Injecting SMS Messages into Smart Phones for Security Analysis
|
|
|
- Sheila Ross
- 9 years ago
- Views:
Transcription
1 Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner Deutsche Telekom Laboratories/ TU-Berlin Charlie Miller Independent Security Evaluators Abstract The Short Message Service (SMS) is one of the building blocks of the mobile phone service. It is used for text messaging by users as well as for services that work under the hood of every mobile phone. The security of SMS-implementations is critical because attacks can be carried out remotely without any user interaction and because SMS can not be disabled or filtered on current mobile phones. This paper presents a novel method for vulnerability analysis of SMS-implementations. The presented approach is independent from any service operator, does not produce costs, and guarantees reproducible results. Our approach was able to identify previously unknown security flaws that can be used for Denial-of-Service attacks against current smart phones. Keywords: SMS, Smart Phones, Vulnerability Analysis, Fuzzing. 1. Introduction The Short Message Service (SMS) is the most popular secondary service on mobile phones beloved by both the users and the service providers for it s ease of use and for the generated revenue, respectively. Besides the use for simple text messaging, the Short Message Service has manyapplicationsonamobilephone.itisusedasacontrol channel for services like voice mail where it is used to notify the user about new messages. Another SMSbased service is remote over-the-air(ota) phone configuration.sms furtheris used as a transport for the Wireless Application Protocol(WAP). The Short Message Service in all its functionality is complex and therefore security issues based on implementations faults are common. In the past years SMSbased security issues for almost every mobile phone platform were known. Furthermore, no possibility exists to firewall or filter SMS messages, therefore, SMS-based attacks are hard to prevent especially since user interaction is not required. Therefore, it is necessary to develop techniques and tools to analyze and improve the security of SMS-implementations and SMS-based applications. In this paper we present a novel approach to the vulnerability analysis of SMS-implementations on smart phones. To the best of our knowledge, no attempt has been made before to analyze and test Short Message Service implementations and SMS-based applications in a methodical way. We believe that the main reason for this situation is that SMS testing would be very cost intensive since SMS messages would have to be sent to the tested phones in large quantities. The analysis of SMS-implementations on smart phones is difficult for several reasons besides the cost factor. The reasons all tail from the fact that SMS messages are delivered through infrastructure controlled by an operator and thus is outside the control of the researchers who are conducting the vulnerability analysis. One problem is the uncertainty of whether a messageisdeliveredtothetargetinitsoriginalform.thisis because mobile phone operators have the ability to filter and modify short messages during delivery. Also, it is possible that the operator might not filter messages on purpose but might use equipment that can not handle certain messages. Second, SMS is an unreliable service, meaning messages can be delayed or discarded for no deterministic reason. This makes the testing very time-consuming and hard to reproduce. We addressed these problems by removing the need for a mobile phone network all together through injecting short messages locally into the smart phone. Injection is done in software only and requires only applicationlevelaccesstothesmartphone.theinjectionistaking place below the mobile telephony software stack and therefore we are able to analyze and test all SMS-based services that are implemented in the mobile telephony software stack.
