HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

download HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

of 62

Transcript of HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    1/62

    !"#$%$#& ()#$*+ (,#-.+/

    0.$"12/34 567! 8699:.-$#%6.+

    !"#$%&''()*+,-./ 12324562

    %7289 ':33;4 < =:>696? '7;33

    @A:>?7;33 @>A5;?32B5

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    2/62

    (,3.4#

    •  #765 65 2 C23D 2B:8C CE2F? 29234565 29A G2H;E9

    >2C?769I

    •  J:"K B2?DIE:89A

    •  )LK C;?796M8;5

    •  %C2N5N?23 >:A;369I

     

    '25; 5C8A6;5 2D2 OC7; ?::3 5C8PQ

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    3/62

    •  J:"K 65 2 G:G832E E;G32?;>;9C R:E CE2A6N:923

    ?:GG;EST6E; C;3;G7:9; 545C;>5

    •  $29AT6AC7 ;F?6;9C 29A 3:T ?:5C

    •  KE6U2?4 725 B;?:>; 29 69?E;2569I ?:9?;E9

    •  V;9;E2334 2??;GC;A C72C ;9?E4GN:9 57:83A B;

    85;A R:E ;9ASC:S;9A 5;?8E6C4•  $8C ;U;9 6R 6CW5 ;9?E4GC;AX 65 6C 5;?8E;Y

    7./"64:$%6.

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    4/62

    ;;9C5 233;I;A34 ?326> )%[ < V'!\

    72U; 5:>; O?2G2B636C4Q 2I2695C ;9?E4GC;A J:"K

    • 

    !"#$ &'() )#') *+,- ./ ' 012  3'/)4 5'/)1$/ #'6 '

    ('5'7898)4 ':'816) ' 65$(8;( )#$ $1(/45)$2 (.??

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    5/62

    •  L6H3; T:ED 725 B;;9 A:9; B4 C7; 5;?8E6C4

    ?:>>896C4

    •  %:>; 69C;E;5N9I 2?2A;>6? E;5;2E?7

     –  ]9?:U;E69I %G:D;9 K7E25;5 69 &9?E4GC;A J:6?; :U;E "K

    ':>>896?2N:95/ L/8:#)D M'99'/2D +.#'/2)D F$

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    6/62

    ?#$*,"6:.4@567!

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    7/62

    •  %6>632E C: CE2A6N:923 A6I6C23 C;3;G7:94X J:"K

    69U:3U;5 56I923369IX 5;556:9 696N23652N:9 29A

    5;C8G 25 T;33 25 ;9?:A69I :R C7; U:6?; 56I923

    • 

    %;G2E2C;A 69 C: CT: ?7299;35 C72C G;ER:E>

    C7;5; 2?N:95/

     –  ':9CE:3 ?7299;3

     – 

    =2C2 ?7299;3

    567! 8699:.-$#%6.+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    8/62

    • 

    (G;E2C;5 2C C7; 2GG36?2N:9S324;E

    •  !29A3;5 ?233 5;C8GX C;E>692N:9 29A :C7;E;55;9N23 25G;?C5 :R C7; ?233

    • 

    ]5;5 2 56I923369I GE:C:?:3 58?7 25/

     –  %;556:9 "96N2N:9 KE:C:?:3 ^%"K_

     –  &`C;956B3; 1;552I69I 29A KE;5;9?; KE:C:?:3

    ^a1KK_ –

      !b.+.

     –  %D4G;

