Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek
|
|
|
- Dwain Foster
- 9 years ago
- Views:
Transcription
1 Mobile Security Practical attacks using cheap equipment Presented the 07/06/2016 Business France By Sébastien Dudek For
2 Content Security measures Recent publications in the hacking community Practical attacks Results of our short researches
3 GSM and GPRS: confidentiality GPRS authentication algorithm A3/A8 Communication ciphered with A5/1 algorithm with a Kc key (derived from Ki) Kc is generated with the A8 Algorithm The Ki key is stored in the AuC (Authentication Center) and SIM (Subscriber Identity Module)
4 GSM and GPRS: architecture BTS: Base Transceiver Station BSC: Base Station Controller MSC: Mobile Switch Center VLR: Visitor Location Register HLR: Home Location Register AuC: Authentication Center
5 GSM and GPRS: Handover Source: article.sapub.org A stronger signal will likely attract User Equipments Useful for attackers
6 GSM and GPRS: few differences GPRS authentication SGSN Ciphering in GSM is done at Layer 1 on the TCH (Traffic Channel) and DCCH (Dedicated Control CHannel) Ciphering in GPRS is done at Layer 2 LLC (Logical Link Control) with GEA1 algorithm
7 GSM and GPRS: possible attacks No mutual authentication Fake rogue BTS Reuse of Authentication triplet RAND, RES, Kc many times Signaling channel not encrypted open for attacks Attacks on the A5/1 algorithm... Interception is possible on GSM and GPRS
8 3G/4G: advantages 3G came with the KASUMI encryption algorithm Then SNOW-3G second encryption algorithm for 3G, also used for 4G (in case KASUMI is broken) Additionally to SNOW-3G, 4G uses AES CBC 128 bits to cipher communications Thank to USIM 3G and 4G network use mutual authentication But accesses to 3G networks are possible with previous SIM card possible bypass of mutual authentication In 2011, ZUC algorithm has been introduced with 128 bits key Encryption algorithm is strong and mutual authentication make it difficult to intercept communications
9 Mobile interception: signal attraction A User Equipment connects to the closer Base Station 3G/4G downgrades to 2G via jamming attacks a simple Gaussian noise in targeted channels protocol attacks difficult baseband strange behaviors
10 State Of the Art: publications Many publications exist: Attacks on GSM A5/1 algorithm with rainbow tables (at 26c3, Chris Paget and Karsten Nohl) OsmocomBB (at 2010 at 27c3, Harald Welte and Steve Markgraf) Hacking the Vodaphone femtocell (at BlackHat 2011, Ravishankar Borgaonkar, Nico Golde, and Kevin Redon) An analysis of basebands security (at SSTIC 2014, Benoit Michau) Attacks on privacy and availability of 4G (In October 2015, Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi and Jean-Pierre Seifert) How to not break LTE crypto (at SSTIC 2016, Christophe Devine and Benoit Michaud)
11 State Of the Art: tools Hardware USRP from 700 (without daughter-boards and antennas) SysmoBTS from 2,000 BladeRF from 370 (without antennas) Software Setup a mobile network OpenBTS: GSM and GPRS network compatible with USRP and BladeRF OpenUMTS: UMTS network compatible with some USRP OpenLTE: LTE network compatible with BladeRF and USRP OpenAir: LTE network compatible with some USRP YateBTS: GSM and GPRS network compatible with USRP and BladeRF Analyze traffic libmich: Analyze and craft mobile packets captured with GSMTAP Wireshark: Analyze GSMTAP captured packets OsmocomBB: sniff and capture GSM packets
12 Passive attacks in GSM CCCH (Common Control Channels) give a lot of information Management messages, sometimes SMS in clear, TMSIs,... CCCH paging request can be exploited to locate someone Tools OsmocomBB, Airprobe,...
13 Capture a specific channel (1) List of ARFCN
14 Capture a specific channel (2) Leaked TMSI Use SMS Class-0 messages to track a user
15 GSM Lab setup: for interception 1 BladeRF = Antennas = 15 each YateBTS software = FREE Total cost = 400
16 GSM interception: User Equipment behaviors A User Equipment decide to register to another base station if it can register to any MCC/MNC BTS close to it it can register to a test network close to it only the current used network isn t reachable anymore, even if a rogue base station is closer the signal is strong and the mutual authentication succeeded (not the case in GSM/GPRS) Everything depends on the mobile stack implementations...
