UNDERSTANDING SMS: Practitioner s Basics
|
|
|
- Shana Shelton
- 9 years ago
- Views:
Transcription
1 UNDERSTANDING SMS: Practitioner s Basics Michael Harrington, CFCE, EnCE It is estimated that in 2006, 72% of all mobile phone users world wide were active users of SMS or text messaging. In European countries like Norway, SMS usage is up around 90% of the population. The United States is quickly approaching that figure. It should come as no surprise that youths are among the biggest users of SMS, with some students in Europe and Asia sending and receiving as many as 100 SMS messages a day and some even reaching into the 1000s per month. Seeing these figures, is it any wonder that it has been suggested that SMS text messaging is the most addictive digital service and is equivalent to a cigarette addiction. SMS text messaging is an industry worth over 80 Billion Dollar and has had profound social, political and criminal impact. It is an important and sometimes crucial piece of electronic evidence and therefore important for the mobile forensic practitioner to understand. This paper seeks to explain the SMS protocol and how it works across the wireless network. In addition, an example message will be encoded and decoded manually so that the practitioner can validate what his or her tool of choice is showing as the decoded message. What is SMS? The Short Messaging Service, or SMS, is a bi-directional service to send text over wireless communication systems. It consists of a message that can be up to 160 alphanumeric characters in length. Though originally a GSM service, SMS messages are now a globally accepted service. When a user sends a SMS text message, the message is delivered to a Short Message Service Centre or SMSC. The SMSC will attempt to deliver the message to the intended recipient. If the recipient is not available the SMSC then places the message in a que for later delivery. The SMSC supports both mobile originated and mobile terminated operations. The delivery of a SMS text message is called best effort, in other words, there are no guarantees that a message will actually be delivered to its intended recipiant. Delays or complete loss of a message are not uncommon, particularly when sending between networks. SMS uses can request delivery reports which provide proof that a message did reach its intended destination though reports on failed SMS messages tend not to be reliable. 1
2 SMS Technical Details As was stated previously above, when a user sends an SMS text message, it is delivered to the SMSC of the user s wireless provider. The message is sent between the SMSC and the handset using the Mobile Application Part (MAP) of the SS7 protocol. The MAP provides an application layer to the various GSM, UMTS and GPRS nodes for intercommunication and delivery of services. The SS7 or Signalling System #7 are a set of telephony protocols widely used in Public Switched Telephone Networks (PTSN). A discussion of these protocols is beyond the scope of this whitepaper but citations to other resources are provided should the reader wish to explore these protocols further. The SMS text message is limited to 140 Octets or 1120 bits in length. There are a few alphabets that can be used to encode the SMS text message. Shown below is the default GSM 7 Bit ASCII alphabet for encoding SMS Messages. Figure 1: Default GSM 7 Bit Alphabet SMS Text messages may also be encoded in the 8-bit data alphabet, and the 16-bit UCS2 alphabet Depending on the alphabet, maximum individual SMS sizes range from bit characters, bit characters, or bit characters. It is mandatory for all GSM handsets to support the GSM 7-bit alphabet. Special characters though, like those found 2
3 in languages such as Arabic, Chinese, Korean, Japanese or Russian must be encoded using the 16-bit UCS2 character encoding (Unicode). SMS messages can also be concatenated, where a single larger message is spread over one or more additional messages. In these cases the handset is responsible for putting the message into the proper order using data headers that are included with the segments. The data headers, since they are included with message segments cause the overall length of text segment to be less. An exploration of concatenated SMS messages is beyond the scope of this paper. Further technical details on the SMS protocol can be found in GSM and SMS Delivery When the SMS is delivered to the SMSC it is processed. After the processing the following steps occur After processing the SMSC sends a request to the Home Location Register (HLR) and receives the routing information The SMS Center sends the message to the Mobile Switching Center (MSC). The MSC collects the recipient's information from the Visitor Location Register (VLR) and, sometimes, proceeds with an authentication operation The MSC forwards the message to a Mobile Server. The MSC returns the outcome of the Forward Short operation to the SMS Center The SMS Center reports delivery status of the short message back to the sender. Below is a graphic taken from HowStuffWorks.com that illustrates the above. 3