2 The vulnerability analysis itself was conducted using fuzzing. In this work, we present the possibilities for fuzzing-based testing of SMS-implementations. Further, we present our testing methodology and the tools we have developed in the process. To show that our approach is generic we implemented and tested our analysis framework for three different smart phone platforms. So far we have found several flaws in the tested SMS-implementations, some of which can be exploited for Denial-of-Service attacks. One particular vulnerability allows us to disconnect a device from the mobile phone network through crashing the telephony application, leaving the phone in state where it cannot receive calls. Contributions of this paper are the following: We introduce a novel method to test SMSimplementations that circumvents filters and any otherrestrictionsthatmightbeputinplacebyamobile phone service operator. It further prevents the provider from easily detecting that testing is taking place. Furthermore, it allows analysis of services and applications built on top of SMS such as WAP. We developed a testing framework that allows one to perform SMS vulnerability analysis at high speeds and without costs. We developed a tool that performs security testing of SMS-implementations through fuzzing. The tool found a number of previously unknown vulnerabilities. The rest of this paper is structured as follows: Section 2 presents related work. Section 3 describes the Short Message Service and how messages are transferred between devices. Section 4 describes in great detail how SMS messages are received and handled on a smart phone. Section 5 describes our SMS injection framework. In Section 6 we present our fuzzing tools, the methodology, the results of our fuzzing approach, and thepossibleattacksbasedontheresults.insection7we briefly conclude. 2. Related Work Previousresearch in the area of SMS security can be divided into two areas. The first area consists of research that investigated protocols that facilitate SMS as a transport such as WAP and MMS. Here the creators of the PROTOS [8] testing suite implemented test cases for WAP implementations. In [6] the authors build a framework for analyzing the security of MMS client implementations. The second area of research conducted in[10] focused around the possibility of mobile phone service disruption based on the ability to send excessive amounts of short messages from the Internet to individuals and groups of people in a certain area. In the past, SMS bugs [3, 7, 5] were found by accident rather than through thorough testing. One notable example of this kind of bug discovered is the Curse of Silence [9] bug which existed in most of Nokia s Symbian S60-based smart phones. The bug consisted of a single malformed SMS message that, upon reception, prevented further SMS messages from being displayed to the user. The work presented in this paper provides a method for conducting thorough security analysis of SMS-implementations without the burden of services fees. 3. The Short Message Service The Short Message Service is a store and forward system, messages sent to and from a mobile phone are first sent to an intermediate component in the mobile phone operators network. This component is called the Short Message Service Center(SMSC). After receiving a message, the SMSC forwards the message to another SMSC or if the receiving phone is handled by the same SMSC, it delivers the message to the recipient without invoking another party The SMS Message Format SMS messages exist in two formats [2]. The SMS SUBMIT format is used for messages sent from a mobile phone to the SMSC. The SMS DELIVER format is used for messages sent from the SMSC to the mobile phone. Since our testing method is based on local message injection that replicates an incoming message, we are only interested in the SMS DELIVER format. An SMS DELIVER message consists of the fields shown in Figure 1. The format is simplified since our main fuzzing targets are the Protocol ID, the Data Coding Scheme, and the User Data fields. Other fields such as the User Data Length and the DELIVER flags will be set to corresponding values in order to create valid SMS DELIVER messages The User Data Header The User Data Header (UDH) provides the means to add control information to an SMS message in addition to the actual message payloadortext.theexistenceofauserdataheaderisindicated through the User Data Header Indication (UDHI) flag in the DELIVER field of an SMS DELIVER message. If the flag is set, the header is present in the User 2
