The Security
   Saga of
SysAdmin Steve
    Dan York, CISSP
      ClueCon 2009
                      ClueCon 2009 – Dan York
Once upon a
  time...

          ClueCon 2009 – Dan York
big company


          ClueCon 2009 – Dan York
smaller company


            ClueCon 2009 – Dan York
SysAdmin Steve


           ClueCon 2009 – Dan York
promotion


            ClueCon 2009 – Dan York
IT


     ClueCon 2009 – Dan York
phones, too!


           ClueCon 2009 – Dan York
new VoIP system


            ClueCon 2009 – Dan York
net head


           ClueCon 2009 – Dan York
V


    ClueCon 2009 – Dan York
Voice


        ClueCon 2009 – Dan York
SIP


      ClueCon 2009 – Dan York
open standard


           ClueCon 2009 – Dan York
Security
  Isn’t
Possible
           ClueCon 2009 – Dan York
education


            ClueCon 2009 – Dan York
PSTN

                          SIP Service
                           Provider



               Internet



      IP-PBX



LAN




                                        ClueCon 2009 – Dan York
cheap


        ClueCon 2009 – Dan York
merged


         ClueCon 2009 – Dan York
quit


       ClueCon 2009 – Dan York
?


    ClueCon 2009 – Dan York
new IT staff


           ClueCon 2009 – Dan York
Juvenile Joe


           ClueCon 2009 – Dan York
BOFH


       ClueCon 2009 – Dan York
read e-mail


              ClueCon 2009 – Dan York
monitor


          ClueCon 2009 – Dan York
comment


          ClueCon 2009 – Dan York
playground


             ClueCon 2009 – Dan York
exploit chaos


            ClueCon 2009 – Dan York
fun


      ClueCon 2009 – Dan York
ultimate truism


             ClueCon 2009 – Dan York
voice = packets


             ClueCon 2009 – Dan York
packets = bits


            ClueCon 2009 – Dan York
bits can be
manipulated

          ClueCon 2009 – Dan York
“VoIP security
    tools”

            ClueCon 2009 – Dan York
tools, tools, tools


               ClueCon 2009 – Dan York
voipsa.org


             ClueCon 2009 – Dan York
hackingvoip.com


            ClueCon 2009 – Dan York
sectools.org


           ClueCon 2009 – Dan York
tools, tools, tools


               ClueCon 2009 – Dan York
good


       ClueCon 2009 – Dan York
evil


       ClueCon 2009 – Dan York
test/defend


              ClueCon 2009 – Dan York
attack


         ClueCon 2009 – Dan York
perspective


          ClueCon 2009 – Dan York
white hat


            ClueCon 2009 – Dan York
black hat


            ClueCon 2009 – Dan York
wireshark


            ClueCon 2009 – Dan York
ClueCon 2009 – Dan York
cain & abel


              ClueCon 2009 – Dan York
RTP


      ClueCon 2009 – Dan York
WAV


      ClueCon 2009 – Dan York
MP3s


       ClueCon 2009 – Dan York
iPod


       ClueCon 2009 – Dan York
2-hour commute


           ClueCon 2009 – Dan York
corporate
conversations

           ClueCon 2009 – Dan York
personal
  iPod

           ClueCon 2009 – Dan York
corporate
conversations

           ClueCon 2009 – Dan York
personal
  iPod

           ClueCon 2009 – Dan York
(scared yet?)


            ClueCon 2009 – Dan York
conversations


            ClueCon 2009 – Dan York
PIN


      ClueCon 2009 – Dan York
voicemail PINs


             ClueCon 2009 – Dan York
banking PINs


           ClueCon 2009 – Dan York
DTMF decoder


           ClueCon 2009 – Dan York
(fun stuff, eh?)


               ClueCon 2009 – Dan York
Teleworker Ted


            ClueCon 2009 – Dan York
envy


       ClueCon 2009 – Dan York
grudge


         ClueCon 2009 – Dan York
hang up Ted


          ClueCon 2009 – Dan York
cell phone


             ClueCon 2009 – Dan York
devious


          ClueCon 2009 – Dan York
mix in new
background

          ClueCon 2009 – Dan York
amusement park


           ClueCon 2009 – Dan York
screaming kids


            ClueCon 2009 – Dan York
dog


      ClueCon 2009 – Dan York
Ted’s dog


            ClueCon 2009 – Dan York
endless barking


            ClueCon 2009 – Dan York
no clue


          ClueCon 2009 – Dan York
Process Paul


           ClueCon 2009 – Dan York
new rules


            ClueCon 2009 – Dan York
worked late


              ClueCon 2009 – Dan York
wife


       ClueCon 2009 – Dan York
female


         ClueCon 2009 – Dan York
???


