한국어

소프트스위치

온누리070 플레이스토어 다운로드
    acrobits softphone
     온누리 070 카카오 프러스 친구추가온누리 070 카카오 프러스 친구추가친추
     카카오톡 채팅 상담 카카오톡 채팅 상담카톡
    
     라인상담
     라인으로 공유

     페북공유

   ◎위챗 : speedseoul


  
     PAYPAL
     
     PRICE
     

pixel.gif

    before pay call 0088 from app


http://nicerosniunos.blogspot.kr/2012/05/flooding-asterisk-freeswitch-and.html


Flooding Asterisk, Freeswitch and Kamailio with Metasploit

Hi, it has been a long time since my last post because of my new job and my final year project ("VoIP denegation of service attacks" for curious) but there is something I found during my tests with FreeswitchKamailio and Asterisk that I want to share.
NOTE: Really, guys of Security By Default blog published us (my good friend Roi Mallo and me) two articlesabout how to develop modules for Metasploit framework, another two are coming.  ;)

During my project, among others, I developed a Metasploit module which can flood SIP protocol with common frames (INVITE, OPTIONS, REGISTER, BYE), I wrote it at Quobis (nice job ;) in order to use it for some private tests because actual software didn´t fit our needs, so we are going to probe how is the behavior of different GPL VoIP servers against this kind of attacks:
- Asterisk: I think it needs no introduction, the famous softswitch/PBX software.
- Freeswitch: It´s a newer softswitch that seems to be Asterisk replacement and I really like.
- Kamailio (former OpenSER): It is the most known GPL SIP proxy.
Virtual machines
First of all I want to be clear about two things:
- Test were made without any protection on the server side, in a real environment we shoud find (in theory xD) something like Iptables, Snort, Fail2ban, Pike or a propietary Session border controller in large arquitectures. Anyway, it should be enough for this proof of concept.
- Asterisk and Freeswitch are PBX software, they were not designed to run between the limits of the infrastructure and Internet, although they are usually placed there. In fact, one of the reason of this post is to show the importance of using a SIP Proxy because of security and performance reasons.

Next pictures show an example of the Metasploit module use and generated traffic, we will use the same attack against differents IPs, so I´m showing it once only:
Module use and config
Captured traffic
I chose INVITE packets because they are much more effective against all kind of SIP devices and TIMEOUT to 0 trying to get more traffic. Then, the results:
NOTE: With Wireshark filter "sip.Method==REGISTER or sip.Status-Code==200 and !sdp" we can see if a softphone (Jitsi in this case) could be registered , this way we can confirm if tested software losts some REGISTER packages under attack.
Metasploit vs. Asterisk

Metasploit vs. Freeswitch
 

Metasploit vs. Kamailio

Pictures show how Metasploit module can flood both Asterisk and Freeswitch, but not Kamailio. Moreover, Asterisk lost REGISTER packets under the attack and Freeswitch did "strange" things answering with a lot of "200 OK" responses. This problem would be much more important in a real environment with hundreds of phones trying to register at the same time.

As conclusion we can confirm the use of Kamailio (I think OpenSIPS or another SIP Proxy would reach the same results) as frontier with "the wild". In addition we can also use Pike module for DoS protection and we could suppose that it would respond to a high volume of traffic in a better way than other two alternatives. To sum up I would like to remark that we can see Kamailio creates different forks to manage connections, this seems to be the key of its good performance. But next times I will show how to flood Kamailio with better results and the countermeasurements to protect yourself against it. ;)

조회 수 :
101803
등록일 :
2013.04.06
22:36:46 (*.160.42.88)
엮인글 :
http://webs.co.kr/index.php?document_srl=19768&act=trackback&key=19b
게시글 주소 :
http://webs.co.kr/index.php?document_srl=19768
List of Articles
번호 제목 글쓴이 조회 수sort 추천 수 날짜
142 in opensips what is has_totag() admin 23741   2017-12-09
 
141 ubuntu 安装配置opensips,rtpproxy,mediaproxy admin 24743   2017-09-04
 
140 WebSocket Transport using OpenSIPS admin 24928   2017-09-01
 
139 openssl 을 이용한 인증서 생성 절차를 정리한다. 개인키 CSR SSL 인증서 파일 생성 admin 24954   2017-09-14
 
138 OpenSIPS 2.3 install admin 25076   2017-09-01
 
137 OpenSIPS 2.1 (rc) is available, download now! admin 25102   2015-03-22
 
136 opensips.cfg. sample admin 25151   2017-09-12
 
135 what is loose_route() in opensips ? file admin 25399   2017-12-09
 
134 Documentation -> Tutorials -> TLS opensips.cfg admin 25977   2017-09-14
 
133 what is record_route() in opensips ? admin 26130   2017-12-09
 
132 opensips push notification How to detail file admin 26542   2017-12-20
 
131 How to Install OpenSIPS 2.1.2 Server on Ubuntu 15.04 admin 27519   2017-09-01
 
130 opensips tls cfg admin 30916   2017-09-14
 
129 WebSocket Support in OpenSIPS 2.1 admin 32032   2015-04-04
 
128 A2Billing and OpenSIPS – Part 1 admin 32480   2017-08-29
 
127 Installing RTPEngine on Ubuntu 14.04 admin 33267   2017-09-05
 
126 WebRTC with OpenSIPS WebSocket is a protocol provides full-duplex admin 33371   2015-04-04
 
125 Service Provision Using Asterisk & OpenSIPS - AstriCon 2014 admin 33910   2015-02-25
 
124 Advanced SIP scenarios with Event-based-Routing admin 34399   2017-09-11
 
123 A2Billing and OpenSIPS – Part 2 admin 34529   2017-08-29
 
122 Script Function , Module Index v1.11 함수 모듈 opensips admin 36303   2014-10-14
 
121 Opensips Installation, How to. Good guide wiki page admin 37050   2014-08-10
 
120 [OpenSIPS-Users] Opensips 1.10 NAT radius aaa admin 37124   2014-08-23
 
119 Kamailio Nat Traversal using RTPProxy admin 37227   2014-08-11
 
118 Configuracion de Kamailio 3.3 con NAT Traversal y XCAP. admin 37239   2014-08-12
 
117 OpenSIPS as Homer Capture server admin 37364   2014-08-13
 
116 kamailio.cfg configuration Example admin 37471   2014-10-04
 
115 opensips NAT Traversal Module admin 37617   2014-10-02
 
114 opensips.cfg for Asterisk admin 37838   2014-10-20
 
113 Multimedia Service Platform admin 37850   2014-03-06