    86./"6& 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    9/62

    86./"6& 8:A6R469I ;`65N9I ?2335

    • 

    #4G6?2334 GE:C;?C;A T6C7 ;9?E4GN:9X R:E

    ;`2>G3; %"K% T76?7 2AA5 #L%

    •  (c;9 85;A C: ;5C2B3657 C7; C7; A6E;?C A2C2

    ?:99;?N:9 R:E C7; U:6?; CE2F? 69 C7; A2C2

    ?7299;3

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    10/62

    •  #7; GE6>2E4 R:?85 :R :8E E;5;2E?7

    •  ]5;A C: CE295>6C ;9?:A;A 29A ?:>GE;55;A

    U:6?; A2C2

    •  #4G6?2334 :U;E ]=K

    •  J:6?; A2C2 65 CE295G:EC;A 8569I 2 CE295G:EC

    GE:C:?:3 58?7 25 d#K

    A#/# 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    11/62

    • 

    ':>>:9G32?; R:E J:"K 6>G3;>;9C2N:95 C:;9?E4GC C7; A2C2 e:T R:E ?:9fA;9N236C4

    •  [ ?:>>:9 6>G3;>;9C2N:9 65 %;?8E; d;23S

    #6>; #E295G:EC KE:C:?:3 ^%d#K_•  $4 A;R283C T633 GE;5;EU; C7; :E6I6923 d#K

    G243:2A 56g;

    • 

    OF.1$ .& )#$ 5/$R2$;1$2 $1(/[email protected])/'16&./?6

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    12/62

    ?#$*,"6:.4@8643$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    13/62

    •  ]5;A C: ?:9U;EC C7; 2923:I8; U:6?; 56I923 69

    C: 2 A6I6C2334 ;9?:A;A 29A ?:>GE;55;A

    E;GE;5;9C2N:9

    • 

    ':A;?5 5CE6D; 2 B2329?; B;CT;;9 B29AT6AC7

    36>6C2N:95 29A U:6?; M8236C4

    •  Z;WE; >:5C34 69C;E;5C;A 69 J2E62B3; $6C d2C;

    ^J$d_ ?:A;?5

    8643$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    14/62

    •  #7; ?:A;? ?29 A492>6?2334 >:A6R4 C7; B6CE2C;

    :R C7; CE295>6H;A 5CE;2>

    •  ':A;?5 36D; %G;;` T633 ;9?:A; 5:89A5 2C

    A6P;E;9C B6CE2C;5

    •  *:E ;`2>G3;X RE6?2NU;5 >24 B; ;9?:A;A 2C

    3:T;E B6CE2C;5 C729 U:T;35

    5#"-#B&3 ?-/"#/3 8643$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    15/62

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    16/62

    •  #7; GE6>2E4 B;9;fC RE:> J$d 65 2 56I96f?29C34

    B;H;E M8236C4SC:SB29AT6AC7 E2N: ?:>G2E;A C:

    '$d

    •  =;56E2B3; 69 3:T B29AT6AC7 ;9U6E:9>;9C5

     –  ';33832E

     –  %3:T Z6*6

    5#"-#B&3 ?-/"#/3 8643$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    17/62

    ?#$*,"6:.4@CD! #.4 E/#%+%$#& (.#&1+-+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    18/62

    •  d;5;2E?7 C;?796M8;5 B:EE:T;A RE:> )LK 29A

    B6:69R:E>2N?5

    •  KE6>2E634 C7; 85; :R/

     –  KE:f3; !6AA;9 12ED:U 1:A;35

     –  =492>6? #6>; Z2EG69I

    C#/:"#& D#.,:#,3 !"6$3++-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    19/62

    •  %C2N5N?23 >:A;3 C72C 2556I95 GE:B2B636N;5 C:

    5;M8;9?;5 :R 54>B:35

    •  #E2956N:95 RE:> M$:81 5C2C; ^$_ C: Q12  5C2C;

    ^&_

    •  1:U;5 RE:> 5C2C; C: 5C2C; E29A:>34 B8C 69 369;

    T6C7 CE2956N:9 A65CE6B8N:95

    •  #E2956N:95 :??8E 69A;G;9A;9C34 :R 294

    GE;U6:85 ?7:6?;5

    F-443. G#"*6> G643&+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    20/62

    •  #7; >:A;3 T633 ?:9N98; C: >:U; B;CT;;9

    5C2C;5 29A :8CG8C 54>B:35 89N3 C7; Q12  5C2C;

    65 E;2?7;A

    • 

    #7; ;>6H;A 54>B:35 ?:95NC8C; C7; 5;M8;9?;

    F-443. G#"*6> G643&+

    ">2I; RE:> 7HG/hh652B;3SAE:5CbA;h72A::Gh536A;5h!11bGAR

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    21/62

    •  [ 98>B;E :R G:556B3; 5C2C; G2C75 RE:> $ C: &

    •  M$6) 5')# 65 C7; >:5C 36D;34 G2C7

    • 

    #7; J6C;EB6 23I:E6C7> ?29 B; 85;A C: A65?:U;EC7; >:5C GE:B2B3; G2C7

    •  J6C;EB6X B./='/2  29A M'(>='/2  23I:E6C7>5 ?29

    233 B; 85;A C: A;C;E>69; GE:B2B636C4 C72C 2>:A;3 GE:A8?;A 29 :8CG8C 5;M8;9?;

    F-443. G#"*6> G643&+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    22/62

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    23/62

    •  [ U2E62N:9 :R !11

    •  "9CE:A8?;5 G16$/)  29A O$9$)$6

    • 

    [33:T5 C7; >:A;3 C: 6A;9NR4 5;M8;9?;5 T6C7G16$/)6 :E O$9$)$6

    •  K2EN?832E34 E;3;U29C C: 29234565 :R 28A6:

    ?:A;?5 T7;E; 6A;9N?23 8H;E29?;5 :R C7; 52>;

    G7E25; B4 C7; 52>; 5G;2D;E 2E; 8936D;34 C:

    72U; 6A;9N?23 G2H;E95

    !"6H&3 F-443. G#"*6> G643&+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    24/62

    • 

    ':956A;E 2 >:A;3 CE269;A C: E;?:I965;/

    [ $ ' =

    • 

    #7; >:A;3 ?29 5N33 E;?:I965; G2H;E95 T6C7!"#$%&'"/

    [ $ a ' =

    •  (E G2H;E95 T6C7 ($)$&'"/

    [ $ '

    !"6H&3 F-443. G#"*6> G643&+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    25/62

    • 

    L2EI;34 E;G32?;A B4 !115

    •  1;258E;5 56>632E6C4 69 5;M8;9?;5 C72C U2E4 69

    N>; :E 5G;;A

    •  ':>>:934 85;A 69 5G;;?7 E;?:I96N:9

    •  ]5;R83 69 :8E E;5;2E?7 B;?285; :R C7;

    C;>G:E23 ;3;>;9C

    •  [ G2?D;C ?2GC8E; 65 ;55;9N2334 2 N>; 5;E6;5

    A1.#9-$ I-93 ;#"2-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    26/62

    •  ':>G8C;5 2 iA65C29?;W B;CT;;9 CT: N>;

    5;E6;5 j =#Z A65C29?;

    •  =6P;E;9C C: &8?36A;29 A65C29?;

    • 

    #7; =#Z A65C29?; ?29 B; 85;A 25 2 >;CE6? R:E

    i?3:5;9;55W B;CT;;9 C7; CT: N>; 5;E6;5

    A1.#9-$ I-93 ;#"2-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    27/62

    A1.#9-$ I-93 ;#"2-., J 0K#92&3 • 

    ':956A;E C7; R:33:T69I 5;M8;9?;5/ –  , , , k l -k +m +. n . + , , , , , , , , , , , , , , , , , , ,

     –  , , , , , , , , , , , , , , , , , o m -. +o +k p k + , , , , ,

    •  "96N23 29234565 58II;5C5 C7;4 2E; U;E4 A6P;E;9CX 6R ?:>G2E69I RE:>

    C7; ;9CE4 G:69C5b

    •  !:T;U;E C7;E; 2E; 5:>; 56>632E ?72E2?C;E65N?5/

     –  %6>632E 572G;

     –  K;2D5 2C 2E:89A +o

     –

     

    ':83A E;GE;5;9C C7; 52>; 5;M8;9?;X B8C 2C A6P;E;9C N>;:P5;C5Y

    ,

    o

    -,

    -o

    +,

    +o

    .,

    - + . k o m l n p -, -- -+ -. -k -o -m -l -n -p+, +- ++ +. +k +o +m +l +n +p .,

    %;E6;5-

    %;E6;5.

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    28/62

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    29/62

    • 

    ]582334 ?:99;?N:95 2E; G;;ESC:SG;;E

    •  Z; 2558>; C72C ;9?E4GC;A J:"K CE2F? ?29 B; ?2GC8E;A/ –  129S69SC7;S>6AA3;

     – 

    K2556U; >:96C:E69I 

    •  ):C B;4:9A C7; E;23>5 :R G:556B636C4/  –  OV'!\ C2G5 fBE;S:GN? ?2B3;5Q

    7HG/hhTTTbC7;I82EA629b?:>h8Dh+,-.hq89h+-hI?7MS?2B3;5S

    5;?E;CST:E3AS?:>>896?2N:95S952  –  O'7692 76q2?D;A "9C;E9;C CE2F?Q

    7HG/hhTTTbgA9;Cb?:>h?7692S76q2?D;AS8DS69C;E9;CSCE2F?S5245S>?2R;;S.,k,,p,p-,h 

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    30/62

    • 

    $8C T72C ?29 T; I;C RE:> q85C 2 G2?D;C

    ?2GC8E;Y

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    31/62

    • 

    %:8E?; 29A =;5N92N:9 ;9AG:69C5

     –  &A8?2C;A I8;55 2C 329I82I; B;69I 5G:D;9

    •  K2?D;C 3;9IC75

     

    #6>;5C2>G5

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    32/62

    • 

    %: T72CYbbbbbb

    • 

    Z; 9:T D9:T J$d ?:A;?5 ;9?:A; A6P;E;9C5:89A5 2C U2E62B3; B6C E2C;5

     

    Z; 9:T D9:T 5:>; J:"K 6>G3;>;9C2N:9585; 2 3;9IC7 GE;5;EU69I ?6G7;E C: ;9?E4GC

    U:6?; A2C2

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    33/62

     

    J2E62B3; $6C d2C; ':A;?

    rL;9IC7 KE;5;EU69I '6G7;E s 

    E-43 8

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    34/62

    8#+3 E/:41

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    35/62

    • 

    ':99;?N:95 2E; G;;ESC:SG;;E

    •  ]5;5 C7; (G85 ?:A;? ^d*' ml-m_/

    !V5

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    36/62

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    37/62

    • 

    [3C7:8I7 56>632E G7E25;5 T633 GE:A8?; 2 56>632E

    G2H;E9X C7;4 T:9WC B; 6A;9N?23/

     –  $2?DIE:89A 9:65;

     – 

    [??;9C5

     –  %G;;A 2C T76?7 C7;4WE; 5G:D;9

    • 

    %6>G3; 58B5CE69I >2C?769I T:9WC T:EDt

    E*123 8#+3 E/:41

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    38/62

    • 

    #7; CT: 2GGE:2?7;5 T; ?7:5; >2D; 85; :R

    C7; )LK C;?796M8;5/

     –  KE:f3; !6AA;9 12ED:U 1:A;35

     – 

    =492>6? #6>; Z2EG69I

    E*123 8#+3 E/:41

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    39/62

    • 

    $:C7 2GGE:2?7;5 2E; 56>632E 29A ?29 B; BE:D;9 A:T9

    69 C7; R:33:T69I 5C;G5/

     –  #E269 C7; >:A;3 R:E C7; C2EI;C G7E25;

     –

     

    '2GC8E; C7; %D4G; CE2F? –  O[5DQ C7; >:A;3 6R 6CW5 36D;34 C: ?:9C269 C7; C2EI;C G7E25;

    E*123 8#+3 E/:41

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    40/62

    • 

    #: OCE269Q C7; >:A;3X 2 3:C :R C;5C A2C2 65 E;M86E;A

    •  Z; 85;A C7; #"1"# ':EG85 A2C2

    •  d;?:EA69I5 :R m., 5G;2D;E5 :R ;6I7C >2q:E A623;?C5 :R

    [>;E6?29 &9I3657

    •  &2?7 5G;2D;E E;2A5 2 98>B;E :R OG7:9;N?2334 E6?7Q

    5;9C;9?;5

    E*123 8#+3 E/:41 J I"#-.-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    41/62

    OZ74 A: T; 9;;A B6II;E 29A B;H;E B:>B5YQ

    E*123 8#+3 E/:41 J I7G7I

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    42/62

    O!; E6GG;A A:T9 C7; ?;33:G729; ?2E;R8334X 29A 326A C7E;; A:I5

    :9 C7; N9 R:63bQ

    E*123 8#+3 E/:41 J I7G7I

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    43/62

    O#72C T:E> 2 >8EA;E;EYQ

    E*123 8#+3 E/:41 J I7G7I

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    44/62

    • 

    #: ?:33;?C C7; A2C2 T; G324;A ;2?7 :R C7; G7E25;5

    :U;E 2 %D4G; 5;556:9 29A 3:II;A C7; G2?D;C5 8569I

    C?GA8>G

    for((a=0;a

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    45/62

    • 

    K'[K f3; ?:9C26969I uk,, :??8EE;9?;5 :R C7; 52>;

    5G:D;9 G7E25;

    • 

    O%63;9?;Q >85C B; G2E5;A :8C 29A "396>34

    •  *26E34 ;254 S I;9;E2334X 563;9?; :B5;EU;A C: B; 3;55

    C729 n, B4C;5

    •  ]9D9:T9 5G6D;5 C: u-,, A8E69I 563;9?; G725;5

    E*123 8#+3 E/:41 J I"#-.-.,

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    46/62

    E*123 8#+3 E/:41 J E-&3.$3

    %7:EC ;`?;EGC :R %D4G; CE2F? :R C7; 52>; E;?:EA69I ?2GC8E;A . N>;5X

    ;2?7 5;G2E2C;A B4 o 5;?:9A5 :R 563;9?;/

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    47/62

    [GGE:2?7 C: 6A;9NR4 29A E;>:U;C7; 563;9?;/

     –  *69A 5;M8;9?;5 :R G2?D;C5 B;3:TC7; 563;9?; C7E;57:3AX un, B4C;5

     –  "I9:E; 5G6D;5 T7;9 T;WE; 69 2

    563;9?; G725; ^6b;b +, ?:9N98:85G2?D;C5 B;3:T C7; 563;9?;C7E;57:3A_

     –  =;3;C; C7; 563;9?; G725;

     – 

    "95;EC 2 >2ED;E C: 5;G2E2C; C7;5G;;?7 G725;5 j 69C;I;E +++X 69:8E ?25;

     –  #765 3;2U;5 85 T6C7 q85C C7; 5G;;?7G725;5vbb

    E*123 8#+3 E/:41 J E-&3.$3

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    48/62

    E*123 8#+3 E/:41 J E-&3.$3

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    49/62

    • 

    $6:q2U2 GE:U6A;5 2 85;R83 :G;9 5:8E?; RE2>;T:ED

     –  '3255;5 R:E KE:f3; !11 >:A;369I

     –  $28>Z;3?7 R:E CE26969I

     –

     

    [ A492>6? >2CE6` GE:IE2>>69I ?3255 ^=K_ R:E ?23369I 69C:J6C;EB6 R:E 5;M8;9?; 29234565 :9 C7; K!11

    •  Z; ?7:5; C765 36BE2E4 C: 6>G3;>;9C :8E 2H2?D

    E*123 8#+3 E/:41 L !FGG ()#$*

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    50/62

    • 

    #E269 C7; KE:f3;!11 :Bq;?C 8569I C7; $28> Z;3?7

    •  \8;E4 J6C;EB6 C: ?23?832C; 2 3:IS:AA5

    •  ':>G2E; C7; 3:IS:AA5 5?:E; C: 2 C7E;57:3A

    •  "R 2B:U; C7E;57:3A T; 72U; 2 G:556B3; >2C?7

    •  "R 9:CX C7; G2?D;C 5;M8;9?; T25 GE:B2B34 9:C C7; C2EI;CG7E25;

