How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent Threats

Size: px
Start display at page:

Download "How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent Threats"

Transcription

1 International Journal on Information Technology (IREIT), Vol. xx, How Vulnerabilities in Wireless Networks Can Enable Advanced Persistent Threats Roger Piqueras Jover 1, Paul Giura 1 Abstract With the tremendous popularity of mobile devices and their increasing adoption in the corporate environments, there is a larger opportunity for Advanced Persistent Threats (APTs) to exploit vulnerabilities in wireless and mobility networks. We review several vulnerabilities and successful attacks in this domain, and evaluate the possibility of these attacks to be used by APTs. Our analysis shows that known attacks in the mobility domain are powerful enough to contribute to the success of an APT operation. Copyright 2013 Praise Worthy Prize S.r.l. - All rights reserved. Keywords: Advanced Persistent Threat, Security, Wireless communications I. Introduction Advanced Persistent Threats (APTs) are some of the fastest growing information security threats that organizations face today [1]. They are operated by very skilled and well funded attackers targeting sensitive information from specific organizations. The ultimate goal is to steal intellectual property created from expensive research, to gain access to sensitive customer data or to access strategic business information that could be used for illegal insider trading or to disrupt an organization's business. APT can best be defined using the words deriving the acronym [2]. Advanced (A) means that attackers are well trained, organized, well funded and utilize a full spectrum of network intrusion technologies, crafting their own tools if needed. Persistent (P) refers to the persistence of the attack over long periods of time. Attackers give high priority to a specific task, rather than opportunistically seeking immediate gain, and maintain a prolonged presence in the compromised organization networks. Threat (T) refers to the attackers intention to inflict damage and create loss by disrupting services or stealing proprietary data. APTs have become very sophisticated and diverse in the methods and technologies used, particularly in the ability to use organizations' own employees to penetrate the IT systems [1]. They are characterized as low and slow advanced operations: low for maintaining a low profile in the networks and slow for long execution times. Analyses of specific APT instances conclude that each operation is unique and highly customized for each target ([1], [3]-[5]). However, across many operations, the stages are similar and they differentiate mostly in the specific methods used to achieve each milestone. Figure 1 shows these stages in the order in which they are typically executed over long periods of time, and what are the actions within each Manuscript received January 2013, revised February 2013 stage. Typical security analyses focus on scalable attacks that can target infrastructure, millions of users, etc. Many attacks to cellular networks (i.e. GSM) have not gathered much attention because of that aspect. However, with the advent of APT, scale is no longer the issue. The most precise and targeted attacks are the most effective. In this paper we evaluate the possibility of APT operators exploiting known attacks and vulnerabilities in the wireless and mobility domain to accomplish their missions. Our analysis provides a useful insight not only for detection of APT but also for the forensic investigations that follow up the discovery of an attack. To our knowledge, no other study leverages the possibility of attackers exploiting vulnerabilities of wireless networks to launch and maintain an APT. Fig. 1. Typical stages of an APT With this work we make the following key contributions: We provide a review of relevant recent known attacks in the wireless and mobility domain. Copyright 2013 Praise Worthy Prize S.r.l. - All rights reserved