4 Figure II: Graphic representation of SMS delivery SMS Components The SMS message itself is composed of several elements. Some of these elements are listed below Length of SMSC Service Center Timestamp Originator Address: the phone number of the sender Protocol Identifier Data Coding Scheme User Data Length: tells how long the message is 4
5 User Data: the message itself (140 bytes: bit characters, or bit characters) Figures III and IV taken from Dreamfabric.com show sample received and sent SMS messages F5040BC F AE8329BFD4697D9EC37 Octet(s) Description 07 Length of the SMSC information (in this case 7 octets) F5 Type-of-address of the SMSC. (91 means international format of the phone number) Service center number (in decimal semi-octets). The length of the phone number is odd (11), so a trailing F has been added to form proper octets. The phone number of this service center is " ". See below. 04 First octet of this SMS-DELIVER message. 0B C8 Address-Length. Length of the sender number (0B hex = 11 dec) Type-of-address of the sender number F1 Sender number (decimal semi-octets), with a trailing F 00 TP-PID. Protocol identifier. 00 TP-DCS Data coding scheme TP-SCTS. Time stamp (semi-octets) 0A TP-UDL. User data length, length of message. The TP-DCS field indicated 7-bit data, so the length here is the number of septets (10). If the TP-DCS field were set to indicate 8-bit data or Unicode, the length would be the number of octets (9). E8329BFD4697D9EC37 TP-UD. Message "hellohello", 8-bit octets representing 7-bit data. Figure III: Sample SMS Received message. Note: The colored cells show areas that some phones may omit. 5
6 B F80000AA0AE8329BFD4697D9EC37 Octet(s) Description Length of SMSC information. Here the length is 0, which means that the SMSC stored in the phone should be used. Note: This octet is optional. On some phones this octet should be omitted! (Using the SMSC stored in phone is thus implicit) 11 First octet of the SMS-SUBMIT message. 00 TP-Message-Reference. The "00" value here lets the phone set the message reference number itself. 0B Address-Length. Length of phone number (11) F8 Type-of-Address. (91 indicates international format of the phone number). The phone number in semi octets ( ). The length of the phone number is odd (11), therefore a trailing F has been added, as if the phone number were " F". Using the unknown format (i.e. the Type-of-Address 81 instead of 91) would yield the phone number octet sequence ( ). Note that this has the length 10 (A), which is even. 00 TP-PID. Protocol identifier 00 AA 0A TP-DCS. Data coding scheme.this message is coded according to the 7bit default alphabet. Having "04" instead of "00" here, would indicate that the TP-User-Data field of this message should be interpreted as 8bit rather than 7bit (used in e.g. smart messaging, OTA provisioning etc). TP-Validity-Period. "AA" means 4 days. Note: This octet is optional, see bits 4 and 3 of the first octet TP-User-Data-Length. Length of message. The TP-DCS field indicated 7-bit data, so the length here is the number of septets (10). If the TP-DCS field were set to 8-bit data or Unicode, the length would be the number of octets. E8329BFD4697D9EC37 TP-User-Data. These octets represent the message "hellohello". Figure IV: Sample SMS Sent Message As can be seen from the above there are many elements of the SMS message. The elements of the SMS message are actually TPDU (transport protocol data units) that encapsulate the message payload. Detailed descriptions of these TDPU elements is beyond the scope of this primer but can be explored both at dreamfabric.com and in the GSM SMS specification. 6
7 SMS and SIMs On a Subscriber Identity Module (SIM) card, SMS messages are stored in the EF_SMS elementary file beneath the DF_TELECOM dedicated file. EF_SMS is linear fixed file meaning that the each record in the sequence of records stored there has a fixed length. The length of the SMS messages stored on the SIM card are 176 bytes in length and are identified by the header of x/6f x/3c. The first byte of the SMS record is the status byte. The status byte takes the following values in binary Unused Mobile equipment terminated, read Mobile equipment terminated, not read Mobile equipment originated, sent Mobile equipment originated, not sent Two things are notable to the examiner (besides the message itself) in regard to SMS messages on SIM cards. First, when and SMS message is deleted, only its status byte is set to x/00-the record retains its data until it is overwritten by another message. The second thing of note is that there is no slack space in the records where an examiner may recover a partial message. When the previous message is overwritten by another message that does not completely take up the full space allotted, the remainder of the record is written over with x/ff. Therefore it behooves the examiner to take extreme care to prevent other messages from being sent that may potentially wipe out deleted messages. Figure V below shows an actual SMS record from a Cingular SIM card. Using what we have learned in the previous sections we will break down the SMS record. OFFSET HEX DATA ASCII F0 24 0B A !. hð$. 