RE: VOIP Pen TEST

From: John Babio (jbabio@po-box.esu.edu)
Date: Tue Nov 27 2007 - 07:52:37 EST


Here are some things to keep in mind(you may know this stuff already):

1. If you are testing callmanager 4.1 or 3.3, the underlaying OS is
windows server 2000. Callmanager 5 is linux based, probably redhat or
fedora.

2. Cisco software included with this is a small version of CISCO
security agent(HIPS), which is behavioral based. Same with the older
Unity software(voice mail), exchange 2000.
3. The cisco switches are set to dynamic trunks on the ports by default.

4. The cisco switches, if im not mistaken, use cdp to recognized cisco
phones.

5. If their setup uses SIP you can try using SIP invite DoS
6. If you can get a dhcp address from the phones port on the wall you
should be able to access the tftp server on the callmanager publisher
or subscriber.
7.You can try to intercept an RTP stream by arp spoofing the two
parties.
8. If using a linux machine you can use vconfig and iptables to trunk an
interface.

-----Original Message-----
From: harshad.mengle@wipro.com [mailto:harshad.mengle@wipro.com]
Sent: Monday, November 26, 2007 11:29 PM
To: John Babio; pen-test@securityfocus.com
Subject: RE: VOIP Pen TEST

I am testing CISCO VOIP

-----Original Message-----
From: John Babio [mailto:jbabio@po-box.esu.edu]
Sent: Tuesday, November 27, 2007 1:55 AM
To: Harshad Mengle (WT01 - Computing, Storage & Software Products);
pen-test@securityfocus.com
Subject: RE: VOIP Pen TEST

I know that cain has the ability so sniff VoIP. What brand VoIP
equipment are you testing?

-----Original Message-----
From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com]
On Behalf Of harshad.mengle@wipro.com
Sent: Monday, November 26, 2007 12:33 AM
To: pen-test@securityfocus.com
Subject: VOIP Pen TEST

Hi All:

I am looking for a Information on VOIP Pen Test. If anybody has worked
on it.

Pls share his experience.

Regards,
 
Harshad

-----Original Message-----
From: listbounce@securityfocus.com [mailto:listbounce@securityfocus.com]
On Behalf Of Gleb Paharenko
Sent: Sunday, November 25, 2007 4:23 PM
To: Attari Attari
Cc: pen-test@securityfocus.com
Subject: Re: Pen Test Success Factors

Hi.

The question seems be deeply related to "what is security?".

In my opinion there is an important factor except vulnerabilities -
information disclosure about network topology, versions of installed
software which are discovered using black box testing.

In case information leaks were not found, you can show your methodology
of security testing, checklists. For each application you can define the
vector of possible attacks and methods how to check if an application is
vulnerable. Checklists for hardening software also show that system is
secure enough.

2007/11/21, Attari Attari <c70n3@yahoo.co.in>:
> Hi List,
>
> For a client to evaluate success of a pen test what would go down as
> Key Success Factors. I spoke to one client and he opined that more
> issues a pen tester finds the more successful it is for them and
> highlights the quality of tester. They also feel that if tester has
> found few or no vulnerabilities, the testers are simply no good. I
> know majority of testers on this list would disagree with this, and
> right so.
>
> In such a case what we as testers could communicate acceptable success

> factors to the client, in priority order?
>
> Clone
>
>
> Save all your chat conversations. Find them online at
> http://in.messenger.yahoo.com/webmessengerpromo.php
>
>
> ----------------------------------------------------------------------
> --
> This list is sponsored by: Cenzic
>
> Need to secure your web apps NOW?
> Cenzic finds more, "real" vulnerabilities fast.
> Click to try it, buy it or download a solution FREE today!
>
> http://www.cenzic.com/downloads
> ----------------------------------------------------------------------
> --
>
>

--
Best regards.
Gleb Pakharenko.
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------
The information contained in this electronic message and any attachments
to this message are intended for the exclusive use of the addressee(s)
and may contain proprietary, confidential or privileged information. If
you are not the intended recipient, you should not disseminate,
distribute or copy this e-mail. Please notify the sender immediately and
destroy all copies of this message and any attachments. 
WARNING: Computer viruses can be transmitted via email. The recipient
should check this email and any attachments for the presence of viruses.
The company accepts no liability for any damage caused by any virus
transmitted by this email.
 
www.wipro.com
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------
The information contained in this electronic message and any attachments
to this message are intended for the exclusive use of the addressee(s)
and may contain proprietary, confidential or privileged information. If
you are not the intended recipient, you should not disseminate,
distribute or copy this e-mail. Please notify the sender immediately and
destroy all copies of this message and any attachments. 
WARNING: Computer viruses can be transmitted via email. The recipient
should check this email and any attachments for the presence of viruses.
The company accepts no liability for any damage caused by any virus
transmitted by this email.
 
www.wipro.com
------------------------------------------------------------------------
This list is sponsored by: Cenzic
Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!
http://www.cenzic.com/downloads
------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:13 EDT