3 Name Bytes Purpose SMSC variable SMSC address DELIVER 1 Message flags Sender variable Sender address PID 1 Protocol ID DCS 1 Data Coding Scheme SCTS 7 Time Stamp UDL 1 User Data Length UD variable User Data Figure 1. SMS DELIVER Message Format +CMT:, F84404D Figure 3. Unsolicited AT result code that indicates the reception of an SMS message. of the mobile phone network interface, from network registration, call control and SMS delivery to packetbased data connectivity The Telephony Stack Field Bytes Information Element(IEI) 1 Information Element Data Length(IEDL) 1 Information Element Data (IED) variable Figure 2. The User Data Header (UDH). Data of the message. The User Data Header consists of the User Data Header Length (UDHL), followed by one or multiple headers. The format for a single User Data HeaderisshowninFigure2. 4. Mobile Phone Side SMS Delivery Most current smart phones are composed of two processors. The main CPU, called the application processor, is the processor that executes the smart phone operating system and the user applications such as the mobile telephony and the PIM applications. The second CPU runs a specialized real time operating system that controls the mobile phone interface and is called the modem. The modem handles all communication with the mobile phone network and provides a control interface to the application processor. Logically the application processor and the modem communicate through one or multiple serial lines. The mobile telephony software stack running on the application processor and communicates with the modem through a text-command-based interface using a serial line interface provided by the operating system running on the application processor. The physical connection between the application processor and the modem solely depends on the busses and interfaces offered by both sides but is irrelevant for our method. Themodemsofourtestdevices(theiPhone,theHTC G1 Android, and the HTC-Touch 3G Windows Mobile) are controlled through the GSM AT command set [4]. TheGSMATcommandsareusedtocontroleveryaspect The telephony stack is the software component that handles all aspects of the communication between the application processor and the modem. The lowest layer in a telephony stack usually is a multiplexing layer to allow multiple applications to access the modem at the same time. The multiplexing layer also is the instance that translates API-calls to AT commands and AT result codes to status messages. The applications to allow the user to place and answer phone calls and to read and write short messages exist on top of the multiplexing layer SMS Delivery Short messages are delivered through unsolicited AT commandresultcodesissuedbythemodemtotheapplication processor. The result code consists of two lines of ASCIItext.Thefirstlinecontainstheresultcodeandthe numberofbytesthatfollowonthesecondline.thenumberofbytesisgivenasthenumberofoctetsafterthehexadecimal to binary conversion. The second line contains the entire SMS message in hexadecimal representation. Figure3showsanexampleofanincomingSMSmessage using thecmt result code which is used for SMS deliveryonallofourtestdevices.uponreceptionofthemessage the application processor usually has to acknowledge the reception by issuing a specific AT commandto the modem. All interaction to the point of acknowledgingthereceptionofthecmtresultishandledbythemultiplexing layer of the telephony stack TheStacksof our Test Devices We will shortly describe the parts of the telephony stack that are relevant for SMS handling on each of our test platforms iphone OS On the iphone, the telephony stack mainly consists of one application binary called Comm- Center. CommCenter communicates directly with the 3
4 modem using a number of serial lines of which two are used for AT commandsrelated to SMS transfers. It handles incoming SMS messages by itself without invoking any other process, besides when the device notifies the user about a newly arrived message after storing it in the SMS database. The user SMS application is only used for reading SMS messages stored in the database and for composing new messages and does not itself directly communicate with the modem Android On the Android platform the telephony stack consists of the radio interface layer(ril) that takes the role of the multiplexing layer described above. The RIL is a single daemon running on the device and communicates with the modem through a single serial line. On top of the RIL daemon, the Android phone application (com.android.phone) handles the communication with the mobile phone network. The phone application receives incoming SMS messages and forwards them to the SMS and MMS application(com.android.mms) Windows Mobile In Windows Mobile, the telephony stack is quite a bit larger and more distributed compared with the iphone and the Android telephony stacks. The parts relevant to SMS are: the SmsRouter library (Sms Providers.dll) and the tmail.exe binary. The tmail.exe binary is the SMS and MMS application that provides a user interface for reading and composing SMS messages. Other components such as the WAP PushRouter sit on top of the SmsRouter. 