HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

Embed Size (px)

Citation preview

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    1/62

    !"#$%$#& ()#$*+ (,#-.+/

    0.$"12/34 567! 8699:.-$#%6.+

    !"#$%&''()*+,-./ 12324562

    %7289 ':33;4 < =:>696? '7;33

    @A:>?7;33 @>A5;?32B5

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    2/62

    (,3.4#

    •  #765 65 2 C23D 2B:8C CE2F? 29234565 29A G2H;E9

    >2C?769I

    •  J:"K B2?DIE:89A

    •  )LK C;?796M8;5

    •  %C2N5N?23 >:A;369I

     

    '25; 5C8A6;5 2D2 OC7; ?::3 5C8PQ

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    3/62

    •  J:"K 65 2 G:G832E E;G32?;>;9C R:E CE2A6N:923

    ?:GG;EST6E; C;3;G7:9; 545C;>5

    •  $29AT6AC7 ;F?6;9C 29A 3:T ?:5C

    •  KE6U2?4 725 B;?:>; 29 69?E;2569I ?:9?;E9

    •  V;9;E2334 2??;GC;A C72C ;9?E4GN:9 57:83A B;

    85;A R:E ;9ASC:S;9A 5;?8E6C4•  $8C ;U;9 6R 6CW5 ;9?E4GC;AX 65 6C 5;?8E;Y

    7./"64:$%6.

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    4/62

    ;;9C5 233;I;A34 ?326> )%[ < V'!\

    72U; 5:>; O?2G2B636C4Q 2I2695C ;9?E4GC;A J:"K

    • 

    !"#$ &'() )#') *+,- ./ ' 012  3'/)4 5'/)1$/ #'6 '

    ('5'7898)4 ':'816) ' 65$(8;( )#$ $1(/45)$2 (.??

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    5/62

    •  L6H3; T:ED 725 B;;9 A:9; B4 C7; 5;?8E6C4

    ?:>>896C4

    •  %:>; 69C;E;5N9I 2?2A;>6? E;5;2E?7

     –  ]9?:U;E69I %G:D;9 K7E25;5 69 &9?E4GC;A J:6?; :U;E "K

    ':>>896?2N:95/ L/8:#)D M'99'/2D +.#'/2)D F$

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    6/62

    ?#$*,"6:.4@567!

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    7/62

    •  %6>632E C: CE2A6N:923 A6I6C23 C;3;G7:94X J:"K

    69U:3U;5 56I923369IX 5;556:9 696N23652N:9 29A

    5;C8G 25 T;33 25 ;9?:A69I :R C7; U:6?; 56I923

    • 

    %;G2E2C;A 69 C: CT: ?7299;35 C72C G;ER:E>

    C7;5; 2?N:95/

     –  ':9CE:3 ?7299;3

     – 

    =2C2 ?7299;3

    567! 8699:.-$#%6.+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    8/62

    • 

    (G;E2C;5 2C C7; 2GG36?2N:9S324;E

    •  !29A3;5 ?233 5;C8GX C;E>692N:9 29A :C7;E;55;9N23 25G;?C5 :R C7; ?233

    • 

    ]5;5 2 56I923369I GE:C:?:3 58?7 25/

     –  %;556:9 "96N2N:9 KE:C:?:3 ^%"K_

     –  &`C;956B3; 1;552I69I 29A KE;5;9?; KE:C:?:3

    ^a1KK_ –

      !b.+.

     –  %D4G;