2 We assess the possibility that the wireless and mobility attacks can be used to accomplish various actions of a potential APT. We recommend a set of preventative measures that should be considered in order for organizations to reduce the risk of being targets of successful APTs. The rest of the paper is organized as follows. Section II surveys some of the wireless networks vulnerabilities and known attacks exploiting them, Section III shows how vulnerabilities can be used by APTs, Section IV lists a set of practical measures that can limit the success of APTs, and, finally, in Section V, we present our conclusions. II. Vulnerabilities in wireless cellular networks This section presents an overview of the vulnerabilities and weak points that attackers could exploit in order to prepare, launch and maintain an APT. For example, both data and voice communications could potentially be eavesdropped during the Reconnaissance stage to profile employees. The information obtained in this stage could be used to optimize the crafting of malware and spear-phishing techniques in the Delivery stage. With the deployment of a rogue Base Station (BS), the actual Delivery and Exploitation stages could be implemented. Finally, a wireless terminal connected to the mobility network could potentially be used in the Exfiltration stage, avoiding the enterprise firewall. II.1. Default fall back to 2G networks Vulnerability: By design, all cellular networks based on 3GPP standards (i.e. GSM/GPRS/EDGE, UMTS and LTE) fall back to a basic 2G (Global System for Mobile Communications, GSM) connection when connectivity on 3G or beyond cannot be achieved. This can be as a result of traffic balancing or because reception on the desired radio band is not possible. In this way, a mobile device can always be online independently of the 3G footprint of a given provider. It is well known that 2G networks are insecure and provide weak encryption [6]. Given the lack of dual authentication of GSM [7], this fall back can potentially create a security breach. Multiple vulnerabilities that could be exploited in this situation are analyzed in the remainder of this section. In order to attempt different attacks, jamming tools are often applied to force phones to fall back to 2G. Jamming Attack: Radio jamming is the deliberate transmission of radio signals to disrupt communications by decreasing the signal to noise ratio. This attack has been studied in the literature in the context of cellular communications [8]. By means of a radio jammer, an attacker could make a cell-phone unable to detect any 3G base station, forcing it to fall back to GSM to access the network [9]. Despite its effectiveness, jamming can be potentially detected and it requires the attacker either to be in the close vicinity of the victim or to transmit a very large amount of power, which alerts of its presence. Smart Jamming Attack: This technique aims to locally disrupt the communications of a wireless network in an undercover way raising no alerts. This is done by means of saturating one or more of the essential control channels required by all mobile devices to access the spectrum. Multiple studies in the literature theoretically demonstrate how to saturate a cellular network by means of, for example, text messages (Short Message Service, SMS) [10] or sustained and periodic set-ups of data connections [11]. Smart jamming is a simple more localized attack that is aimed at low layers. It targets essential control channels shared by all the users within a cell that carry signaling information during the initial access to the system. Saturation of these channels would make the network appear unresponsive and could force a phone to switch to a GSM connection. In parallel, given that this attack requires low transmitted power and can be done at pre-authentication, detection and mitigation are difficult. This attack has been already demonstrated in the context of GSM networks ([12]. [13]) and is theoretically possible on 3G and LTE (Long Term Evolution). A recent report discusses about the feasibility of jamming Long Term Evolution (LTE) networks in a similar way [14]. II.2. GSM location leaks Vulnerability: The way cellular networks handle incoming calls leaks some information that can be used to locate a device. Upon an incoming connection, the core network attempts to find the mobile station within an area where it was known to have been recently, known as the Location Area Code (LAC) [15]. To do so, paging messages are sent over all the cells contained in the LAC. These paging messages as well as the responses sent on the Random Access Channel are not encrypted and can potentially be sniffed by an attacker. Target Localization Attack: The authors of [16] demonstrate a practical technique to locate a specific target given its phone number. By means of sniffing traffic and discarding locations where the target is not present, it is possible to locate a mobile user in terms of cell. This allows the attacker to locate its victim and proceed to jam that specific cell. Similar techniques are introduced in [17] to locate any device. II.3. GSM security Vulnerability: The second generation of wireless networks (2G or GSM) has been in wide use for a very long time. Its security attributes, considered strong at the time of deployment, have been proven to be vulnerable as technology evolved and allowed attackers to obtain the