      ClueCon 2009 – Dan York
no clue


          ClueCon 2009 – Dan York
insecure firewall


              ClueCon 2009 – Dan York
family


         ClueCon 2009 – Dan York
SIP softphone


           ClueCon 2009 – Dan York
free long distance


              ClueCon 2009 – Dan York
(toll fraud)


               ClueCon 2009 – Dan York
Board
conf calls

             ClueCon 2009 – Dan York
revenues in the
     tank

             ClueCon 2009 – Dan York
only hope


            ClueCon 2009 – Dan York
acquisition


              ClueCon 2009 – Dan York
IT outsourced


           ClueCon 2009 – Dan York
job


      ClueCon 2009 – Dan York
(Uh-oh)


          ClueCon 2009 – Dan York
war


      ClueCon 2009 – Dan York
SIP trunk


            ClueCon 2009 – Dan York
unencrypted


          ClueCon 2009 – Dan York
sniff CID


            ClueCon 2009 – Dan York
lawyers


          ClueCon 2009 – Dan York
CFO


      ClueCon 2009 – Dan York
SIP Redirect


           ClueCon 2009 – Dan York
random extension


             ClueCon 2009 – Dan York
shipping


           ClueCon 2009 – Dan York
HR


     ClueCon 2009 – Dan York
labs


       ClueCon 2009 – Dan York
kitchen


          ClueCon 2009 – Dan York
?


    ClueCon 2009 – Dan York
acquire?


           ClueCon 2009 – Dan York
@#$@?%$!


           ClueCon 2009 – Dan York
SysAdmin Steve


           ClueCon 2009 – Dan York
fix it


         ClueCon 2009 – Dan York
DoS


      ClueCon 2009 – Dan York
BYE


      ClueCon 2009 – Dan York
hang up CEO


          ClueCon 2009 – Dan York
set reload


             ClueCon 2009 – Dan York
erase SIP
registration

           ClueCon 2009 – Dan York
no clue


          ClueCon 2009 – Dan York
packet flood


           ClueCon 2009 – Dan York
degrade


          ClueCon 2009 – Dan York
cell phones


              ClueCon 2009 – Dan York
acquire?


           ClueCon 2009 – Dan York
@#$@?%$!


           ClueCon 2009 – Dan York
SysAdmin Steve


           ClueCon 2009 – Dan York
fix it


         ClueCon 2009 – Dan York
3 strikes


            ClueCon 2009 – Dan York
investigation


            ClueCon 2009 – Dan York
truth


        ClueCon 2009 – Dan York
discovered


             ClueCon 2009 – Dan York
heart attack


           ClueCon 2009 – Dan York
corporate
conversations

           ClueCon 2009 – Dan York
SIP trunk


            ClueCon 2009 – Dan York
unencrypted


          ClueCon 2009 – Dan York
public Internet


             ClueCon 2009 – Dan York
clear


        ClueCon 2009 – Dan York
call records


           ClueCon 2009 – Dan York
public Internet


             ClueCon 2009 – Dan York
cleartext


            ClueCon 2009 – Dan York
(not good)


             ClueCon 2009 – Dan York
plan


       ClueCon 2009 – Dan York
Fire Joe!


            ClueCon 2009 – Dan York
defense in depth


             ClueCon 2009 – Dan York
layers


         ClueCon 2009 – Dan York
encryption


             ClueCon 2009 – Dan York
SRTP


       ClueCon 2009 – Dan York
TLS / DTLS


             ClueCon 2009 – Dan York
ZRTP


       ClueCon 2009 – Dan York
voice


        ClueCon 2009 – Dan York
call control


               ClueCon 2009 – Dan York
LAN


      ClueCon 2009 – Dan York
SIP trunk


            ClueCon 2009 – Dan York
clueless


           ClueCon 2009 – Dan York
new provider


           ClueCon 2009 – Dan York
call accounting


             ClueCon 2009 – Dan York
IP network


             ClueCon 2009 – Dan York
VLANs


        ClueCon 2009 – Dan York
IDS/IPS


          ClueCon 2009 – Dan York
monitoring


             ClueCon 2009 – Dan York
rate throttling


             ClueCon 2009 – Dan York
secure perimeter


             ClueCon 2009 – Dan York
firewall traversal


               ClueCon 2009 – Dan York
firmware


           ClueCon 2009 – Dan York
o/s patches


          ClueCon 2009 – Dan York
disable services


             ClueCon 2009 – Dan York
die,
  default
passwords,
die, die, die
            ClueCon 2009 – Dan York
layers


         ClueCon 2009 – Dan York
secure VoIP


          ClueCon 2009 – Dan York
caveat


         ClueCon 2009 – Dan York
internal


           ClueCon 2009 – Dan York
disgruntled


              ClueCon 2009 – Dan York
x%?