17 Demo... Fake Base Station
18 Other vulnerable devices Interception of Intercoms
19 Results on intercoms On a Link idp GSM intercom leak of user phone numbers send Intercom specific commands send AT commands to interact with the targeted baseband update users with premium rated numbers (e.g: Allopass) Further work Reduce the model replacing the computed with a Raspberry Pi 3, or an ODROID device from about 50 Semi-automatic channel jamming on 3G Study of protocol attacks on 3G and 4G
20 3G 2G downgrade: hardware Downgrade is difficult with traditional jammers an attacker needs to focus to few specific bands bands of the targeted operators A simple HackRF can be used (340 )
21 Jamming video demo...
22 Alternatives to Jamming attacks Protocol attacks on 4G and 3G using OpenLTE for 4G, or Open-UMTS for 3G a compromized femtocell for 3G, and 4G femtocell thanks to serial port, or unsecure update
23 Lab setup: to find bugs 1 USRP: daughter boards: about 120 each 2 TX and RX antennas: about 30 each OpenBTS Software: Free
24 Fuzzing lab in real
25 Fuzzing: our results Made a fuzzing test framework MobiDeke (not released publicly) Results found on a HTC Desire Z Found multiple application crashes Mostly Java exception not exploitable 1 exploitable vulnerability on SETUP CALLS handling used to compromize the baseband Presented at hack.lu conference in 2012 with Guillaume Delugré
26 Conclusion Attacks on GSM and GPRS are affordable: less than 1,000 Attacks 3G and 4G are difficult, but mutual authentication could be bypassed depending on the baseband implementation Publicly vulnerable femtocell can be found through Ebay (with serial ports, or unsecure download processes) The IoT ecosystem uses a lot GSM and 3G stacks (for example digital intercoms) vulnerable to the same attacks as traditional mobile devices
House intercoms attacks
House intercoms attacks When frontdoors become backdoors Presented the 02/07/2016 NDH 2016 By Sébastien Dudek For About me Company: Synacktiv Interests: radio-communications (Wi-Fi, RFID, GSM, PLC...),
Security in cellular-radio access networks
Security in cellular-radio access networks Ravishankar Borgaonkar, Oxford University 5G Security Workshop Stockholm, Sweden 11 May 2016 Outline Radio Access Network Layered Security Emerging low cost attacks
LTE and IMSI catcher myths
LTE and IMSI catcher myths Ravishankar Borgaonkar, Altaf Shaik, N. Asokan, ValAeri Niemi, Jean- Pierre Seifert Blackhat EU, Amsterdam, Netherlands 13 November 2015 Outline Fake base stamons in GSM/3G LTE/4G
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
2G/3G Mobile Communication Systems
2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
Karsten Nohl, Chris Paget 26C3, Berlin GSM SRSLY?
Karsten Nohl, Chris Paget 26C3, Berlin GSM SRSLY? Summary: GSM Encryption needs to be shown insecure GSM is constantly under attack: A5/1 cipher shown insecure repeatedly Lack of network authentication
How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/[email protected] TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
introduction to femtocells
.. introduction to femtocells Kévin Redon Technische Universität Berlin, Security in Telecommunications [email protected] OsmoDevCon 2012, Berlin, 24th March 2012 UMTS architecture SecT
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
International Journal of Computing and Business Research (IJCBR)
AN INVESTIGATION OF GSM ARCHITECTURE AND OVERLAYING WITH EFFICIENT SECURITY PROTOCOL Karun Madan, Surya World Institute of Engg. & Technology, Rajpura, Punjab ABSTRACT The Global System for Mobile Communications
Femtocells: A Poisonous Needle in the Operator s Hay Stack
Femtocells: A Poisonous Needle in the Operator s Hay Stack Ravishankar Borgaonkar, Nico Golde and Kevin Redon Security in Telecommunications Technische Universität Berlin and Deutsche Telekom Laboratories
Dirty use of USSD codes in cellular networks
.. Dirty use of USSD codes in cellular networks Ravishankar Borgaonkar Security in Telecommunications, Technische Universität Berlin TelcoSecDay, Heidelberg, 12th March 2013 Agenda USSD codes and services
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
Global System for Mobile Communications (GSM)
Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE [email protected] UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security
Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim
Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations
GSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications
www.taddong.com A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications David Perez Jose Pico Introduction It has been proved that GSM is vulnerable to multiple attacks (rogue base station,
1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS
Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.