3 necessary tools at low cost. Over the last few years, multiple attacks have exploited such weaknesses. The three main features of GSM security are: 1) authentication of the subscriber accessing the network, 2) encryption of user data at the radio interface and 3) use of temporary identities for confidentiality [7]. The first two features are based on an individual secret key (K i ) stored in the SIM card of a mobile terminal. Another copy of this key is stored at the network authentication center. The authentication of the subscriber is performed with a challenge message sent from the network. The phone responds with the result of applying a cryptographic function with the secret key and the challenge. In parallel, a temporary session key (K c ) is generated. This is the key used to encrypt the radio traffic. The subscriber identity (IMSI) is kept secret and it is only transmitted over the air on very special occasions; a temporary identity (TMSI) is used for most of the transactions. The asymmetry of the authentication protocol, that does not require the network to identify itself, makes a Man-inthe-Middle (MitM) attack possible. II.4. GSM encryption Vulnerability: The A4 is the GSM encryption algorithm for the radio interface [7]. It is based on the session key K c described in Section II.C. This 64-bit key is combined with the frame number (22 bits) in order to generate a pseudo-random key stream (114 bits) that is combined (XOR) with the plain text message to generate the encrypted message. This algorithm has been expanded with multiple variations A5/1, A5/2, A5/3 and A5/0). During the connection and authentication step, the phone and the network agree which algorithm to use. Note that A5/0 stands for not applying any encryption at all so, by means of a rogue base station, an attacker could fool a victim to turn off encryption. GSM Sniffing/Hacking Attack: The A5 algorithm has been recently cracked. This allows an attacker to eavesdrop and decrypt all the traffic a victim generates as well as the traffic that is received. The authors of [6] present a way to break the encryption by means of rainbow tables and obtain the session key. After identifying a victim and its TMSI, the attacker sends a text message to the target device to force it to establish a connection. The attacker then eavesdrops the handshake between the device and the base station to transmit the message. This is a known handshake protocol, therefore both the plain text and the encrypted version of several control messages are known. A lookup on a rainbow table provides the session key that was used. Once the session key is obtained, all transactions can be decrypted in real time. Fig. 2. Man in the Middle attack and Connection Hijacking Man-in-the-Middle Attack: Many security features of GSM have been defeated over the last few years [18]. As illustrated in Figure 2, an attacker is able to deploy a rogue base station and get target users to attach to it. Given that the authentication algorithm is not symmetric, the network is not required to authenticate, so the device believes it is connected to a real Base Station. To achieve a full Man-in-the-Middle (MitM) position, the attacker attempts to access the network claiming the victim's identity. After receiving the challenge message from the network, the challenge message is forwarded to the victim. The victim's reply with the correct response is, in turn, forwarded to the network. This kind of attack has been discussed in the context of 3G networks as well [19]. Researchers have shown how, by means of a rogue base station, phishing attacks can be launched to a victim in order to obtain all kinds of credentials such as banking information, logins, passwords and other highly sensitive information [20]. In a similar way, malware can be forced into the device. II.5. WAP protocol and provisioning Vulnerability: The Wireless Application Protocol (WAP) defines industry-wide specifications for developing applications that operate over wireless communication networks [21]. It is responsible for initialization and alert messages and defines how PUSH and PULL applications interact with the network. One of the main functions of WAP is provisioning, which defines how a WAP client (cellphone) is configured for a specific application. In the case of PUSH applications, a special message is sent to the phone informing that there is content available. This message indicates to the phone the address from where to obtain the content. PUSH messages are also used to display alerts or messages on a phone. Both PUSH and provisioning messages are trusted and executed by the phone. Therefore, a malicious provisioning message could tamper with the phone's configuration. Crafting a PUSH message with the address hosting a piece of malware could force an infection into a phone. Malicious PUSH messages can also, for example, display messages on the screen fooling the user into typing a password. Connection Hijacking Attack: It has been demonstrated that provisioning messages can be maliciously crafted and sent to a victim from a rogue base

