Perimeter
8/12/2011
04:00 PM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

WarVOX Gets An Overhaul; Wardialing Added To Metasploit

Rewrite of WarVOX brings new features, better audio fingerprinting, and a Ruby VoIP stack that has been integrated into Metasploit

In early 2009, HD Moore reinvented wardialing with the creation of WarVOX. Since then, penetration testers (and mischievous pranksters) have used it to call millions of phone numbers, looking for interesting devices plugged into phone lines. HD unveiled the next generation at BSides Las Vegas with WarVOX 2 -- a complete rewrite of WarVOX with new features and an eye toward full inclusion within Metasploit.

During his talk, the CSO of Rapid7 discussed the evolution of Metasploit since the project was released in 2003, as well as some of the highlights of the new 4.0 release. Next, HD debuted WarVOX 2, discussing some of the major problems with version 1 and its dependencies on various libraries. To deal with those issues, HD rewrote WarVOX and created a VoIP stack in Ruby -- a programming language -- so WarVOX would have native support to make calls without relying on unreliable third-party code libraries.

In addition to the new Ruby VoIP code and the complete code rewrite, HD moved WarVOX from SQLite3 to PostgreSQL (the same database commercially supported by Metasploit), so all voice recordings and images are stored in the database. A new audio fingerprinting system was created, and wardialing functionality has been added to Metasploit.

The move to Postgres makes sense because that's what Rapid7 officially supports for Metasploit, but where things get really interesting is the new audio fingerprinting. The fingerprinting is described as extremely CPU-intensive during the fingerprint creation process, but matching those fingerprints once generated is incredibly fast.

During the BSides talk, HD demonstrated the fingerprinting features by comparing recordings obtained by calling some of the Las Vegas hotels. He was able to quickly identify numbers where the same people had answered or recorded the voicemail greeting.

Practical purposes? Well, if you're doing recon for a penetration test and social engineering is within scope, imagine if you could call the voicemail of the employee, record his voice from his cell phone, and then call all the phone numbers at his office (or in the nearby residential area) and identify him automatically.

And, of course, there are all the juicy devices that have been plugged into phone lines, possibly for years, with poorly chosen passwords that allow you to bridge into the internal network or control systems remotely.

The WarVOX 2 code had been committed to the subversion software repository about two hours prior to HD's presentation, and phone scanning and audio recording functionality is now available in Metasploit, making it easy for anyone to be able to perform advanced wardialing. The question now is, how will you use it in your next penetration test?

John Sawyer is a Senior Security Analyst with InGuardians. The views and opinions expressed in this blog are his own and do not represent the views and opinions of his employer. He can be reached at [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.