    86./"6& 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    9/62

    86./"6& 8:A6R469I ;`65N9I ?2335

    • 

    #4G6?2334 GE:C;?C;A T6C7 ;9?E4GN:9X R:E

    ;`2>G3; %"K% T76?7 2AA5 #L%

    •  (c;9 85;A C: ;5C2B3657 C7; C7; A6E;?C A2C2

    ?:99;?N:9 R:E C7; U:6?; CE2F? 69 C7; A2C2

    ?7299;3

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    10/62

    •  #7; GE6>2E4 R:?85 :R :8E E;5;2E?7

    •  ]5;A C: CE295>6C ;9?:A;A 29A ?:>GE;55;A

    U:6?; A2C2

    •  #4G6?2334 :U;E ]=K

    •  J:6?; A2C2 65 CE295G:EC;A 8569I 2 CE295G:EC

    GE:C:?:3 58?7 25 d#K

    A#/# 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    11/62

    • 

    ':>>:9G32?; R:E J:"K 6>G3;>;9C2N:95 C:;9?E4GC C7; A2C2 e:T R:E ?:9fA;9N236C4

    •  [ ?:>>:9 6>G3;>;9C2N:9 65 %;?8E; d;23S

    #6>; #E295G:EC KE:C:?:3 ^%d#K_•  $4 A;R283C T633 GE;5;EU; C7; :E6I6923 d#K

    G243:2A 56g;

    • 

    OF.1$ .& )#$ 5/$R2$;1$2 $1(/[email protected])/'16&./?6

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    12/62

    ?#$*,"6:.4@8643$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    13/62

    •  ]5;A C: ?:9U;EC C7; 2923:I8; U:6?; 56I923 69

    C: 2 A6I6C2334 ;9?:A;A 29A ?:>GE;55;A

    E;GE;5;9C2N:9

    • 

    ':A;?5 5CE6D; 2 B2329?; B;CT;;9 B29AT6AC7

    36>6C2N:95 29A U:6?; M8236C4

    •  Z;WE; >:5C34 69C;E;5C;A 69 J2E62B3; $6C d2C;

    ^J$d_ ?:A;?5

    8643$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    14/62

    •  #7; ?:A;? ?29 A492>6?2334 >:A6R4 C7; B6CE2C;

    :R C7; CE295>6H;A 5CE;2>

    •  ':A;?5 36D; %G;;` T633 ;9?:A; 5:89A5 2C

    A6P;E;9C B6CE2C;5

    •  *:E ;`2>G3;X RE6?2NU;5 >24 B; ;9?:A;A 2C

    3:T;E B6CE2C;5 C729 U:T;35

    5#"-#B&3 ?-/"#/3 8643$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    15/62

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    16/62

    •  #7; GE6>2E4 B;9;fC RE:> J$d 65 2 56I96f?29C34

    B;H;E M8236C4SC:SB29AT6AC7 E2N: ?:>G2E;A C:

    '$d

    •  =;56E2B3; 69 3:T B29AT6AC7 ;9U6E:9>;9C5

     –  ';33832E

     –  %3:T Z6*6

    5#"-#B&3 ?-/"#/3 8643$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    17/62

    ?#$*,"6:.4@CD! #.4 E/#%+%$#& (.#&1+-+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    18/62

    •  d;5;2E?7 C;?796M8;5 B:EE:T;A RE:> )LK 29A

    B6:69R:E>2N?5

    •  KE6>2E634 C7; 85; :R/

     –  KE:f3; !6AA;9 12ED:U 1:A;35

     –  =492>6? #6>; Z2EG69I

    C#/:"#& D#.,:#,3 !"6$3++-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    19/62

    •  %C2N5N?23 >:A;3 C72C 2556I95 GE:B2B636N;5 C:

    5;M8;9?;5 :R 54>B:35

    •  #E2956N:95 RE:> M$:81 5C2C; ^$_ C: Q12  5C2C;

    ^&_

    •  1:U;5 RE:> 5C2C; C: 5C2C; E29A:>34 B8C 69 369;

    T6C7 CE2956N:9 A65CE6B8N:95

    •  #E2956N:95 :??8E 69A;G;9A;9C34 :R 294

    GE;U6:85 ?7:6?;5

    F-443. G#"*6> G643&+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    20/62

    •  #7; >:A;3 T633 ?:9N98; C: >:U; B;CT;;9

    5C2C;5 29A :8CG8C 54>B:35 89N3 C7; Q12  5C2C;

    65 E;2?7;A

    • 

    #7; ;>6H;A 54>B:35 ?:95NC8C; C7; 5;M8;9?;

    F-443. G#"*6> G643&+

    ">2I; RE:> 7HG/hh652B;3SAE:5CbA;h72A::Gh536A;5h!11bGAR

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    21/62

    •  [ 98>B;E :R G:556B3; 5C2C; G2C75 RE:> $ C: &

    •  M$6) 5')# 65 C7; >:5C 36D;34 G2C7

    • 

    #7; J6C;EB6 23I:E6C7> ?29 B; 85;A C: A65?:U;EC7; >:5C GE:B2B3; G2C7

    •  J6C;EB6X B./='/2  29A M'(>='/2  23I:E6C7>5 ?29

    233 B; 85;A C: A;C;E>69; GE:B2B636C4 C72C 2>:A;3 GE:A8?;A 29 :8CG8C 5;M8;9?;

    F-443. G#"*6> G643&+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    22/62

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    23/62

    •  [ U2E62N:9 :R !11

    •  "9CE:A8?;5 G16$/)  29A O$9$)$6

    • 

    [33:T5 C7; >:A;3 C: 6A;9NR4 5;M8;9?;5 T6C7G16$/)6 :E O$9$)$6

    •  K2EN?832E34 E;3;U29C C: 29234565 :R 28A6:

    ?:A;?5 T7;E; 6A;9N?23 8H;E29?;5 :R C7; 52>;

    G7E25; B4 C7; 52>; 5G;2D;E 2E; 8936D;34 C:

    72U; 6A;9N?23 G2H;E95

    !"6H&3 F-443. G#"*6> G643&+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    24/62

    • 

    ':956A;E 2 >:A;3 CE269;A C: E;?:I965;/

    [ $ ' =

    • 

    #7; >:A;3 ?29 5N33 E;?:I965; G2H;E95 T6C7!"#$%&'"/

    [ $ a ' =

    •  (E G2H;E95 T6C7 ($)$&'"/

    [ $ '

    !"6H&3 F-443. G#"*6> G643&+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    25/62

    • 

    L2EI;34 E;G32?;A B4 !115

    •  1;258E;5 56>632E6C4 69 5;M8;9?;5 C72C U2E4 69

    N>; :E 5G;;A

    •  ':>>:934 85;A 69 5G;;?7 E;?:I96N:9

    •  ]5;R83 69 :8E E;5;2E?7 B;?285; :R C7;

    C;>G:E23 ;3;>;9C

    •  [ G2?D;C ?2GC8E; 65 ;55;9N2334 2 N>; 5;E6;5

    A1.#9-$ I-93 ;#"2-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    26/62

    •  ':>G8C;5 2 iA65C29?;W B;CT;;9 CT: N>;

    5;E6;5 j =#Z A65C29?;

    •  =6P;E;9C C: &8?36A;29 A65C29?;

    • 

    #7; =#Z A65C29?; ?29 B; 85;A 25 2 >;CE6? R:E

    i?3:5;9;55W B;CT;;9 C7; CT: N>; 5;E6;5

    A1.#9-$ I-93 ;#"2-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    27/62

    A1.#9-$ I-93 ;#"2-., J 0K#92&3 • 

    ':956A;E C7; R:33:T69I 5;M8;9?;5/ –  , , , k l -k +m +. n . + , , , , , , , , , , , , , , , , , , ,

     –  , , , , , , , , , , , , , , , , , o m -. +o +k p k + , , , , ,

    •  "96N23 29234565 58II;5C5 C7;4 2E; U;E4 A6P;E;9CX 6R ?:>G2E69I RE:>

    C7; ;9CE4 G:69C5b

    •  !:T;U;E C7;E; 2E; 5:>; 56>632E ?72E2?C;E65N?5/

     –  %6>632E 572G;

     –  K;2D5 2C 2E:89A +o

     –

     

    ':83A E;GE;5;9C C7; 52>; 5;M8;9?;X B8C 2C A6P;E;9C N>;:P5;C5Y

    ,

    o

    -,

    -o

    +,

    +o

    .,

    - + . k o m l n p -, -- -+ -. -k -o -m -l -n -p+, +- ++ +. +k +o +m +l +n +p .,

    %;E6;5-

    %;E6;5.

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    28/62

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    29/62

    • 

    ]582334 ?:99;?N:95 2E; G;;ESC:SG;;E

    •  Z; 2558>; C72C ;9?E4GC;A J:"K CE2F? ?29 B; ?2GC8E;A/ –  129S69SC7;S>6AA3;

     – 

    K2556U; >:96C:E69I 

    •  ):C B;4:9A C7; E;23>5 :R G:556B636C4/  –  OV'!\ C2G5 fBE;S:GN? ?2B3;5Q

    7HG/hhTTTbC7;I82EA629b?:>h8Dh+,-.hq89h+-hI?7MS?2B3;5S

    5;?E;CST:E3AS?:>>896?2N:95S952  –  O'7692 76q2?D;A "9C;E9;C CE2F?Q

    7HG/hhTTTbgA9;Cb?:>h?7692S76q2?D;AS8DS69C;E9;CSCE2F?S5245S>?2R;;S.,k,,p,p-,h 

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    30/62

    • 

    $8C T72C ?29 T; I;C RE:> q85C 2 G2?D;C

    ?2GC8E;Y

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    31/62

    • 

    %:8E?; 29A =;5N92N:9 ;9AG:69C5

     –  &A8?2C;A I8;55 2C 329I82I; B;69I 5G:D;9

    •  K2?D;C 3;9IC75

     

    #6>;5C2>G5

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    32/62

    • 

    %: T72CYbbbbbb

    • 

    Z; 9:T D9:T J$d ?:A;?5 ;9?:A; A6P;E;9C5:89A5 2C U2E62B3; B6C E2C;5

     

    Z; 9:T D9:T 5:>; J:"K 6>G3;>;9C2N:9585; 2 3;9IC7 GE;5;EU69I ?6G7;E C: ;9?E4GC

    U:6?; A2C2

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    33/62

     

    J2E62B3; $6C d2C; ':A;?

    rL;9IC7 KE;5;EU69I '6G7;E s 

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    34/62

    8#+3 E/:41

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    35/62

    • 

    ':99;?N:95 2E; G;;ESC:SG;;E

    •  ]5;5 C7; (G85 ?:A;? ^d*' ml-m_/

    !V5

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    36/62

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    37/62

    • 

    [3C7:8I7 56>632E G7E25;5 T633 GE:A8?; 2 56>632E

    G2H;E9X C7;4 T:9WC B; 6A;9N?23/

     –  $2?DIE:89A 9:65;

     – 

    [??;9C5

     –  %G;;A 2C T76?7 C7;4WE; 5G:D;9

    • 

    %6>G3; 58B5CE69I >2C?769I T:9WC T:EDt

    E*123 8#+3 E/:41

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    38/62

    • 

    #7; CT: 2GGE:2?7;5 T; ?7:5; >2D; 85; :R

    C7; )LK C;?796M8;5/

     –  KE:f3; !6AA;9 12ED:U 1:A;35

     – 

    =492>6? #6>; Z2EG69I

    E*123 8#+3 E/:41

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    39/62

    • 

    $:C7 2GGE:2?7;5 2E; 56>632E 29A ?29 B; BE:D;9 A:T9

    69 C7; R:33:T69I 5C;G5/

     –  #E269 C7; >:A;3 R:E C7; C2EI;C G7E25;

     –

     

    '2GC8E; C7; %D4G; CE2F? –  O[5DQ C7; >:A;3 6R 6CW5 36D;34 C: ?:9C269 C7; C2EI;C G7E25;

    E*123 8#+3 E/:41

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    40/62

    • 

    #: OCE269Q C7; >:A;3X 2 3:C :R C;5C A2C2 65 E;M86E;A

    •  Z; 85;A C7; #"1"# ':EG85 A2C2

    •  d;?:EA69I5 :R m., 5G;2D;E5 :R ;6I7C >2q:E A623;?C5 :R

    [>;E6?29 &9I3657

    •  &2?7 5G;2D;E E;2A5 2 98>B;E :R OG7:9;N?2334 E6?7Q

    5;9C;9?;5

    E*123 8#+3 E/:41 J I"#-.-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    41/62

    OZ74 A: T; 9;;A B6II;E 29A B;H;E B:>B5YQ

    E*123 8#+3 E/:41 J I7G7I

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    42/62

    O!; E6GG;A A:T9 C7; ?;33:G729; ?2E;R8334X 29A 326A C7E;; A:I5

    :9 C7; N9 R:63bQ

    E*123 8#+3 E/:41 J I7G7I

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    43/62

    O#72C T:E> 2 >8EA;E;EYQ

    E*123 8#+3 E/:41 J I7G7I

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    44/62

    • 

    #: ?:33;?C C7; A2C2 T; G324;A ;2?7 :R C7; G7E25;5

    :U;E 2 %D4G; 5;556:9 29A 3:II;A C7; G2?D;C5 8569I

    C?GA8>G

    for((a=0;a

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    45/62

    • 

    K'[K f3; ?:9C26969I uk,, :??8EE;9?;5 :R C7; 52>;

    5G:D;9 G7E25;

    • 

    O%63;9?;Q >85C B; G2E5;A :8C 29A "396>34

    •  *26E34 ;254 S I;9;E2334X 563;9?; :B5;EU;A C: B; 3;55

    C729 n, B4C;5

    •  ]9D9:T9 5G6D;5 C: u-,, A8E69I 563;9?; G725;5

    E*123 8#+3 E/:41 J I"#-.-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    46/62

    E*123 8#+3 E/:41 J E-&3.$3

    %7:EC ;`?;EGC :R %D4G; CE2F? :R C7; 52>; E;?:EA69I ?2GC8E;A . N>;5X

    ;2?7 5;G2E2C;A B4 o 5;?:9A5 :R 563;9?;/

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    47/62

    [GGE:2?7 C: 6A;9NR4 29A E;>:U;C7; 563;9?;/

     –  *69A 5;M8;9?;5 :R G2?D;C5 B;3:TC7; 563;9?; C7E;57:3AX un, B4C;5

     –  "I9:E; 5G6D;5 T7;9 T;WE; 69 2

    563;9?; G725; ^6b;b +, ?:9N98:85G2?D;C5 B;3:T C7; 563;9?;C7E;57:3A_

     –  =;3;C; C7; 563;9?; G725;

     – 

    "95;EC 2 >2ED;E C: 5;G2E2C; C7;5G;;?7 G725;5 j 69C;I;E +++X 69:8E ?25;

     –  #765 3;2U;5 85 T6C7 q85C C7; 5G;;?7G725;5vbb

    E*123 8#+3 E/:41 J E-&3.$3

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    48/62

    E*123 8#+3 E/:41 J E-&3.$3

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    49/62

    • 

    $6:q2U2 GE:U6A;5 2 85;R83 :G;9 5:8E?; RE2>;T:ED

     –  '3255;5 R:E KE:f3; !11 >:A;369I

     –  $28>Z;3?7 R:E CE26969I

     –

     

    [ A492>6? >2CE6` GE:IE2>>69I ?3255 ^=K_ R:E ?23369I 69C:J6C;EB6 R:E 5;M8;9?; 29234565 :9 C7; K!11

    •  Z; ?7:5; C765 36BE2E4 C: 6>G3;>;9C :8E 2H2?D

    E*123 8#+3 E/:41 L !FGG ()#$*

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    50/62

    • 

    #E269 C7; KE:f3;!11 :Bq;?C 8569I C7; $28> Z;3?7

    •  \8;E4 J6C;EB6 C: ?23?832C; 2 3:IS:AA5

    •  ':>G2E; C7; 3:IS:AA5 5?:E; C: 2 C7E;57:3A

    •  "R 2B:U; C7E;57:3A T; 72U; 2 G:556B3; >2C?7

    •  "R 9:CX C7; G2?D;C 5;M8;9?; T25 GE:B2B34 9:C C7; C2EI;CG7E25;