1c.S F C8 B0 BD 0C Dõ..@`Q. i È ½ D7 DD A0 FB 0B E7 B4 9C 3D Ý û.dg Aç = DD DA 0D 32 B3 C3 2D 50 FE 5D 07 AD 9D EF ÝdPÚ.2³Ã-Pþ]. ï B 28 CD 7E DB CB A0 FC BB 0E 0A B3 EF E1 FC 1C ;(Í~ÛË ü»..³ïáü D4 4A 83 EE D 94 7F D7 41 F ED 7E ÔJ îa7. Aô7hí~ DF 41 E E CF 83 C2 6E CD DA ßAé6h.Ï Ân2(Íf Ú E9 F9 1C 94 7F D7 41 2B D0 5C 9E 07 A5 DB A0 75 éù. A+Ð\. Û u DA 4D E6 FA 78 5D EA 70 FF FF FF ÚM. Aæúx]& êpÿÿÿ FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ A0 FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ 01 status Figure V: SMS Record from a Cingular SIM card 7
8 01 Message Status (mobile terminated and read) 07 Length of SMSC (includes Identifier) 91 Type of Address (International) F0 SMSC (Reverse Nibbled) 24 Start of the SMS-Deliver 0B Length of sender address (Decimal 11) A1 Type of sender addresss (National E.164 ISDN) F5 Sender Number (Reverse Nibbled) 00 Protocol ID (mobile to mobile) 00 Encoding Scheme ( Default 7 Bit GSM and immediate display) (Time Stamp Reverse Nibbled) 81 (SMS Message length. This is the HEX representation of the character length- in this particular instance 129 characters. See below for further explanation.) PDU Data C8B0BD0C32D7DDA0FB0B E7B49C3D0785DD6450DA0D32B3C32D50FE 5D07AD9DEF3B28CD7EDBCBA0FCBB0E0AB3EFE1FC1CD44A83EE61371D947F D741F43768ED7EDF41E936682ECF83C26E3228CD6683DAE9F91C947FD7412BD0 5C9E07A5DBA075DA4D068541E6FA785D2683EA70FFFFFFFFFFFFFFFFFFFFFFF FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF Two important concepts have been mentioned out in the above breakdown. The first is the concept of reverse nibbling. This is when the individual nibbles of a byte need to be swapped in order for the data to be decoded properly e.g. 41h becomes 14h. The second concept comes with the calculation of the length of the PDU encoded message. As was mentioned above, the length byte indicates the character length of the message. In order to decode the PDU we need to know how many bytes to carve. The first step in determining the byte length of the message involves converting the length byte from hex to decimal. 81h = 129 Then this number is divided by eight (eight bit) and the result of this division is multiplied by seven (the result is rounded up to the next whole integer). Why multiplied by seven? To account for default GSM 7 bit encoding. The method of encoding will be explored further later on in the paper. 129/8 = x 7 = or 113 8
9 This is the number of bytes containing our PDU-encoded message. It is important to note that in this example, our result is not a multiple of seven - so it must be padded to the next multiple of seven to again account for the seven bit encoding. If we do not perform this task then there is a danger that the result of decoding the selected data could be corrupted, in the last part of the message. The next multiple of 7 from 113 is 119, so we pad the remaining six bytes with FF which is the default for the GSM Standard (Nokia uses 00h). In the example below, you may notice that there are more FF bytes than the six I just mentioned. This because the record slot on the SIM must be filled (176 bytes). Confusing? Well thankfully a tool like Pandora s Box allows you to sweep the hex of an SMS message and do the calculating for you (as shown in Figure VI below) 9
10 Figure VI: PDU Length Pandora s Box (offensive language redacted at the end of the message.) 10
11 SMS Encoding As was stated at the beginning of the white paper we are going to encode and decode a SMS text message. Before we actually proceed to encode and decode the message, the reader needs to be cognizant of a couple of assumptions. The first assumption is that we will be using the standard GSM 7 Bit ASCII alphabet. The second assumption is that we will be encoding the message using PDU encoding. Now with these assumptions out of the way let us begin to encode a text message. Out text message we are going to encode is the simple eight character phrase (without the quotes) SMS Rulz. Let s place the phrase into a table and number the characters Our very first step to encoding our message into PDU format is to take the hexadecimal equivalents of the ASCII text. This is shown in the next table. Now that we have our hex values for each ASCII letter of our message we need to convert those values into their binary equivalents. Why? So we can begin the process of compressing our 8 bit message into 7 bits. This will involve some bit swapping