5. SMS Injection Based on the results of our analysis on how SMS messages are delivered to the application layer, we designed our SMS injection framework. Our method for SMS injection is based on adding a layer between the serial lines and the multiplexer (the lowest layer of the telephony stack). We call this new layer the injector. The purpose of the injector is to perform a man-in-the-middle attack on the communication between the modem and the telephony stack. The basic functionality of the injector is to read commands fromthemultiplexerandforwardthemtothemodemand in return read back the results from the modem and forward them to the multiplexer. To inject an SMS message into the application layer, the injector generates a new CMT result and sends it to themultiplexerjustasitwouldforwardarealsmsmessage from the modem. It further handles the acknowledgement commands sent by the multiplexer. Figure 4 shows the logical model of our injection framework. We implemented our injection framework for our three test platforms. We believe that our approach for message injection can be easily ported to other smart Figure 4. Logical model of our injector framework. phone platforms if these allow application level access to the serial lines of the modem or the ability to replace or add an additional driver that provides the serial line interface. We noticed several positive side effects of our framework, some of which can be used to furtherimprovethe analysis process. First of all, we can monitor and log all SMS messages being sent and received. This ability can be used to analyze proprietary protocols based on SMS, such as the iphone s visual voice mail. The ability to monitor all AT commands and responses between the telephony stack and the modem provides an additional source of feedback while conducting various tests. On the iphone, for example, messages are not acknowledged in a proper way if these contain unsupported features The Injection Framework Below we will briefly describe the implementation issues of the injection framework for each of our target platforms. Every implementation of the framework opens TCP port 4223 on all network interfaces in order to receive the SMS messages that should be injected. This network based approach gives us a high degree of flexibility for implementing our testing tools independent from the tested platform. So far we are able to install our injection framework onallthetesttargetsandcontinuetousethemasiftheinjection framework was not installed, therefore giving us high degree of confidence in our approach iphone On the iphone, SMS messages are handled by the CommCenter process. The interface for CommCenter consists of sixteen virtual serial lines, /dev/dlci.h5-baseband.[0-15] and /dev/ dlci.spi-baseband.[0-15] on the 2G and the 3G iphone, respectively. 4
5 The implementation of our injection framework for the iphone OS is separated into two parts, a library and a daemon. The library is injected into the CommCenter process through library pre-loading. The library intercepts the open(2) function from the standard C library. Our version of open checks for access to the two serial lines used for AT commands. If the respective files are opened the library replaces the file descriptor with one connected to our daemon. The corresponding device files are the serial lines3and 4 on the 2G and 3G iphones. The library s only function is to redirect the serial lines to the daemon. The daemon implements the actual message injection and log functionality Android The implementation for the Android platform consists of just a single daemon. The daemon talks directly to the serial line device connected to the modem and emulates a new serial device through creation of a virtual terminal. The injection framework is installed in three steps. First, the actual serial line device is renamed from /dev/smd0 to /dev/smd0real. Second, the daemon is started, opens /dev/smd0real and creates the emulated serial device by creating a TTY named /dev/smd0. In the third step, the RIL process (/system/bin/rild), is restarted by sending it the TERM signal. Upon restart, rild opens the emulated serial line and from there on will talk to our daemon instead of the modem Windows Mobile The Windows Mobile version of our injection framework is based on the simple logdriver [11] written by Willem Hengeveld. The original log-driver was designed for logging all AT communication between the user space process and the modem. We added the injection and state tracking functionality. To do this, we had to modify the driver quite a bit in order to have it listen on the TCP port to connect our test tools. The driver replaces the original serial driver and provides the same interface the original driver had and loads the original driver in order to communicate with the modem. The driver is installed through modifying several keys of the Windows Mobile registry at: /HKEY LOCAL MACHINE/Drivers/BuiltIn/ SMD0.ThemostimportantchangeisthenameoftheDynamic Link Library(DLL) that provides the driver for the interface, whose key is named Dll. Its original value is smd com.dll. 6. Fuzzing SMS Implementations Fuzzing is one of the easiest and most efficient ways to find implementation vulnerabilities. With this framework, we are able to quickly inject fuzzed SMS messages IED Byte Index Purpose 0 ID(same for all chunks) 1 Number of Chunks 2 Chunk Index Figure 5. The UDH for SMS Concatenation. into the telephony stack by sending them over the listening TCP port. In general, there are three basic steps in fuzzing. The first is test generation. The second is delivering the test cases to