Security of phone communications
Security of phone communications Authentication, identification and mobile security Matej Kovačič (CC) 2015 This work is published under Creative Commons licence: AttributionNonCommercial-ShareAlike 2.5
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
Global System for Mobile Communication (GSM)
Global System for Mobile Communication (GSM) Li-Hsing Yen National University of Kaohsiung GSM System Architecture Um (ME/SIM) C E C PSTN, ISDN, PSPDN, CSPDN A-bis A F A-bis C B BTS BSS BSC HLR VLR EIR
UMTS security. Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003
UMTS security Helsinki University of Technology S-38.153 Security of Communication Protocols [email protected] 15.4.2003 Contents UMTS Security objectives Problems with GSM security UMTS security mechanisms
Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks
Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks Nico Golde, Kévin Redon, and Jean-Pierre Seifert, Technische Universität Berlin and Deutsche Telekom Innovation Laboratories
A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications ABSTRACT
A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications David Perez - [email protected] Jose Pico - [email protected] Black Hat DC 2011 (Jan. 18-19) ABSTRACT In this article we present
LTE security and protocol exploits
LTE security and protocol exploits Roger Piqueras Jover Wireless Security Research Scientist Security Architecture Bloomberg LP ShmooCon January 2016 About me Wireless Security Researcher (aka Security
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
Mobile Phone Security. Hoang Vo Billy Ngo
Mobile Phone Security Hoang Vo Billy Ngo Table of Content 1. Introduction Page 2 1.1 Analog Network Page 2 1.2 Digital Network Page 2 2. Security Protocols Page 4 2.1 Analog Page 4 2.2 Digital Page 5 3.
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
GSM Network and Services
GSM Network and Services GPRS - sharing of resources 1 What is the problem? Many data applications are very bursty in its traffic pattern: http, smtp, pop, telnet,... Why reserve physical resources at
How to hack your way out of home detention
How to hack your way out of home detention About me William @Amm0nRa Turner @Assurance Disclaimer: I own this system (and 0wn it) The following information is for academic purposes only Don t use this
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR
Update ( Update Procedure) Network Mobiles Maryland Maryland Other Rockville Bethesda Maryland Mobile Mobile Cell Cell HLR Vienna Cell 12-Jun-14 22:48 (Page 1) This sequence diagram was generated with
Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography Wilayat Khan 1 and Habib Ullah 2 1 Department of Electrical
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07
Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements
How To Test Gsm Cell Phone Network On A Cell Phone
G S M C E L L B R O A D C A S T S E RV I C E S E C U R I T Y A N A LY S I S arturo cedillo torres Department of Mathematics and Computer Science Eindhoven University of Technology Supervisors: Nicola Zannone
Mobile network security report: Poland
Mobile network security report: Poland GSM Map Project [email protected] Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common
Mobile Phone Network Security
Mobile Phone Network Security Internet Security [1] VU Adrian Dabrowski, Markus Kammerstetter, Georg Merzdovnik, Stefan Riegler and Aljosha Judmayer [email protected] Mobile phone networks 1G
LTE Security How Good Is It?
LTE Security How Good Is It? Michael Bartock IT Specialist (Security) National Institute of Standards & Technology Jeffrey Cichonski IT Specialist (Security) National Institute of Standards & Technology
Mobile network security report: Greece
Mobile network security report: Greece GSM Map Project [email protected] Security Research Labs, Berlin October 2012 Abstract. Mobile networks differ widely in their protection capabilities against common
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks MBS-W07 Selim Aissi, PhD Objectives Mobile Security Threat Landscape Mobile Network Security Cybersecurity Implications, Mitigations
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
GSM BASICS GSM HISTORY:
GSM BASICS GSM HISTORY: In 1982 the Nordic PTTs sent a proposal to CEPT (Conference of European Postal & telegraph Administration) to study and to improve digital cellular technology by forming a team
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM
Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies
GPRS Network Security
AT&T Wireless Services, Inc. GPRS Network Security Document Number 12199 Revision 0.4.5 Peter Rysavy, Primary Contributing Writer Product Development AT&T Wireless Services, Inc. PO Box 97061 Redmond,
@msecnet / www.m-sec.net. Bogdan ALECU
Business logic flaws in mobile operators services Bogdan Alecu About me Independent security researcher Sysadmin Passionate about security, specially when it s related to mobile devices; started with NetMonitor
4th European Tcl/Tk User Meeting. Tcl used for testing in the mobile world
4th European Tcl/Tk User Meeting Tcl used for testing in the mobile world Hans Banken, SIGOS GmbH May 2003 Klingenhofstraße 50d D-90411 Nürnberg Fon +49 911 95168-0 Fax +49 911 95 16 8-355 www.sigos.de
GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)
GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating
Mobile network security report: Norway
Mobile network security report: Norway GSM Map Project [email protected] Security Research Labs, Berlin August 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)
GSM Architecture Training Document
Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.
SS7: Locate. Track. Manipulate.
