Security of IP Telephony in Ecuador: Online Analysis
DOI:
https://doi.org/10.29019/enfoqueute.v7n2.93Keywords:
IP telephony, security, Ecuador, Asterisk, vulnerabilities, threatsAbstract
Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.
Downloads
References
Androulidakis, I. I. (2016). VoIP and PBX Security and Forensics: A Practical Approach.
Bryant, R., Madsen, L., & Van Meggelen, J. (2013). Asterisk: The definitive guide. " O'Reilly Media, Inc.".
Corporación Nacional de Telecomunicaciones. (2016). Troncal Telefónica IP - Telefonía | Corporación Nacional de Telecomunicaciones. [en línea] Disponible en: https://www.cnt.gob.ec/telefonia/plan-corporativo/troncal-telefonica-ip-2/ [Visitado 12 Ene. 2016].
Dassouki, K., Safa, H., & Hijazi, A. (2014, March). End to End Mechanism to Protect Sip from Signaling Attacks. In New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on (pp. 1-5). IEEE.
El Comercio. (2015). Las llamadas por WhatsApp no pueden ser restringidas en Ecuador, según el Gobierno. [en línea] Disponible en: http://www.elcomercio.com/actualidad/llamadas-whatsapp-restringidas-ecuador-gobierno.html [Visitado 12 Ene. 2016].
El Universo. (2016). Skype reporta que algunos usuarios tienen problemas para realizar llamadas. [en línea] Disponible en: http://www.eluniverso.com/vida-estilo/2015/09/21/nota/5140421/skype-reporta-que-algunos-usuarios-tienen-problemas-realizar [Visitado 12 Ene. 2016].
EnableSecurity. (2012). SIPVicious. [en línea] Disponible en: http://blog.sipvicious.org/ [Visitado 1 Ene. 2016].
Exploit Database. (2010, Septiembre 24). FreePBX <= 2.8.0 Recordings Interface Allows Remote Code Execution. Disponible en: https://www.exploit-db.com/exploits/15098/ [Visitado 31 Ene. 2016].
Exploit Database. (2014, Marzo 12). FreePBX 2.11.0 - Remote Command Execution. Disponible en: https://www.exploit-db.com/exploits/32214/ [Visitado 30 Ene. 2016].
Exploit Database. (2015, Marzo 7). Elastix 2.x - Blind SQL Injection Vulnerability [en línea] Disponible en: https://www.exploit-db.com/exploits/36305/ [Visitado 1 Ene. 2016].
Instituto Nacional de Compras Públicas. (2016). Ingreso al Sistema - Compras Públicas. [en línea] Disponible en: https://www.compraspublicas.gob.ec/ProcesoContratacion/compras/ [Visitado 1 Ene. 2016].
Ip2location. (2016). Block Visitors by Country | IP2Location.com. [en línea] Disponible en: http://www.ip2location.com/blockvisitorsbycountry.aspx [Visitado 1 Ene. 2016].
Puente, G. B. (2015). Elastix Unified Communications Server Cookbook. Packt Publishing Ltd.
Sangoma. (2014). FreePBX. [en línea] Disponible en: https://www.freepbx.org/ [Visitado 1 Ene. 2016].
Terán, F. (2012). Nuevas fallas de seguridad Zero Day descubiertas en Asterisk 1.6.2, 1.8 y Asterisk 10. [en línea] Sinologic :: Tu web favorita sobre VoIP. Disponible en: https://www.sinologic.net/blog/2012-04/nuevas-fallas-de-seguridad-zero-day-descubiertas-en-asterisk-1-6-2-1-8-y-asterisk-10.html [Visitado 1 Ene. 2016].
Published
How to Cite
Issue
Section
License
The authors retain all copyrights ©.
- The authors retain their trademark and patent rights, as well as rights to any process or procedure described in the article.
- The authors retain the right to share, copy, distribute, perform, and publicly communicate the article published in Enfoque UTE (for example, post it in an institutional repository or publish it in a book), provided that acknowledgment of its initial publication in Enfoque UTE is given.
- The authors retain the right to publish their work at a later date, to use the article or any part of it (for example, a compilation of their work, lecture notes, a thesis, or for a book), provided that they indicate the source of publication (authors of the work, journal, volume, issue, and date).