Mention three examples of communication methods for early telephone systems. What kind of attacks were these vulnerable to?
These methods were used in older telephonesystems, and exposed to “phreaking” attacks. This means flooding (DoSing) the telephone system with outbound calls. Can increase cost and affect availability.
When and how did telephone communication and calls go digital?
Increased data demand and multiplexing of calls led to the Integrated Services Digital Network (ISDN) in 1980s.
What is the SS7 protocol?
The SS7 protocol familiy (Signal System 7) is an international telecommunication standard, introduces in the 1970s.
Mention some SS7 vulnerabilities
What requirements do VoIP need to satisfy?
Different protocol versions of VoIP:
What are the different specification families of SIP?
What are the three major components in SIP signaling?
In total, SIP manages the call lifecycle from locating the called party, ringing the phone, accepting the call, and terminating it.
How does a SIP user agent enroll (register) to the service?
The user agent must register with location services, which temporarily links an IP address to the SIP URI (for instance sip:teacher@ntnu.no). This enforces identification and authentication to the registrar.
How does SIP establish calls (in a simple matter)?
Caller user agent (UA) sends invitation to user agent client (UAC) aka receiving node, which relays signalling to the user agent server (UAS)
It is common to utilize proxy services in organisations as a “middle-man”.
How does SIP handle security?
Basic SIP was not very secure. No encryptions and transmission of Registrars in cleartext. Several security features have been implemented since its origin.
Without strong endpoint authentication though, guessing of the UAC and valid SIP address can make it easier to guess weak passwords.
What security aspects (H.235) does the H.323 protocol cover?
What are som VoIP codec protocols?
What are some common VoIP attacks?
DoS attacks through:
Vishing attacks (phishing over voice) can be used to fraud victims using the phone.
Other types of attacks and frauds:
2FA over SMS is also subject to MitM-attacks since messages can be redirected through interception-node.