You have a remote-controlled tracking device in your pocket Tobias Engel @2b_as 2 Signalling System #7 Protocol suite used by most telecommunications network operators throughout the world
Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering
Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing
Evaluating GSM A5/1 security on hopping channels
Evaluating GSM A5/1 security on hopping channels Bogdan Diaconescu v1.0 This paper is a practical approach on evaluating A5/1 stream cipher on a GSM hopping network air interface called Um. The end goal
Authentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia [email protected] ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks
(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks Christos Xenakis, Christoforos Ntantogian, Orestis Panos Department of Digital Systems, University of Piraeus Piraeus, Greece
Defending mobile phones. Karsten Nohl, [email protected] Luca Melette, [email protected]
Defending mobile phones Karsten Nohl, [email protected] Luca Melette, [email protected] GSM networks provide the base for various attacks SS7 Phone Base station GSM backend network User database (HLR) Vulnerability
Cellular Network Organization
Cellular Networks Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells o Each served by its own antenna o Served by base station consisting of transmitter,
2 System introduction
2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to
Development of Wireless Networks
Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.
GSM System. Global System for Mobile Communications
GSM System Global System for Mobile Communications Introduced in 1991. Settings of standards under ETSI (European Telecommunication Standards Institute) Services - Telephone services - Data services -
Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014
Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch
Karsten Nohl, [email protected]. Breaking GSM phone privacy
arsten Nohl, [email protected] Breaking GSM phone privacy GSM is global, omnipresent and wants to be hacked 80% of mobile phone market 200+ countries 5 billion users! GSM encryption introduced in 1987
Mobile network security report: Belgium
Mobile network security report: Belgium GSM Map Project [email protected] Security Research Labs, Berlin December 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
GSM security country report: Germany
GSM security country report: Germany GSM Map Project [email protected] Security Research Labs, Berlin December 2013 Abstract. GSM networks differ widely in their protection capabilities against common attacks.
GSM security country report: USA
GSM security country report: USA GSM Map Project [email protected] Security Research Labs, Berlin August 2013 Abstract. GSM networks differ widely in their protection capabilities against common attacks.
IMSI Catchers and Mobile Security
By Joseph Ooi IMSI Catchers and Mobile Security Advisor: Professor Nadia Heninger EAS 499 Senior Capstone Thesis School of Engineering and Applied Science University of Pennsylvania April 29, 2015 TABLE
Provides a communication link between MS and MSC; Manages DB for MS location. Controls user connection. Transmission.
Provides a communication link between MS and MSC; Manages DB for MS location Controls user connection CM MM RR Transmission Several RR functions considered in previous part!"# Surprise! handover is part
Wireless Security: Token, WEP, Cellular
Wireless Security: Token, WEP, Cellular 27 May 2015 Lecture 9 Some slides adapted from Jean-Pierre Seifert (TU Berlin) 27 May 2015 SE 425: Communication and Information Security 1 Topics for Today Security
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail Professor Patrick Traynor 9/27/12 Cellular Telecommunications Architecture Background Air Interfaces Network Protocols Application: Messaging
Practical Attacks on DOCSIS
Practical Attacks on DOCSIS Who am I? @drspringfield Security researcher at Accuvant Work in embedded device security, reverse engineering, exploit dev No background in DOCSIS, but I find it interesting
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
Security and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
Mobile network security report: Netherlands
Mobile network security report: Netherlands GSM Map Project [email protected] Security Research Labs, Berlin July 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
Security in the GSM Network
Security in the GSM Network Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department, MSc. Student EE 588 NETWORK SECURITY TERM PROJECT Abstract: GSM is the biggest
Mobile network security report: Poland
Mobile network security report: Poland GSM Map Project [email protected] Security Research Labs, Berlin October 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Mobile network security report: Germany
Mobile network security report: Germany GSM Map Project [email protected] Security Research Labs, Berlin December 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
2G Mobile Communication Systems
2G Mobile Communication Systems 2G Review: GSM Services Architecture Protocols Call setup Mobility management Security HSCSD GPRS EDGE References Jochen Schiller: Mobile Communications (German and English),
Network Infrastructure Security in Cellular Data Networks: An Initial Investigation
Network Infrastructure Security in Cellular Data Networks: An Initial Investigation Kavita Barapatre, Nirlesh Koshta, Vishal Sharma IIT Bombay, Mumbai, India and Fabio Ricciato Forschungszentrum Telekommunikation
Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
Wireless Telecommunication Systems GSM, GPRS, UMTS. GSM as basis of current systems Satellites and
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: Wireless Telecommunication Systems GSM, GPRS,
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
TETRA Security for Poland
TETRA ASSOCIATION TETRA Security for Poland Brian Murgatroyd TETRA ASSOCIATION former Chairman Security and Fraud Prevention Group Warren Systems (SFPG) Independent Security Consultant [email protected]
