[asterisk-biz] PBX got Hacked

Andrew M. Lauppe alauppe at anteil.com
Tue Mar 10 16:16:33 CDT 2009


Very insightful, thank you Bret.

Barring packet sniffing (which can only be done along the route right?) 
more secure passwords would make a real difference.

Here is a question - has anyone on the list had an account hacked where 
the password wasn't stupid (where stupid=(1234,1111,secret,${EXTEN}, etc))?

My thought is, the botnets are probably looking for low hanging fruit. 
I'd love to know if anyone has evidence that that isn't the case.

Andy

Anteil, Inc. <http://www.anteil.com>
------------------------------------------------------------------------

*Andrew M. Lauppe
* /Consultant/
	
	4051B Executive Park Dr.
Harrisburg, PA 17111
------------------------------------------------------------------------
+1 (877) OS-LINUX x23
+1 (484) 421-9919 direct



Trixter aka Bret McDanel wrote:
> On Tue, 2009-03-10 at 16:14 -0400, Andrew M. Lauppe wrote:
>   
>> We discussed this on freenode #freepbx today, and someone did the
>> following math.
>>
>> A 20 digit numerical password/secret (numerical meaning only 0-9 -
>> obviously), attacked via brute force at 5,000,000 passwords per
>> second, would take more than 600,000+ years to crack. I didn't verify
>> but it looks about right.
>>
>>     
> 20 digit is 100,000,000,000,000,000,000 combinations assuming that there
> are no blacklisted ones in that space.
>
> 100,000,000,000,000 seconds at 5M/sec. (for reference about what the
> total US debt is including social security and other things that
> normally dont show on the national debt numbers).
>
> about 3.1M years for an exhaustive search, statistically speaking it
> would be half that time on average if you are doing multiple, or about
> 1.6M years.
>
> If the password is alphanumeric then it goes from 100 million trillion
> to 13,367,495,000,000,000,000,000,000,000,000 or 13,367 trillion
> trillion and I am not even going into case sensitivity or other
> characters that could be used.
>
> If you just used upper case letters and numbers, 10 characters would be
> about 23 years @ 5M/sec for an exhaustive search.  12 would be 30k
> years.  See below about how this time could be shortened.
>
>   
>> Lesson of the day? Sure, more secure passwords aren't THE solution,
>> but they sure help. I'm pretty sure any attempt to brute force a SIP
>> password on an asterisk box at anything approching 5 million passwords
>> per second would have side effects that would bring the attack to your
>> attention (like bringing your sip stack to it's knees perhaps?)
>>
>>     
>
> it depends on how they are doing it.  Brute forcing *can* be via capture
> packets, everything needed to get the password is in the auth packets in
> sip.  There are a lot of different ways to get the hashes, they may be
> able to get the hash without really doing much else, or they may be in a
> position to do much more evil things.
>
>
>   
>> With most phones being auto-provisioned, the length of the password
>> shouldn't be a limiting factor. Make your passwords/secrets more
>> complex and we can be done with this conversation. Please.
>>
>>     
> Well it is MD5 in sip, so the 5M/sec doesnt really hold if they are
> doing it on a botnet or similar that is outside your control via
> captured headers.  Of course stopping people from capturing headers is
> beyond the scope of a packet filtering system.
>
>
>   
> ------------------------------------------------------------------------
>
> _______________________________________________
> --Bandwidth and Colocation Provided by http://www.api-digital.com--
>
> asterisk-biz mailing list
> To UNSUBSCRIBE or update options visit:
>    http://lists.digium.com/mailman/listinfo/asterisk-biz
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-biz/attachments/20090310/43f6bd4e/attachment.htm 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Anteil_email.jpg
Type: image/jpeg
Size: 3436 bytes
Desc: not available
Url : http://lists.digium.com/pipermail/asterisk-biz/attachments/20090310/43f6bd4e/attachment.jpg 


More information about the asterisk-biz mailing list