12 In order to start encoding our SMS message we need to take the most significant bit of each octet and discard it. The most significant bit is shown in red below With the most significant bit of each octet discarded, we have effectively completed the compression portion of this conversion process. The remaining eight septets (8 x 7 bits = 56 bits) must be converted into seven octets (7 x 8 bits = 56 bits). S M S R U l z Now to start the conversion from eight septets to seven octets we need to take the least significant bit from septet number two and place it as the most significant bit on septet number one. This is shown below in red and green. Septet one now grows by one bit and becomes our first octet. S M S R U l z x
13 But now we are faced with a two bit deficit on septet number two. In order to make this a full octet we must take the two least significant bits from septet number three and add them as the two most significant bits of septet number two. Again, this is shown in red and green below. We now have our second octet xx Now, as a result of the last process, as can be seen below septet number three is missing three bits which must be made up from the last three least significant bits of septet four xxx As you can by now no doubt guess this process of moving the appropriate least significant bits of the following septet to the most significant position of the previous septet is repeated for each of the remaining septets. We take one more bit each time, enough to make up the deficit required to complete the octet. This is shown in the following tables xxxx
14 xxxxx xxxxxx Note that we use all the remaining bits of the 8 th septet to fill the seven most significant missing bits of our seventh Octet xxxxxxx We are now left with seven octets from our eight septets! Our final step involves converting our binary numbers to their hexadecimal equivalents. D3 E AD B3 F
15 So our message SMS Rulz changed from To the PDU Encoded D3 E AD B3 F5 SMS Decoding Now that we know how to encode the message, let s take the process in reverse and decode it. This will help us validate our encoding and also illustrate the process automated tools like Pandora s Box use for the decoding process. From above we have our encoded hexadecimal string D3 E AD B3 F5 We need to take these values and get their binary equivalents in order to expand out our seven septets into eight D3 E AD B3 F Now we need to go in the reverse of our previous discussion, creating eight septets from our seven octets. To do this we take the seven most significant bits of Octet seven and place them into an eighth septet as shown in red and green below xxxxxxx But now of course we now need to create septet number seven. So we take the six most significant bits from octet six and place them as the least significant bits of septet seven xxxxxx
16 And now, of course, the five most significant bits go to the least significant bits of septet six xxxxx As you may have already surmised this process follows down the line for each remaining septet, transporting one less bit each time xxxx xxx xx We are now left with eight septets. But wait Don t we need eight octets to reconstitute our original message? Indeed! Recall that when we started out PDU encoding we removed the least significant bit from each of the eight octets (which was a zero). 16
17 To get us back to our original string we need to add that least significant bit back onto each octet (which is a zero). This results in the table below We then get the hex values and their ASCII equivalents and end up back at our original un-encoded message! Conclusion The global SMS industry is worth over 80 billion dollars in annual revenue and shows no sign of shrinking. SMS text messaging is a rapidly growing method of communication that can be used for all types of criminal activity. It behooves the examiner to understand the components of an SMS messages and how the SMS messages interact and are delivered in the wireless network. This paper examined the components of the SMS text message, how it is delivered and how text messages are encoded for delivery. It is my sincere hope that it will be of benefit to the mobile forensic community. Acknowledgements The writing of this white paper would not be possible without help. I would like to thank DC Stephen Hirst (especially with the encoding/decoding!) and DC Stephen Miller for their continued help and guidance and sharing of knowledge. Thanks also to Ian Holliland of Leicestershire Constabulary, DC Carole Walton and to Det. Brian Roach for their critical eye and suggestions. And, of course, thanks to all the fine practitioners at phone-forensics.com! 17
18 References Jurgensen, Timothy M., Scott B. Guthery, Smart Cards: The Developer s Toolkit, GSM and GSM
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Binary Representation. Number Systems. Base 10, Base 2, Base 16. Positional Notation. Conversion of Any Base to Decimal.
Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must be able to handle more than just values for real world problems
SMS based remote control system
EE 318 Electronics Design Project Report, EE Department, IIT Bombay, April 2006 SMS based remote control system Ashish Deswal ( 03007020 ) Shaleen Harlalka ( 03007015 ) Arjun Arikeri ( 03007032 ) Ashish
Binary Representation
Binary Representation The basis of all digital data is binary representation. Binary - means two 1, 0 True, False Hot, Cold On, Off We must tbe able to handle more than just values for real world problems
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.
SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing
GUIDING ROBOTS USING MOBILE PHONE
24th International Symposium on on Automation & Robotics in in Construction (ISARC 2007) Construction Automation Group, I.I.T. Madras GUIDING ROBOTS USING MOBILE PHONE Atish Kumar Patra Department of Electrical
Visa Smart Debit/Credit Certificate Authority Public Keys
CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online
A Silent SMS Denial of Service (DoS) Attack
A Silent SMS Denial of Service (DoS) Attack N.J Croft and M.S Olivier Information and Computer Security Architectures (ICSA) Research Group Department of Computer Science University of Pretoria Pretoria
Technical documentation
Technical documentation HTTP Application Programming Interface SMPP specifications Page 1 Contents 1. Introduction... 3 2. HTTP Application Programming Interface... 4 2.1 Introduction... 4 2.2 Submitting
plc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. Topics: Number bases; binary, octal, decimal, hexadecimal Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
Technical Support Bulletin Nr.18 Modbus Tips
Technical Support Bulletin Nr.18 Modbus Tips Contents! Definitions! Implemented commands! Examples of commands or frames! Calculating the logical area! Reading a signed variable! Example of commands supported
URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =.
ASCII = American National Standard Code for Information Interchange ANSI X3.4 1986 (R1997) (PDF), ANSI INCITS 4 1986 (R1997) (Printed Edition) Coded Character Set 7 Bit American National Standard Code
How to create OpenDocument URL s with SAP BusinessObjects BI 4.0
How to create OpenDocument URL s with SAP BusinessObjects BI 4.0 Creator: Twitter: Blog: Pieter Verstraeten http://www.twitter.com/pverstraeten http://www.pieterverstraeten.com/blog Hi, Thanks for downloading
SMS Fuzzing SIM Toolkit Attack
SMS Fuzzing SIM Toolkit Attack Bogdan Alecu [email protected] www.m-sec.net Abstract In this paper I will show how to make a phone send an SMS message without the user s consent and how to make the phone
2011, The McGraw-Hill Companies, Inc. Chapter 3
Chapter 3 3.1 Decimal System The radix or base of a number system determines the total number of different symbols or digits used by that system. The decimal system has a base of 10 with the digits 0 through
The ASCII Character Set
The ASCII Character Set The American Standard Code for Information Interchange or ASCII assigns values between 0 and 255 for upper and lower case letters, numeric digits, punctuation marks and other symbols.
