date: Fri, 9 Sep 2005 07:18:19 -0400 (GMT-04:00)

Here is a generic outline of what one should check for when auditing a PBX

1. Administrative Access
2. System Configuration
3. Audit Trails (i.e. History File, Audit Trail, Call Detail Recording,)
4. Station - (Basic Access Restrictions, Station Features, Hunt and Call Forwarding features, External References)
5. Trunking (Routes, Trunks)
6. Call Privileges (Code Restrictions, Scheduled Access Restrictions, Controlled Class of Service, Basic and Network 
Authorization Codes, Forced Accounts)
7. Feature Access Review
8. Direct Inward System Access (DISA, DISA Digit Insertion)
9. ACD (ACD Pattern Confguration, Agents)
10. Call Routing (Route List Indices, Routing Control, Translation Tables, Digit Manipulation, Incoming DID, Incoming 
Trunk Exclusions, Call Screening, Class of Service)
11. Mailbox Audit (Disabled Mailboxes, Unused Mailboxes, Invalid Login Attempts, External DNs, Restriction/Permission 
Lists, Messaging Features, Voice Services, Fax Services, Additional Features, Monitoring Access)

Mileage may vary. 
-----Original Message-----
From: Hubert Seiwert <hubert () westpoint ltd uk>
Sent: Sep 8, 2005 8:12 AM
To: mmarrero () lloydstsb-usa com, pen-test () securityfocus com
Subject: Re: Pen Testing a PBX (Northern Telecom Meridian-1)

Check http://www.phrack.org/phrack/47/P47-15 - I don't know how relevant this is 
to the versions that are around today but it may be a starting point. In my 
experience it's very common for users to have bad passwords, i.e. the same as 
their mailbox number. If you can get into any mailbox this obviously leads to 
exposure of voice mails but also potentially to the ability to make outgoing or 
internal phone calls, which may be useful for social engineering attacks within 
the organisation or making long distance and international calls at the 
organisation's expense.


mmarrero () lloydstsb-usa com wrote:
Hello list, 

I am about to start a pentest of a PBX system. I was wondering if there are any vulnerabilities against this make and 
model of PBX. Also, does anyone know of a paper on how to appropriately conduct a pentest. I do not want to miss 
anything. 




-- 
Hubert Seiwert

Internet Security Specialist, Westpoint Ltd
Albion Wharf, 19 Albion Street, Manchester M1 5LN, United Kingdom

Web: www.westpoint.ltd.uk
Tel: +44-161-2371028

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: