Converging Networks Attacks

Popularity:

6

Simplicity:

7

Impact:

10

Risk Rating:

8

The unique nature of VoIP adds a number of security concerns to existing network technology. Specifically, the converging data and voice networks may introduce new avenues of attack:

• VLAN hopping via terminal access Exploiting phone ports that are usually configured for trunking

• Network sniffing Gathering information useful for enumeration and reconnaissance, such as an extension to IP address mapping

• Disruption of QoS If maximum bandwidth is not enforced at switch port level

• Other specific attacks aimed at lower-level protocols Including Cisco Discovery Protocol (CDP)

Furthermore, VoIP-ready firewalls may bring some new unexpected holes, while interconnections to the traditional PSTN network may represent a juicy target for an attacker willing to play with SS7, MGCP, Megaco/H.248, and such. Finally, converging networks introduce new annoying phenomena, such as Spam over Internet Telephony (popularly known as SPIT), VoIPhishing, and VoIP War Dialing.

As with conventional IP networks, the described attacks can compromise each requirement of the CIA paradigm, specifically leading to toll fraud, call eavesdropping and tracing, call hijacking, caller ID spoofing, and denial of service.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook


Post a comment