Base Conversion written by Cathy Saxton
Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,
FTP API Specification V2.6
FTP API Specification V2.6 June 2014 Contents 1. Change history... 3 2. Overview... 3 3. Introduction... 4 4. Getting started... 5 5. Basic text file structure... 6 5.1. Authentication within the text
Error and Confirmation Codes
Error and Confirmation s The following two tables list the error and confirmation codes that can be returned within SMS replies or notifications. Table 14: Error s 8 008 10 00A 21 015 27 01B 28 01C 29
Different Ways of Connecting to. 3DLevelScanner II. A.P.M Automation Solutions LTD. www.apm-solutions.com Version 3.0
3DLevelScanner II Different Ways of Connecting to 3DLevelScanner II A.P.M Automation Solutions LTD. www.apm-solutions.com Version 3.0 2 Different Ways of Connecting to 3DLevelScanner II Version 3.0 Table
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
Counting in base 10, 2 and 16
Counting in base 10, 2 and 16 1. Binary Numbers A super-important fact: (Nearly all) Computers store all information in the form of binary numbers. Numbers, characters, images, music files --- all of these
Chapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
USSD Services for Interactive Mobile Users
Small Logo USSD Services for Interactive Mobile Users Building User-Friendly Mobile Telephony Applications Using Dialogic Distributed Signaling Interface Components Executive Summary The application note
ISDN Diagnostic Codes
ISDN Diagnostic Codes See also: Error Messages - Main Menu Cause Code (Dec) Value in trace (Dec) Cause Code (Hex) Value in trace (Hex) Meaning Category 0 - normal event 00 128 00 80 Normal Disconnect 01
Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7
Written By: Adam Berent Advanced Encryption Standard by Example V.1.7 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5
Written By: Adam Berent Advanced Encryption Standard by Example V.1.5 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
EMV (Chip-and-PIN) Protocol
EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian
EE 261 Introduction to Logic Circuits. Module #2 Number Systems
EE 261 Introduction to Logic Circuits Module #2 Number Systems Topics A. Number System Formation B. Base Conversions C. Binary Arithmetic D. Signed Numbers E. Signed Arithmetic F. Binary Codes Textbook
HTML Codes - Characters and symbols
ASCII Codes HTML Codes Conversion References Control Characters English version Versión español Click here to add this link to your favorites. HTML Codes - Characters and symbols Standard ASCII set, HTML
Index. Corporate Profile. Page 2 360Global Company Profile
Index Corporate Profile. Page 2 360Global Company Profile 1. Introduction Of SMS.. Page 2 1.1. What is SMS? 1.2 Comparison Of SMS Against Other Means Of Advertising 1.3 Where does SMS fit in? 2. Bulk SMS
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
How To Use A Powerpoint On A Microsoft Powerpoint 2.5 (Powerpoint 2) With A Microsatellite 2.2 (Powerstation 2) (Powerplant 2.3) (For Microsonde) (Micros
SIM2 Multimedia Nero 3D-1, Nero 3D-2, Nero 3D HB RS-232 Control Rev. 1.1 (17 January 2012) Contents Contents 2 1 Introduction 3 1.1 Setting up the RS-232C Serial connection........................... 3
Useful Number Systems
Useful Number Systems Decimal Base = 10 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} Binary Base = 2 Digit Set = {0, 1} Octal Base = 8 = 2 3 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7} Hexadecimal Base = 16 = 2
Keywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
This proposal is to extend the Generic Devices, Telephony, Consumer and Alphanumeric Display pages to support Dual-Mode Telephone devices.