the application, and the final step is application monitoring. All of these steps are important to find vulnerabilities with fuzzing Fuzzing Test Cases We took a couple of approaches to generating the fuzzedsmsmessages.onewastowriteourownpython library which generated the test cases while the other was to use the Sulley [1] fuzzing framework. In either case, themostimportantpartwastoexpressalargenumberof different types of SMS messages. Below are some examplesofthetypesofmessagesthat wefuzzed. Basic SMS Messages As from Figure 1, we fuzzed various fields in a standard SMS message including elements such as the sender address, the user data (or message), and the various flags. Basic UDH Messages As seen in Figure 2, we fuzzed variousfieldsintheudhheader.thisincludedtheudh information element and UDH data. Concatenated SMS Messages Concatenation provides the means to compose SMS messages that exceed the 140 byte (160 7-bit character) limitation. Concatenation is achieved through the User Data Header type 0 as specified in [2]. The concatenation header consist of five bytes, the type (IEI), the length (IEDL), and three bytes of header data (IED) as seen in Figure5.Byfuzzingthesefieldsweforcemessagestoarrive out of order or not at all, as well as sending large payloads. UDH Port Scanning SMS applications can register to receivedataonudhports,analogoustothewaytcp and UDP applications can do so. Without reverse engineering,it is impossible to know exactlywhat portsaparticular mobile OS will have applications listening on. We send large amounts of (unformatted) data to each port. The structure of the UDH destined for particular applications of designated ports is indicated in Figure 6. Visual voice mail (iphone only) When a visual voice mail arrives, an SMS message arrives on port 5499 that 5
6 IED Byte Index Purpose 0-1 Destination Port(16bit) 2-3 SourcePort(16bit) The Windows Mobile development kit on the other hand provides the tools for on-device debugging. This means Windows Mobile allows traditional fuzzing by attaching a debugger to the process being fuzzed. Figure 6. The UDH for SMS Port Addressing. contains a URL in which the device can receive the actual voice mail audio file. This URL is only accessible on the interface that connects to the AT&T network, and will not connect to a generic URL on the Internet. The URLisclearlytoawebapplicationthathasvariablesencodedintheURL. We fuzztheformatofthisurl Delivery Once the test cases are generated,theyneedto bedelivered to the appropriate application. In this case, due to the way we havedesignedthe testing framework,it is possibletosimplysendthemtoalisteningtcpport.all ofthisworkisdesignedtomakeiteasytodeliverthetest cases Monitoring Itdoesnogoodtogenerateandsendfuzzedtestcases ifyoudonotknowwhenaproblemoccurs.devicemonitoring is just as important as the other steps. Unfortunately, monitoring is device dependent. There are two important things to monitor. We need to know if a test case causes a crash. We also need to know if a test case causes a degradation of service, i.e. if the process does not crash but otherwise stops functioning properly. On the iphone OS, the crash of a process causes a crash dump file to be written to the file system compliments of Crash Reporter. This crash dump can be retrieved and analyzed to determine the kind and position of the crash. In between each fuzzed test case, a known validtest case is sent. The SMS database can be queried to ensure that this test case was received and recorded. If not, an errorcan be reported.in this fashion,it is possible to detect errors that do not necessarily result in a crash. The Android development kit takes a different approach by suppling a tool called the Android Debug Bridge (ADB), this tool allows us to monitor the system log of the Android platform. If an application crashes on Android the system log will contain the required information about the crash. If a Java/Dalvik process crashes, it will contain information including the back trace of the application Fuzzing Results Our iphone OS target was running software version 2.2. One of the flaws we discovered here is a null pointer dereference in the handling code of Flash-SMS messages. The flaw causes Spring- Board (the iphone OS window manager) to crash forcing the user to slide to unlock his iphone. For Android, the targets were the development firmware versions 1.0, 1.1 and 1.5. Here we found several flaws that cause an array index out of bounds exception. Multiple of the flaws cause com.android.phone to crash and thereby disconnect the phone from the mobile phone network. The fuzzing of our Windows Mobile device is still work in progress. In order to determine if a specific flaw can be exploited the particular SMS message needs to be sent over the mobile phone network. If the message is delivered to the target,and was not modifiedin the process, it can be utilized for an attack. 