    E*123 8#+3 E/:41 L !FGG ()#$*

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    51/62

    • 

    %2>; CE26969I A2C2 25 K!11

    •  d;>:U; 563;9?; G725;5

    •  #2D; 2 GE:C:C4G6?23 5;M8;9?; 29A ?23?832C; =#Z

    A65C29?; :R 233 CE26969I A2C2 RE:> 6C•

      =;C;E>69; 2 C4G6?23 A65C29?; C7E;57:3A

    •  '23?832C; =#Z A65C29?; R:E C;5C 5;M8;9?; 29A

    ?:>G2E; C: C7E;57:3A•

      "R C7; A65C29?; 65 T6C769 C7; C7E;57:3A C7;9 36D;34

    >2C?7

    E*123 8#+3 E/:41 L AI; ()#$*

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    52/62

    !FGG A396.+/"#%6.

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    53/62

    E*123 8#+3 E/:41 L !"3 I3+%., 

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    54/62

    E*123 8#+3 E/:41 L !6+/ I3+%., 

    '4G7;E/ O" A:9WC ;U;9 5;; C7; ?:A;b [33 " 5;; 65 B3:9A;XBE89;H;X E;AS7;2AQ

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    55/62

    • 

    d;?233 E2C; :R 2GGE:`6>2C;34 n,w

    •  *235; G:56NU; E2C; :R 2GGE:`6>2C;34 +,w

    •  K7:9;N?2334 E6?7;E G7E25;5 T633 46;3A 3:T;E R235;G:56NU;5

    •  #"1"# ?:EG85/ Ox:89I ?763AE;9 57:83A 2U:6A;`G:58E; C: ?:9C2I6:85 A65;25;5Q

    !FGG E/#%+%$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    56/62

    AI; M3+:&/+ 

    • 

    %6>632E34 C: K!11 E;583C5X un,w E;?233 E2C;

    •  *235; G:56NU; E2C; :R +,w 29A 89A;E j 2I269X 25 3:9I

    25 4:8E CE26969I A2C2 65 I::Ab

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    57/62

    E-&3./ 8-"$&3 J M3+:&/+

    •  ):C U839;E2B3; j 233 A2C2 G243:2A 3;9IC75 2E; -lm B4C;5 69

    3;9IC7t

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    58/62

    ;"#22-., :2

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    59/62

    • 

    %:>; I86A29?; 69 d*'mom+-m

    •  K2AA69I C7; d#K G243:2A ?29 GE:U6A; 2 E;A8?N:9 69

    69R:E>2N:9 3;2D2I;

    •  ':95C29C B6CE2C; ?:A;?5 57:83A B; 9;I:N2C;A A8E69I

    5;556:9 696N2N:9

    !"3>3.%6.

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    60/62

    • 

    [55;55 :C7;E 6>G3;>;9C2N:95

     –  V::I3; #23D

     –  16?E:5:c L49?

     – 

    [U242 J:"K G7:9;5 –  '65?: J:"K G7:9;5

     –  [GG3; *2?;#6>;

    •  [??:EA69I C: Z6D6G;A62X 85;5 d#K 29A %d#KvJ839;E2B3;Y

    •  ">GE:U;>;9C5 C: C7; 23I:E6C7>5 S [GG34 C7; y23>29

    f3C;EY

    N:"/

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    61/62

    • 

    J2E62B3; B6CE2C; ?:A;?5 2E; 8952R; R:E 5;956NU; J:"KCE295>6556:9

    •  "C 65 G:556B3; C: A;A8?; 5G:D;9 ?:9U;E52N:95 69

    ;9?E4GC;A J:"K

    •  J$d T6C7 3;9IC7 GE;5;EU69I ;9?E4GC;A CE295G:EC5 36D;%d#K 57:83A B; 2U:6A;A

    •  ':95C29C B6CE2C; ?:A;?5 57:83A B; 85;A T7;E; G:556B3;

    86.$&:+-6.+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    62/62