    E*123 8#+3 E/:41 L !FGG ()#$*

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    51/62

    • 

    %2>; CE26969I A2C2 25 K!11

    •  d;>:U; 563;9?; G725;5

    •  #2D; 2 GE:C:C4G6?23 5;M8;9?; 29A ?23?832C; =#Z

    A65C29?; :R 233 CE26969I A2C2 RE:> 6C•

      =;C;E>69; 2 C4G6?23 A65C29?; C7E;57:3A

    •  '23?832C; =#Z A65C29?; R:E C;5C 5;M8;9?; 29A

    ?:>G2E; C: C7E;57:3A•

      "R C7; A65C29?; 65 T6C769 C7; C7E;57:3A C7;9 36D;34

    >2C?7

    E*123 8#+3 E/:41 L AI; ()#$*

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    52/62

    !FGG A396.+/"#%6.

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    53/62

    E*123 8#+3 E/:41 L !"3 I3+%., 

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    54/62

    E*123 8#+3 E/:41 L !6+/ I3+%., 

    '4G7;E/ O" A:9WC ;U;9 5;; C7; ?:A;b [33 " 5;; 65 B3:9A;XBE89;H;X E;AS7;2AQ

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    55/62

    • 

    d;?233 E2C; :R 2GGE:`6>2C;34 n,w

    •  *235; G:56NU; E2C; :R 2GGE:`6>2C;34 +,w

    •  K7:9;N?2334 E6?7;E G7E25;5 T633 46;3A 3:T;E R235;G:56NU;5

    •  #"1"# ?:EG85/ Ox:89I ?763AE;9 57:83A 2U:6A;`G:58E; C: ?:9C2I6:85 A65;25;5Q

    !FGG E/#%+%$+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    56/62

    AI; M3+:&/+ 

    • 

    %6>632E34 C: K!11 E;583C5X un,w E;?233 E2C;

    •  *235; G:56NU; E2C; :R +,w 29A 89A;E j 2I269X 25 3:9I

    25 4:8E CE26969I A2C2 65 I::Ab

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    57/62

    E-&3./ 8-"$&3 J M3+:&/+

    •  ):C U839;E2B3; j 233 A2C2 G243:2A 3;9IC75 2E; -lm B4C;5 69

    3;9IC7t

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    58/62

    ;"#22-., :2

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    59/62

    • 

    %:>; I86A29?; 69 d*'mom+-m

    •  K2AA69I C7; d#K G243:2A ?29 GE:U6A; 2 E;A8?N:9 69

    69R:E>2N:9 3;2D2I;

    •  ':95C29C B6CE2C; ?:A;?5 57:83A B; 9;I:N2C;A A8E69I

    5;556:9 696N2N:9

    !"3>3.%6.

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    60/62

    • 

    [55;55 :C7;E 6>G3;>;9C2N:95

     –  V::I3; #23D

     –  16?E:5:c L49?

     – 

    [U242 J:"K G7:9;5 –  '65?: J:"K G7:9;5

     –  [GG3; *2?;#6>;

    •  [??:EA69I C: Z6D6G;A62X 85;5 d#K 29A %d#KvJ839;E2B3;Y

    •  ">GE:U;>;9C5 C: C7; 23I:E6C7>5 S [GG34 C7; y23>29

    f3C;EY

    N:"/

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    61/62

    • 

    J2E62B3; B6CE2C; ?:A;?5 2E; 8952R; R:E 5;956NU; J:"KCE295>6556:9

    •  "C 65 G:556B3; C: A;A8?; 5G:D;9 ?:9U;E52N:95 69

    ;9?E4GC;A J:"K

    •  J$d T6C7 3;9IC7 GE;5;EU69I ;9?E4GC;A CE295G:EC5 36D;%d#K 57:83A B; 2U:6A;A

    •  ':95C29C B6CE2C; ?:A;?5 57:83A B; 85;A T7;E; G:556B3;

    86.$&:+-6.+

  • 8/17/2019 HiTB KL Oct2013 Practical Attacks Against Encrypted VoIP Communications

    62/62