7. Conclusions We presented a novel method for performing vulnerability analysis of SMS-implementation on smart phones. Our method removes the cost factor and thus enables large scale fuzz-based testing. In addition, it removes the intermediate infrastructure that otherwise would make obtaining conclusive results difficult. Removing the infrastructure further creates the possibility to discover flaws that could not haven been discovered through testing using a service providers infrastructure. Through the useofourtestingtools,weidentifiedanumberofvulnerabilities that can be abused for critical Denial-of-Services attacks. Future work will focus on porting our framework to other mobile phone platforms for testing and analyzing more SMS-implementations. We further believe that our injection framework can be used beyond the focus of fuzz-based testing, since it provides an unfiltered and cost free path for delivering SMS messages to a smart phone. Acknowledgments The authors would like to thank Willem Hengeveld for his kind help with his Windows Mobile log-driver. 6
7 References [1] Sulley - Pure Python fully automated and unattended fuzzing framework. p/sulley/. [2] 3rd Generation Partnership Project. 3GPP TS Technical realization of the Short Message Service (SMS). html-info/23040.htm, September [3] B. Jurry XFocus Team. Siemens Mobile SMS Exceptional Character Vulnerability. xfocus.org/advisories/200201/2.html, January [4] European Telecommunications Standards Institute (ETSI). GSM (ETS ): Digital cellular telecommunication system (Phase 2); AT Command set for GSM Mobile Equipment (ME) [5] J. de Haas. Mobile Security: SMS and a little WAP. hal2001-itsx.ppt, August [6] C. Mulliner and G. Vigna. Vulnerability Analysis of MMS User Agents. In Proceedings of the Annual Computer Security Applications Conference(ACSAC), Miami, FL, December [7] O. Inc. Nokia Phones Vulnerable to DoS Attacks. article/03/02/26/hnnokiados_1.html, February [8] Oulu University Secure Programming Group. PRO- TOS Security Testing of Protocol Implementations. protos/, [9] T. Engel. Remote SMS/MMS Denial of Service - Curse Of Silence. tobias/ cursesms.txt, December [10] W. Enck, P. Traynor, P. McDaniel and T. La Porta. Exploiting Open Functionality in SMS-Capable Cellular Networks. In Conference on Computer and Communications Security, [11] W. J. Hengeveld. Windows Mobile AT-command log-driver. itsme/ cvs-xdadevtools/itsutils/leds/logdev. cpp. 7
Fuzzing the Phone in your Phone (Black Hat USA 2009)
Fuzzing the Phone in your Phone (Black Hat USA 2009) Collin Mulliner TU-Berlin / T-Labs [email protected] Charlie Miller Independent Security Evaluators [email protected] June
Attacking SMS. BlackHat USA 2009. RingZero https://luis.ringzero.net
Attacking SMS BlackHat USA 2009 Zane Lackey ([email protected]) Luis Miras ([email protected]) Agenda SMS Background Overview SMS in mobile security Testing Challenges Attack Environment Attacks Implementation
@msecnet / www.m-sec.net. Bogdan ALECU
Business logic flaws in mobile operators services Bogdan Alecu About me Independent security researcher Sysadmin Passionate about security, specially when it s related to mobile devices; started with NetMonitor
Advanced Attacks Against PocketPC Phones
Advanced Attacks Against PocketPC Phones Collin Mulliner collin(at)trifinite.org the trifinite group 23rd Chaos Communication Congress December 2006 Advanced Attacks Against PocketPC Phones 0wnd by an
SMS Fuzzing SIM Toolkit Attack
SMS Fuzzing SIM Toolkit Attack Bogdan Alecu [email protected] www.m-sec.net Abstract In this paper I will show how to make a phone send an SMS message without the user s consent and how to make the phone
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones Collin Mulliner Fraunhofer SIT (Darmstadt, Germany) 1st International Workshop on Sensor Security March 2009 Fukuoka, Japan 1 Near Field
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.
: Real-time Inter-network Defense Against Denial of Service Attacks Kathleen M. Moriarty 22 October 2002 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations,
A Silent SMS Denial of Service (DoS) Attack
A Silent SMS Denial of Service (DoS) Attack N.J Croft and M.S Olivier Information and Computer Security Architectures (ICSA) Research Group Department of Computer Science University of Pretoria Pretoria
Custom Penetration Testing
Custom Penetration Testing Compromising a Vulnerability through Discovery and Custom Exploitation Stephen Sims Advanced Penetration Testing - 2009 SANS 1 Objectives Penetration Testing Precompiled Tools
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Diafaan SMS Server 3.0 Manual. 2009-2015 Diafaan communication software
Diafaan SMS Server 3.0 Manual 2 Diafaan SMS Server 3.0 Manual Table of Contents Part I Welcome to Diafaan SMS Server 5 Part II Getting started 7 1 Gateways... and connectors 10 2 Add a... gateway 12 Add
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
VegaStream Information Note Considerations for a VoIP installation
VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document
CSCI 7000-001 Firewalls and Packet Filtering
CSCI 7000-001 Firewalls and Packet Filtering November 1, 2001 Firewalls are the wrong approach. They don t solve the general problem, and they make it very difficult or impossible to do many things. On