4 station. In this way, an attacker can change configuration settings of a phone. In particular, it is shown that the DNS configuration can be tampered to force connections through a malicious proxy that eavesdrops and captures all traffic [9]. This attack is also illustrated in Figure 2. Additionally, a spoofed PUSH message can potentially be used to trick a user to install malware on a phone [9]. Note that, in order to launch this attack, the victim has to be connected to a rogue GSM Base Station. for social engineering. Voic Hacking Attack: The recent News of the World scandal [24] brought mainstream attention to the feasibility of spoofing the caller ID and how this allows attackers to hack into voic accounts with no password or a default one. II.6. Mobility Vulnerability: A cell-phone is, by definition, a mobile terminal that is with the user most of the time. The mobility of such device enhances the threats on security networks it connects to. In the context of an APT, a cellphone might open the doors to attacks by circumventing security barriers such as firewalls (Figure 3). In current scenarios, an attacker trying to gain access to the inside of a corporate network crafts a phishing very selectively targeted to someone within the organization. Other social engineered techniques are known to be used, such as physical access to the terminals and malware deployment by means of, for example, a USB drive. Mobile terminals present, though, a simpler alternative. Firewall Circumvention, Malware Deployment and Data Exfiltration Attacks: As described in Section II.E, a user can be fooled into downloading a piece of malicious code without installing any application. This malware can potentially be transferred to any computer to which the phone is physically connected, for example, to charge the battery. There are known attacks that aim to exhaust the victim's phone battery [22]. In this way an attacker can force a victim to plug the phone to a computer to charge it. In parallel, a mobile device often creates a bridge between a secured network environment, i.e. between the firewalls and the outside world (Figure 3). This happens in the case of a mobile phone connected to the Internet via a 3G connection that is, in parallel, connected to a host within a corporation network. Also, a phone is sometimes in a secure (corporate) network and later in a less secure one (home network). Beyond deploying malware, an infected phone can also potentially be used to exfiltrate data. The actual contents of the phone or files from the host computer could be delivered to a server under the attacker's control over WiFi or 3G using the phone as a bridge to circumvent firewalls. II.7. Voic Vulnerability: Secured access to voic accounts is primarily based on a password being used for authentication. However, many cellular providers have the password for the voic as an optional feature that the user can deactivate, and sometimes the default password is not changed [23]. This could potentially provide an attacker with access to employee information Fig. 3. Mobility + USB circumventing corporate firewalls II.8. USB interface Vulnerability: USB has become the universal standard for both data transferring and battery charging in smart phones. In both processes, the phone is physically connected to a computer. The communication protocol over USB is inherently trusted and assumed to be secure. This is mainly due to the physical proximity between the two devices and the fact that it is the user who connects them. The USB protocol is equipped with no mechanisms to authenticate the validity of the device attempting to communicate with the host. This potentially allows an attacker to disguise and report itself as a different device, such as a USB keyboard, mouse, etc. This trust is known to be often abused in the context of USB pen drives or memory sticks [25]. Known instances of malware can exploit certain vulnerabilities of the USB boot process to deploy a malicious payload on the host. Malware Transmission Via USB Attack: In [26] authors demonstrate how these vulnerabilities can be exploited in the context of smart-phones. They show that a smart-phone connected to a host can claim to be a USB keyboard and send keystrokes. The attacker gains full access to the host under the privileges of the current user. This can potentially be used to install malware or exfiltrate data. Once mounted, the device has full control to drop any specially crafted media file to exploit the corresponding processing engine. The same authors describe a symmetric attack vector that allows an attacker to deploy a malicious payload into a mobile device from the computer it is connected to. This exploit, combined with the mobility of a cell-phone, allows an attacker to infect a user in a less secure location (home) and the payload to be deployed into the corporate network,

5 Fig. 4. Leveraging wireless network vulnerabilities to initiate maintain and complete an APT circumventing firewalls (Figure 3). III. APT in Mobility Domain An APT has a specific target, which could be either a person, proprietary data or organization assets. Each one of the security incidents and exploitations can occur in a combination of different contexts. It is precisely this combination of environments that makes this attack very difficult to detect. Entry vectors are often assumed to use wired networks. In this section we show how the attacks described in Section II can be used throughout an APT operation. We assume that the core of the attack, i.e. Operation and Data Collection stages, must be completed by an attacker from within the corporate network. These stages cannot take advantage of any vulnerability in wireless networks. However, we show that the attacks described in Section II can be leveraged to achieve the remainder steps of the APT. Based on the model in Figure 1, the intrusion is divided in 4 stages on the left column of Figure 4. The second column lists multiple actions and milestones that are defined for each stage. The attacks analyzed in Section II are placed on the remainder columns. The body of Figure 4 indicates what milestones can be reached using each attack. Finally, the arrows indicate one example strategy to launch, maintain and complete an APT operation. Each step is indicated with a shaded rectangle and label numbers represent the order of the steps, multiple steps being possible for most actions. III.1. Reconnaissance In the initial Reconnaissance stage, an attacker could identify and locate a victim by means of sniffing paging messages and exploiting location leaks (Step 1 in Figure 4). Assuming that a phone has been forced to fall back to GSM (i.e. jamming, Step 2), an intruder can launch a Man in the Middle attack. This gives the attacker the ability to extract information for profiling and scan potential vulnerabilities of the victim's device (Steps 3 and 4). The encryption of GSM can be broken to listen to calls and read messages, providing further information for the employee's profiling. A malicious PUSH or provisioning WAP message can be used to tamper the DNS configuration of a phone. From that point, all traffic can be re-routed through a malicious proxy controlled by the attacker and information can be extracted [9]. Further social engineering data can be obtained by hacking into the voic [23]. These methods potentially allow an attacker to obtain all kinds of information from a set of victims and elaborate a complete profile about them. Once a piece of malware or a rootkit is deployed on the phone, the victim profiles can be completed with extra data such as location information. The malware can potentially turn on the field test mode in the phone to track the location of the set of victims. III.2. Delivery/Exploitation Given their mobility, cell-phones are a potential platform for malware infection of terminals within the boundaries of the corporate firewalls. Section II.F and II.H describe how vulnerabilities in the USB protocol can be exploited to transfer a malicious payload from an infected computer at an insecure location to a mobile phone. The infection is then transferred to a corporate machine. Note that, known attacks that aim to exhaust the battery of a phone [22] can be added to the equation to force the actual physical USB connection to recharge the phone. A malicious payload can be forced into the victim's phone by means of a spear-phishing PUSH message or from a rogue base station (Steps 5 and 6 of Figure 4).