Company: Microsoft Phone: +1-425-703-8380 FAX: +1.425.93-MSFAX email: [email protected] CurrentStatus: Review - Content-related comments resolved. Priority: Normal Submitted: 14 January 2008 Voting
The Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
GSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
Binary, Hexadecimal, Octal, and BCD Numbers
23CH_PHCalter_TMSETE_949118 23/2/2007 1:37 PM Page 1 Binary, Hexadecimal, Octal, and BCD Numbers OBJECTIVES When you have completed this chapter, you should be able to: Convert between binary and decimal
Decimal to Binary Conversion
Decimal to Binary Conversion A tool that makes the conversion of decimal values to binary values simple is the following table. The first row is created by counting right to left from one to eight, for
The string of digits 101101 in the binary number system represents the quantity
Data Representation Section 3.1 Data Types Registers contain either data or control information Control information is a bit or group of bits used to specify the sequence of command signals needed for
The New IoT Standard: Any App for Any Device Using Any Data Format. Mike Weiner Product Manager, Omega DevCloud KORE Telematics
The New IoT Standard: Any App for Any Device Using Any Data Format Mike Weiner Product Manager, Omega DevCloud KORE Telematics About KORE The world s largest M2M/IoT services provider 12 Carriers Enterprise
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
The Forensic Analysis of the Microsoft Windows Vista Recycle Bin. By Mitchell Machor [email protected]
The Forensic Analysis of the Microsoft Windows Vista Recycle Bin By Mitchell Machor [email protected] 1/22/2008 - 1 - Introduction Contrary to due belief, when a file is deleted on a Microsoft operating
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Introduction to File Carving
By Christiaan Beek Principal Security Consultant McAfee Foundstone Professional Services Table of Contents Overview 3 File Recovery Versus Carving 3 Fragmentation 5 Tooling 5 An example of using Photorec
How To Set The Sensor On A Powerpoint 3.5 (Powerpoint) On A Blackberry 2.5A (Powerplant) On An Iphone Or Ipad (Powerplant) On The Blackberry 3.2 (
VMBGPOD Touch panel with Oled display for VELBUS system 1 Binairy format: bits Description
NETWORK ADMINISTRATION
NETWORK ADMINISTRATION INTRODUCTION The PressureMAP software provides users who have access to an Ethernet network supporting TCP/IP with the ability to remotely log into the MAP System via a network connection,
APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.
APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is
Today s topics. Digital Computers. More on binary. Binary Digits (Bits)
Today s topics! Binary Numbers! Brookshear.-.! Slides from Prof. Marti Hearst of UC Berkeley SIMS! Upcoming! Networks Interactive Introduction to Graph Theory http://www.utm.edu/cgi-bin/caldwell/tutor/departments/math/graph/intro
CCNA Tutorial Series SUBNETTING
CCNA Tutorial Series This document contains the Course Map For The Interactive flash tutorial at: http://www.semsim.com/ccna/tutorial/subnetting/subnetting.html HOME PAGE Course Objectives Pre-test By
Quectel Cellular Engine
Cellular Engine GSM Multiplexer Application Notes GSM_MUX_AN_V1.00 Document Title GSM Multiplexer Application Notes Version 1.00 Date 2009-06-27 Status Document Control ID Release GSM_MUX_AN_V1.00 General
Japannext PTS ITCH Market Data Specification. Version 1.4 Updated 3 October 2014
Japannext PTS ITCH Market Data Specification Version 1.4 Updated 3 October 2014 Table of Contents 1. Introduction... 3 2. Overview... 3 3. Data Types... 3 4. Outbound Sequenced Messages... 3 4.1 Seconds...
Mifare DESFire Specification
Mifare DESFire Specification Version 1.0 29 th September 2009 Revision History Version Date Author Description of Changes 1.0 29/09/09 O McLaughlin Ratified by LASSeO 0.2 28/07/09 O McLaughlin Minor changes
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Systems I: Computer Organization and Architecture
Systems I: Computer Organization and Architecture Lecture 2: Number Systems and Arithmetic Number Systems - Base The number system that we use is base : 734 = + 7 + 3 + 4 = x + 7x + 3x + 4x = x 3 + 7x
Setting Up Message Notifications in Cisco Unity 8.x
CHAPTER 23 Setting Up Message Notifications in Cisco Unity 8.x See the following sections in this chapter: Overview of Message Notifications in Cisco Unity 8.x, page 23-1 Setting Up Text Message Notifications
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
Section 1.4 Place Value Systems of Numeration in Other Bases
Section.4 Place Value Systems of Numeration in Other Bases Other Bases The Hindu-Arabic system that is used in most of the world today is a positional value system with a base of ten. The simplest reason
Third Southern African Regional ACM Collegiate Programming Competition. Sponsored by IBM. Problem Set
Problem Set Problem 1 Red Balloon Stockbroker Grapevine Stockbrokers are known to overreact to rumours. You have been contracted to develop a method of spreading disinformation amongst the stockbrokers
SQL Injection Optimization and Obfuscation Techniques
SQL Injection Optimization and Obfuscation Techniques By Roberto Salgado Introduction SQL Injections are without question one of the most dangerous web vulnerabilities around. With all of our information
IP Addressing. IP Addresses. Introductory material.