      ClueCon 2009 – Dan York
compromised
  servers

          ClueCon 2009 – Dan York
spyware


          ClueCon 2009 – Dan York
unsecured WiFi


            ClueCon 2009 – Dan York
(checked your
  parking lot
   lately?)
           ClueCon 2009 – Dan York
offline analysis


              ClueCon 2009 – Dan York
SIP trunk


            ClueCon 2009 – Dan York
$$$


      ClueCon 2009 – Dan York
security


           ClueCon 2009 – Dan York
Botnet Bob


             ClueCon 2009 – Dan York
zombies


          ClueCon 2009 – Dan York
fun


      ClueCon 2009 – Dan York
profit


         ClueCon 2009 – Dan York
Criminal Chris


            ClueCon 2009 – Dan York
espionage


            ClueCon 2009 – Dan York
identity theft


                 ClueCon 2009 – Dan York
human replay
   attack

           ClueCon 2009 – Dan York
Spammer Sue


          ClueCon 2009 – Dan York
SPIT


       ClueCon 2009 – Dan York
1,000s of calls


             ClueCon 2009 – Dan York
“significant
   event”

               ClueCon 2009 – Dan York
Congressman


          ClueCon 2009 – Dan York
mistress


           ClueCon 2009 – Dan York
public official


             ClueCon 2009 – Dan York
porn line


            ClueCon 2009 – Dan York
identity theft


             ClueCon 2009 – Dan York
13-yr-old


            ClueCon 2009 – Dan York
Wall St. Journal


             ClueCon 2009 – Dan York
“VOIP IS
INSECURE”

         ClueCon 2009 – Dan York
“(stupid) VOIP IS
   INSECURE”

              ClueCon 2009 – Dan York
“VOIP IS
INSECURE”

         ClueCon 2009 – Dan York
moral


        ClueCon 2009 – Dan York
VoIP *can* be
   secure

           ClueCon 2009 – Dan York
VoIP can be
MORE secure
 than PSTN
           ClueCon 2009 – Dan York
(red button,
  anyone?)

           ClueCon 2009 – Dan York
work


       ClueCon 2009 – Dan York
plan


       ClueCon 2009 – Dan York
questions


            ClueCon 2009 – Dan York
education


            ClueCon 2009 – Dan York
voipsa.org


             ClueCon 2009 – Dan York
VOIPSA Threat
  Taxonomy

           ClueCon 2009 – Dan York
VOIPSA
Best Practices

            ClueCon 2009 – Dan York
VOIPSEC
mailing list

               ClueCon 2009 – Dan York
blueboxpodcast.com


              ClueCon 2009 – Dan York
ClueCon 2009 – Dan York
(If you aren’t
reading them, be
     aware the
 attackers *are*)
              ClueCon 2009 – Dan York
defense in depth


             ClueCon 2009 – Dan York
layers and layers


              ClueCon 2009 – Dan York
voice


        ClueCon 2009 – Dan York
call control


               ClueCon 2009 – Dan York
SIP trunks


             ClueCon 2009 – Dan York
management
interfaces / APIs

              ClueCon 2009 – Dan York
PSTN
interfaces

             ClueCon 2009 – Dan York
PSTN


       ClueCon 2009 – Dan York
VoIP = IP + PSTN


             ClueCon 2009 – Dan York
it’s the network,
       stupid

              ClueCon 2009 – Dan York
cloud


        ClueCon 2009 – Dan York
IP network


             ClueCon 2009 – Dan York
voice = packets


             ClueCon 2009 – Dan York
packets = bits


            ClueCon 2009 – Dan York
bits can be
manipulated

          ClueCon 2009 – Dan York
VoIP *can* be
   secure

           ClueCon 2009 – Dan York
work


       ClueCon 2009 – Dan York
plan


       ClueCon 2009 – Dan York
SysAdmin Steve?


            ClueCon 2009 – Dan York
happily ever
   after?

           ClueCon 2009 – Dan York
acquisition?


           ClueCon 2009 – Dan York
job?


       ClueCon 2009 – Dan York
CIO?


       ClueCon 2009 – Dan York
another story


            ClueCon 2009 – Dan York
To be continued...


              ClueCon 2009 – Dan York
The End

(or is it the beginning?)

                            ClueCon 2009 – Dan York
Please practice
   safe VoIP!

             ClueCon 2009 – Dan York
Q&A
   www.voipsa.org
  www.voipsa.org/blog
www.blueboxpodcast.com
   blogs.voxeo.com

                         ClueCon 2009 – Dan York
Thank you

(Please practice safe VoIP!)