6 Then, exploiting USB vulnerabilities and the inherent mobility of the phone, the malware is transferred into the employee's corporate machine, allowing the attacker to control it (Steps 7 and 8). Finally, diverse access information is obtained by launching multiple attacks (Step 9). The victim is fooled into entering credentials such usernames, token codes, passwords, etc [20]. In parallel, the GSM encryption can be broken so communications can be eavesdropped on the fly or stored for later analysis [6]. The malicious payload in the victim's phone can also be used to exfiltrate information such as contacts, recent called numbers and other data stored in the device. With the stolen credentials, an attacker can gain access to an insider's account. From that initial victim, a further phishing can be sent to a second victim. This technique could be applied to elevate privileges and move closer to the target. III.3. Exfiltration Finally, because of their inherent mobility, cell-phones can potentially be used as a platform for a sequential exfiltration of targeted data (Steps 11 and 12 in Figure 4). Instead of tunneling the stolen data through firewalls and protected perimeters to some external server, data could be gathered in small pieces by one or multiple phones. These, in turn, forward the chunks of data to an external server either over the 3G connection or over WiFi. To ensure the exfiltration process goes undetected, the phone only uses the employee's home connection. In this way, the actual exfiltration process originates in a less secure location. IV. Preventative Measures Even though some attacks described in Section II are difficult to detect, certain preventative measures can be taken to minimize the probability of exploitation. We propose a few items that organizations should consider that have the potential to raise the bar for APTs and can help forensic investigations. Personal/work device policy: It is difficult to enforce a policy to avoid the use of personal devices. A simpler policy, though, can be enforced for cell-phone usage in work environments. For example, work devices can only be synched at workstations and, while at home, they can only be charged by plugging into the outlet. Conversely, personal phones can only be synched at home and, while at work, they can only be charged by plugging into the outlet. In this way, firewall circumvention via mobile devices would not be possible. Enable 2G ON/OFF switch: As long as GSM networks remain active, the threats described in Section \ref{sec:attacks} will be present. However, the possibility of turning off 2G on a phone would be very beneficial to overcome 2G limitations. Forcing all the traffic of an employee's work phone to be transmitted on 3G would make it impossible for an attacker to launch certain attacks. While most phones allow a user to disable 3G, such functionality is not typically available for disabling 2G. We have developed a prototype app to allow a user to manually disable GSM 2G. Enforce voic password: The enforcement of a password for employee's voice mail is a simple and effective measure that can help prevent voic hacking. Enable wireless data monitoring: Monitoring closely data traffic generated over cellular networks has the potential to reveal some of the malicious activities that a device might be involved in, such as malware download, data exfiltration or leaking of location information. Mobility data should be added to the set of environments monitored by corporations for security and forensic investigation purposes. The APT detection mechanisms should look for signs of attacks by considering broader contexts around possible targets, such as proprietary data servers, high profile employees, critical assets, etc. TABLE I ATTACKS MITIGATION MEASURES Attacks Policy 2G OFF VM-Pwd Monitor Jamming (II-A) X Location (II-B) MitM (II-C) X X GSM Sniff (II-D) X X Hijacking (II-E) X X Mobility (II-F) X X Voic (II-G) X X USB (II-H) X X Table I indicates the attacks from Section II that can be avoided or mitigated by means of each preventative measure. Note that paging messages can potentially be sniffed, therefore allowing mobile phones to be located. V. Conclusions This research has reviewed several wireless networks and mobility vulnerabilities and has evaluated the possibility of known attacks to be exploited by an APT operation. Our study shows that the attacks surveyed have the potential to initiate and maintain an APT operation by providing several information-gathering opportunities in the Reconnaissance stage, malware deployment in the Delivery/Exploitation stage, and silent export of data from within the enterprise's network in the Exfiltration stage. Additionally, we propose a set of preventative measures that enterprises can use in order to detect and address some of the vulnerabilities and attacks presented. In future work we seek to identify quantitative methods to assess the potential APT risk that the increasing use of mobile devices can bring to enterprise environments.