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Introducing the Adafruit Bluefruit LE Sniffer
Introducing the Adafruit Bluefruit LE Sniffer Created by Kevin Townsend Last updated on 2015-06-25 08:40:07 AM EDT Guide Contents Guide Contents Introduction FTDI Driver Requirements Using the Sniffer
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
1 Introduction. Agenda Item: 7.23. Work Item:
3GPP TSG SA WG3 Security S3#34 S3-040682 6-9 Jul 2004 updated S3-040632 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040583 based on the comments in SA3#34 meeting Source:
mobile unified communications client and docking station
FREQUENTLY ASKED QUESTIONS mobile unified communications client and docking station What are the target customer characteristics of a Mobile UC subscriber? + Verizon Wireless as mobile carrier. Mobile
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations
Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations 19 March 2015 Key Points Continuous development of Bluetooth technology is rapidly increasing the use of Bluetoothenabled
Evaluation of Security for a H.323-based VoIP Emulated Architecture
Evaluation of Security for a H.323-based VoIP Emulated Architecture Eng. MARIUS HERCULEA, Professor VIRGIL DOBROTA Ph.D. Abstract Evaluation tests were conducted on H.323 Cisco Gatekeeper, Gateways and
Voice Call Addon for Ozeki NG SMS Gateway
Voice Call Addon for Ozeki NG SMS Gateway Document version v.1.0.0.0 Copyright 2000-2011 Ozeki Informatics Ltd. All rights reserved 1 Table of Contents Voice Call Addon for Ozeki NG SMS Gateway Introduction
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
ARIB STD-T63-27.103 V3.1.0. Wide area network synchronisation standard
ARIB STD-T63-27.103 V3.1.0 Wide area network synchronisation standard Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T63 for Related Industrial Property Rights. Refer to "Notice"
GSM. Quectel Cellular Engine. GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1
GSM Cellular Engine GSM TCPIP Application Notes GSM_TCPIP_AN_V1.1 Document Title GSM TCPIP Application Notes Version 1.1 Date 2011-09-22 Status Document Control ID Release GSM_TCPIP_AN_V1.1 General Notes
Smart Queue Management System Using GSM Technology
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 941-950 Research India Publications http://www.ripublication.com/aeee.htm Smart Queue Management System Using
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Tools and Techniques to automate the discovery of Zero Day Vulnerabilities. A.K.A Fuzzing 101
Tools and Techniques to automate the discovery of Zero Day Vulnerabilities A.K.A Fuzzing 101 Agenda GEEKZONE Overview of fuzzing techniques Tutorials on specific open-source fuzzers Demonstrations DIY
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).
Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
Removing The Linux Routing Cache
Removing The Red Hat Inc. Columbia University, New York, 2012 Removing The 1 Linux Maintainership 2 3 4 5 Removing The My Background Started working on the kernel 18+ years ago. First project: helping
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
OS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Washington System Center Mary Sweat E - Mail: [email protected] Agenda Basic Firewall strategies and design Hardware requirements Software requirements Components of
Windows Administration Terminal Services, AD and the Windows Registry. INLS 576 Spring 2011 Tuesday, February 24, 2011
Windows Administration Terminal Services, AD and the Windows Registry INLS 576 Spring 2011 Tuesday, February 24, 2011 Terminal Services Uses RDP (Remote Desktop Protocol), relies on TCP/IP, and falls under
http://www.mobilesenegal.com
A d i Day Academic D on M Mobile bil Solutions S l ti for f Sénégal g 2010 http://www.mobilesenegal.com Dr. Christelle Scharff [email protected] Pace University Jean-Marie Preira [email protected] ESMT James
How-to: DNS Enumeration
25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
Access Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
As shown, the emulator instance connected to adb on port 5555 is the same as the instance whose console listens on port 5554.
Tools > Android Debug Bridge Android Debug Bridge (adb) is a versatile tool lets you manage the state of an emulator instance or Android-powered device. It is a client-server program that includes three
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
From Network Security To Content Filtering
Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim
Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
IP Office 8.1 Using Voicemail Pro in Intuity Mode
Using Voicemail Pro in Intuity Mode 15-601066 Issue 13a - (12 June 2012) 2012 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
Understanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
Comparison of e-voting schemes: Estonian and Norwegian solutions
Comparison of e-voting schemes: Estonian and Norwegian solutions M J Morshed Chowdhury [email protected] NordSecMob, University of Tartu Abstract. In October 2005, Estonia organized countrywide remote e- voting.