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc [email protected] Released under the LGPL version 3 February 6, 2010 Abstract: This
MBP_MSTR: Modbus Plus Master 12
Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page
Number Representation
Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Configuring connection settings Nokia E50 Configuring connection settings Legal Notice Copyright
Memory is implemented as an array of electronic switches
Memory Structure Memory is implemented as an array of electronic switches Each switch can be in one of two states 0 or 1, on or off, true or false, purple or gold, sitting or standing BInary digits (bits)
The Application of Text Compression to Short Message Service Using Huffman Table
Vol.6 No.1 (Januari 2011) JURNAL GENERIC 19 The Application of Text Compression to Short Message Service Using Huffman Table Ahmad Affandi, 1 Saparudin, 2 and Erwin 3 Abstract Short Message Service (SMS)
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
One of the most important topics in any discussion of TCP/IP is IP. IP Addressing
IP Addressing 125 machine, called a RARP server, responds with the answer, and the identity crisis is over. RARP uses the information it does know about the machine s MAC address to learn its IP address
Solution for Homework 2
Solution for Homework 2 Problem 1 a. What is the minimum number of bits that are required to uniquely represent the characters of English alphabet? (Consider upper case characters alone) The number of
Appendix B RCS11 Remote Communications
Appendix B RCS11 Remote Communications B.1 Host Computer Remote Communications Control and status messages are conveyed between the RCS11 and the host computer using packetized message blocks in accordance
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
Levent EREN [email protected] A-306 Office Phone:488-9882 INTRODUCTION TO DIGITAL LOGIC
Levent EREN [email protected] A-306 Office Phone:488-9882 1 Number Systems Representation Positive radix, positional number systems A number with radix r is represented by a string of digits: A n
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
We Are HERE! Subne\ng
TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design
HP Service Virtualization
HP Service Virtualization Fixed Length Protocol Virtualization SV Training September 2014 Fixed Length Protocol Virtualization Technology Description Use Cases Supported Message Structures SV Service Description
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Computer Science 281 Binary and Hexadecimal Review
Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two
A Link Layer Discovery Protocol Fuzzer
The University of Texas at Austin, Department of Computer Sciences, Technical Report TR-07-24 A Link Layer Discovery Protocol Fuzzer Jeremy Hollander Department of Computer Sciences The University of Texas
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)
Tik-110.350 Computer Networks (3 cr) Spring 2000 Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP) Professor Arto Karila Helsinki University of Technology E-mail: [email protected]
Diafaan SMS Server 3.0 Manual. 2009-2015 Diafaan communication software
Diafaan SMS Server 3.0 Manual 2 Diafaan SMS Server 3.0 Manual Table of Contents Part I Welcome to Diafaan SMS Server 5 Part II Getting started 7 1 Gateways... and connectors 10 2 Add a... gateway 12 Add
Lecture 11: Number Systems
Lecture 11: Number Systems Numeric Data Fixed point Integers (12, 345, 20567 etc) Real fractions (23.45, 23., 0.145 etc.) Floating point such as 23. 45 e 12 Basically an exponent representation Any number
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
100BASE-TX Decoding Instructions
100BASE-TX Decoding Instructions Note: These instructions assume the following: You have downloaded the descrambler key binary sequence file. You have printed the 100BASE-TX simulated frame (PDF document)
NVT (Network Virtual Terminal) description
NVT (Network Virtual Terminal) description English version Czech version Communication with the TCP/IP device over the Ethernet network can be extended to more functions using NVT (Network Virtual Terminal)
Lecture 2. Binary and Hexadecimal Numbers
Lecture 2 Binary and Hexadecimal Numbers Purpose: Review binary and hexadecimal number representations Convert directly from one base to another base Review addition and subtraction in binary representations