7 References [1] RSA. RSA Security Brief: Mobilizing Intelligent Security Operations for Advanced Persistent Threats, February [2] P. Giura and W. Wang, Using Large Scale Distributed Computing to Unveil Advanced Persistent Threats, Academy of Science and Engineering Science Journal, vol.1, no. 3, December 2012, pp [3] B. Krekel, G. Bakos, and C. Barnett, Capability of the People s Republic of China to conduct cyber warfare and computer network exploitation, The US-China Economic and Security Review Commision, Washington, DC, Research Report, [4] Damballa, The Command Structure of the Aurora Botnet, March [5] SANS Technology Institute, Assessing Outbound Traffic to Uncover Advanced Persistent Threat, May [6] K. Nohl and S. Munaut, Wideband GSM sniffing, In 27 th Chaos Communication Congress, 2010, [7] G. Horn, D. Forsberg, W. Moeller, and V. Niemi, LTE Security (John Wiley & Sons, 2010). [8] W. Xu, Y. Zhang, and T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, In ACM MOBIHOC, 2005, pp [9] C. Mune, R. Gassira, and R. Piccirillo, Highjacking mobile data connections, In BlackHat Europe, 2009, [10] P. Traynor, W. Enck, P. Mcdaniel, and T. La Porta, Exploiting open functionality in SMS-capable cellular networks, In J. Comput Secur., vol. 16. Amsterdam, The Netherlands, IOS Press, December 2008, pp [11] P. Lee, T. Bu, and T. Woo, On the detection of signaling dos attacks on 3G wireless networks, In INFOCOM 2007: 26 th IEEE International Conference on Computer Communications. IEEE, May 2007, pp [12] Grugq, Base jumping: Attacking the GSM baseband and Base Station, In BlackHat Abu Dhabi, 2011, [13] D. Spaar, A practical DoS attack to the GSM network, In DeepSec 2009, [14] Talbot, David, One Simple Trick Could Disable a City s 4G Phone Network, MIT Technology Review, November 2012, [15] 3rd Generation Partnership Project, Mobile radio interface layer 3 specification, 3GPP TS 04.08, vol. v7.21.0, [16] D. Kune, J. Koelndorfer, and N. Hopper, Localization leaks on the GSM air interface, In 18th Annual Network and Distributed System Security Symposium, ser. NDSS 12, [17] D. Bailey and N. DePetrillo, The Carmen Sandiego Project, In BlackHat USA, 2010, [18] E. Gadaix, GSM and 3G security, In BlackHat Asia, 2001, [19] U. Meyer and S. Wetzel, A man-in-the-middle attack on UMTS, In Proceedings of the 3rd ACM workshop on Wireless security, ser. WiSe 04. New York, NY, USA: ACM, 2004, pp [20] D. Perez and J. Pico, A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications, In BlackHat DC, 2011, [21] Open Mobile Aliance, WAP Architecture, [22] R. Racic, D. Ma, and H. Chen, Exploiting MMS vulnerabilities to stealthily exhaust mobile phone s battery, In Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks, [23] Boston-WCBTV, Websites show how to spoof caller id. voice mail hacking: Easier than you think?, July 2011, [24] N. Davies and A. Hill, Missing Milly Dowler s voic was hacked by News of the World, In The Guardian UK, July 2011, [25] D. V. Pham, A. Syed, and M. N. Halgamuge, Universal serial bus based software attacks and protection solutions, Digital Investigation, vol. 7, no. 3-4, pp , [26] Z. Wang and A. Stavrou, Exploiting smart-phone USB connectivity for fun and profit, In Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC 10. New York, NY, USA: ACM, 2010, pp Authors information 1 AT&T Security Research Center. New York, NY, Roger Piqueras Jover graduated from the Escola Tècnica Superior d'enginyeria de Telecomunicacions de Barcelona (ETSETB) in 2006 with the degree of Telecommunications Engineer. That same year he was awarded a Balsells Fellowship to pursue graduate studies in Electrical Engineering at the University of California in Irvine, where he graduated in 2008 with an MSc in Electrical and Computer Engineering. In 2010 he graduated with an MPhil/MSc in Electrical Engineering from Columbia University. He is a Member of Technical Staff at the AT&T Security Research Center. His research interests are in the area of mobile and wireless communications, radio resource allocation, new network architectures and security for wireless networks. Mr. Piqueras Jover is a professional member of the IEEE, Communications Society, the Association of Computing Machinery and SigComm. Paul Giura received his Ph.D. and Masters in Computer Science from the Department of Computer Science and Engineering at Polytechnic Institute of New York University in 2010 and 2007 respectively, and Bachelors in Computer Science from University of Bucharest, Romania in He is a Senior Member of Technical Staff at AT&T Security Research Center in New York City. His research interest is in the areas of network and device security, advanced persistent threat detection and mitigation, forensics, big data for security, systems and databases. Dr. Giura is a professional member of IEEE, Computer Society, an active contributor to Cloud Security Alliance mission, and serves in several technical program committees and editorial boards for leading security conferences and journals.