                               ClueCon 2009 – Dan York

More Related Content

ODP
Knolx j query-form-validation-slides
PPTX
HTML5 & WAI-ARIA Forms with jQuery Validation
ODP
Effective communication
PDF
Quick & Easy Dev Environments with Vagrant
ODP
A brief look inside UML
PPTX
PHP Security Tips
PPTX
PHP Advanced
PDF
Php, mysq lpart4(processing html form)
Knolx j query-form-validation-slides
HTML5 & WAI-ARIA Forms with jQuery Validation
Effective communication
Quick & Easy Dev Environments with Vagrant
A brief look inside UML
PHP Security Tips
PHP Advanced
Php, mysq lpart4(processing html form)

Viewers also liked (20)

PPTX
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
KEY
jQuery Plugins Intro
PPTX
Accessible dynamic forms
PPT
OWASP App Sec US - 2010
PDF
LAMP Management with Virtualmin
PDF
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
PDF
Php Security Workshop
PDF
UpsilonPiEpsilon-UniversityOfBridgeport-May1997
PDF
Red Hat Training México /// Calendario de cursos 2016
PPTX
SydPHP Security in PHP
PDF
Safety LAMP: data security & agile languages
PPT
Web Technology – Web Server Setup : Chris Uriarte
PDF
Scalable Internet Servers and Load Balancing
PDF
jQuery Stack Overflow DevDays DC 2009
PPT
Apache Web Server Setup 2
PPT
PDF
Memphis php 01 22-13 - laravel basics
KEY
Bring a Web Page Alive with jQuery
PPTX
Your Inner Sysadmin - Tutorial (SunshinePHP 2015)
jQuery Plugins Intro
Accessible dynamic forms
OWASP App Sec US - 2010
LAMP Management with Virtualmin
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Php Security Workshop
UpsilonPiEpsilon-UniversityOfBridgeport-May1997
Red Hat Training México /// Calendario de cursos 2016
SydPHP Security in PHP
Safety LAMP: data security & agile languages
Web Technology – Web Server Setup : Chris Uriarte
Scalable Internet Servers and Load Balancing
jQuery Stack Overflow DevDays DC 2009
Apache Web Server Setup 2
Memphis php 01 22-13 - laravel basics
Bring a Web Page Alive with jQuery
Ad

More from Dan York (17)

PDF
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
PDF
SIPNOC 2014 - Is It Time For TLS for SIP?
PPTX
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
PDF
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
PDF
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
PDF
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
PDF
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
PDF
How IPv6 Will Kill Telecom - And What We Need To Do About It
PDF
SIP, Unified Communications (UC) and Security
PDF
SIP Trunking & Security in an Enterprise Network
PDF
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
PDF
IP Telephony Security 101
PDF
Recording Remote Hosts/Interviews with VoIP/Skype
PDF
Hacking and Attacking VoIP Systems - What You Need To Know
PPT
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
PPT
BLISS Problem Statement and Motivation
PPT
ETel2007: The Black Bag Security Review (VoIP Security)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
SIPNOC 2014 - Is It Time For TLS for SIP?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoI...
How IPv6 Will Kill Telecom - And What We Need To Do About It
SIP, Unified Communications (UC) and Security
SIP Trunking & Security in an Enterprise Network
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
IP Telephony Security 101
Recording Remote Hosts/Interviews with VoIP/Skype
Hacking and Attacking VoIP Systems - What You Need To Know
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
BLISS Problem Statement and Motivation
ETel2007: The Black Bag Security Review (VoIP Security)
Ad

Recently uploaded (20)

PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
CloudStack 4.21: First Look Webinar slides
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Five Habits of High-Impact Board Members
PPTX
Benefits of Physical activity for teenagers.pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Modernising the Digital Integration Hub
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
STKI Israel Market Study 2025 version august
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Zenith AI: Advanced Artificial Intelligence
Credit Without Borders: AI and Financial Inclusion in Bangladesh
CloudStack 4.21: First Look Webinar slides
OpenACC and Open Hackathons Monthly Highlights July 2025
Five Habits of High-Impact Board Members
Benefits of Physical activity for teenagers.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
A proposed approach for plagiarism detection in Myanmar Unicode text
Taming the Chaos: How to Turn Unstructured Data into Decisions
Flame analysis and combustion estimation using large language and vision assi...
Convolutional neural network based encoder-decoder for efficient real-time ob...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Modernising the Digital Integration Hub
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
STKI Israel Market Study 2025 version august
Module 1.ppt Iot fundamentals and Architecture
UiPath Agentic Automation session 1: RPA to Agents
The influence of sentiment analysis in enhancing early warning system model f...
Enhancing plagiarism detection using data pre-processing and machine learning...
sustainability-14-14877-v2.pddhzftheheeeee
Zenith AI: Advanced Artificial Intelligence

ClueCon2009: The Security Saga of SysAdmin Steve