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Monitoring mobile communication network, how does it work? How to prevent such thing about that? Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?

More information

GSM Risks and Countermeasures

GSM Risks and Countermeasures GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked

More information

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation (U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,

More information

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd. Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

SS7 & LTE Stack Attack

SS7 & LTE Stack Attack SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network

More information

How To Protect A Wireless Lan From A Rogue Access Point

How To Protect A Wireless Lan From A Rogue Access Point : Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other

More information

Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.

Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary. Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

13 Ways Through A Firewall

13 Ways Through A Firewall Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

13 Ways Through A Firewall What you don t know will hurt you

13 Ways Through A Firewall What you don t know will hurt you Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

SHORT MESSAGE SERVICE SECURITY

SHORT MESSAGE SERVICE SECURITY SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014 1. Executive Summary Penetration Testing Report Client: xxxxxx Date: 19 th April 2014 On the 19th of April, a security assessment was carried out on the internal networks of xxxxxx, with the permission

More information

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2 Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more

More information

Industrial Communication. Securing Industrial Wireless

Industrial Communication. Securing Industrial Wireless Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Chapter 15: Computer and Network Security

Chapter 15: Computer and Network Security Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How

More information

Targeted attacks: Tools and techniques

Targeted attacks: Tools and techniques Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that

More information

Mobile network security report: Poland

Mobile network security report: Poland Mobile network security report: Poland GSM Map Project [email protected] Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim

Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Trust Digital Best Practices

Trust Digital Best Practices > ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

How To Protect Your Mobile Device From Attack

How To Protect Your Mobile Device From Attack Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

With Great Power comes Great Responsibility: Managing Privileged Users

With Great Power comes Great Responsibility: Managing Privileged Users With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence

More information

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001 001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma [email protected] CpE 6510 3/24/2016

On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma [email protected] CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003

UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols k-p.perttula@hut.fi 15.4.2003 UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly Securing Internet Facing Applications Ten years ago protecting the corporate network meant deploying traditional firewalls and intrusion detection solutions at the perimeter of the trusted network in order

More information

LTE security and protocol exploits

LTE security and protocol exploits LTE security and protocol exploits Roger Piqueras Jover Wireless Security Research Scientist Security Architecture Bloomberg LP ShmooCon January 2016 About me Wireless Security Researcher (aka Security

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

Network Attacks. Common Network Attacks and Exploits

Network Attacks. Common Network Attacks and Exploits Common and Exploits AGENDA A Few Observations Hacker Resources Attack Categories Some Common Attacks Wireless Specific Attacks Wireless Observations Because of Common Network Layers, Most of the Attacks

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

GSM security country report: USA

GSM security country report: USA GSM security country report: USA GSM Map Project [email protected] Security Research Labs, Berlin August 2013 Abstract. GSM networks differ widely in their protection capabilities against common attacks.

More information

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements Mar 3,2005 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010 S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Technical Brief. Wireless Intrusion Protection

Technical Brief. Wireless Intrusion Protection Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Enterprise A Closer Look at Wireless Intrusion Detection:

Enterprise A Closer Look at Wireless Intrusion Detection: White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become

More information

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph . Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/[email protected] TROOPERS 2011, 30 March 2011 3G/UMTS femtocells

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way

More information

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner johannes.feichtner@iaik.tugraz.at IAIK Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,

More information