Telecom Signaling attacks on 3G and LTE networks
|
|
|
- August Melton
- 10 years ago
- Views:
Transcription
1 Telecom Signaling attacks on 3G and LTE networks from SS7 to all-ip, all open P1 Security Inc. v1.1
2 Telecom security intro! SIP, PBX,...! Periphery, customer side.! Long gone world of Blue Box.! Sometime hear about Roaming frauds.! Rarely hear the Core Network horror stories. Steve Jobs and Steve Wozniak in 1975 with a bluebox
3 Telecom frauds and attacks
4 Telecom frauds and attacks
5 Telecom frauds and attacks
6 Structure of operators: SS7! SS7 basis for international interconnection & transit! Called Legacy : Why it is not going away?! Walled garden approach to security.
7 NGN, IMS, 3G! IP friendly.! More IETF! Diameter! Partly SIP-based! SCTP appears! Encapsulates SS7 over IP! SIGTRAN
8 LTE, LTE Advanced! More P2P! Even more IP! SIGTRAN is simplified! Simpler protocols (S1)! enb handover & " communications! Deeper integration, less layering & segmentation! Addresses performances issues & bottlenecks
9 Current state of security research ME vulnerability research (SMS o Death, OsmocomBB) OpenBTS + crypto cracking (Karsten Nohl,...), Baseband vulns (R.P. Weinman) OpenBSC FemtoCell hacking (THC, P1 Security, SEC- T,...) Nothing really new in IP domain?" WRONG: " Many things come from Telecom and IP merger & legacy obscurity. SMS injection (TSTF,...) External APIs to HLR: location, IMSI. (Tobias Engel,...) Scanning and Attacking SS7 CN, SIGTRAN, IMS vulnerabilities, LTE scanning,... (Philippe Langlois, P1 Security, Enno Rey)
10 Attacking Telecom Networks! Newbie question How do you get access?! Steps 1. Footprint 2. Scan 3. Exploit 4. Detect & Protect! No recipe as in IP world, each telecom environment is quite different (legacy sandwich)
11 1. Footprint (demo) Demo
12 2. Scan: PS entry points! PS Domain is huge now! Many common mistakes:! IP overlaps,! APN misconfiguration,! firewall issues,! IPv6 control! M2M specifics.
13 GTP entry points! GTP, GTP-C, GTP-U, v1 or v2! UDP or SCTP based! Many APNs (from to 5000), many configurations, many networks with their corresponding GGSN.! packet slips in M2M or public APNs! GTP tunnel manipulation means traffic insertion at various point of the network (Core or Internet)
14 First, GTP basics From SGSN (client) To GGSN (server) Many commands " possible in Message Type Extended a lot GTP v0 GTP v1 GTP v2
15 GTP scanning in 3G/LTE Way too many open GTP service on the Internet Higher ratio on LTE/GRX of course Easily scanned with GTP Echo Request GRX LTE UDP ports 2123, 2152, 3386, Super fast positive scanning LTE new protocols (from enodeb S1/X2 to MME/PGW/ )
16 GTP Tunnel disconnection " DoS attack TEID bruteforce GRX MNO Disconnect Message Type (Delete Session Request. Delete PDP, ) + spoof SGSN (really?) 2^32 would be a problem if TEID were not sequential :-) [...]! Delete PDP Context: Request Accepted! Delete PDP Context: Request Accepted! A1 Delete PDP Context: Request Accepted! BF Delete PDP Context: Request Accepted! D8 Delete PDP Context: Request Accepted! E8 Delete PDP Context: Request Accepted! [...]!
17 Fake charging attacks Normal GTP 2 traffic But with Charging ID and Charging GW (CGF) address specified GRX MNO Creates fake CDRs (Call Detail Records or Charging Data Records) for any customer Not necessary to get free connection anyway :-)
18 GRX Subscriber Information Leak GRX is GPRS/3G/LTE paradise (soon IPX) GRX LTE SGSN and GGSN need to communicate with many Network Elements in 3G and 4G networks GTP v2 enables many requests to these equipment directly over GTP. Think HLR Request over UDP No authentication Much more available than an SS7 interconnection :-) And you re GLOBAL! Thanks GRX. That is, any operator in the world that is connected to any GRX.
19 Relocation Cancel attack Basically tell one SGSN that the user it is serving should come back to you User is effectively disconnected (or hangs), no more packets. Targer user by IMSI But you already got that by the Info leak of previous attack GRX LTE Shoule be Intra-operator, but does work over GRX!
20 GGSN DoS attack GRX LTE Another magic packet Oh, I m a bit congested and about to crash, it would be good for you to relocate to another GGSN to continue your service Result: GGSN deserted, users don t get any other GGSN, users loose service. Per APN impact (i.e. internet or *.corp ) Exercise to the ****er
21 SGSN DoS attack - Ouch GRX LTE More rare because by their nature (client), SGSN are " rarely reachable through IP Same attack as previous (Hey, you should really switch to another node, this one is going down) Much more impact: Targets a region rather than a network, Repeat on GRX == Disconnect many countries Both these are caused by evolved GTP i.e. GTP on LTE Advanced networks.
22 Scan Femto Cells entry points! Femto Cell security is improving! Better boot harden! IPsec tunnels! EAP-SIM protected! But many compromise vectors still.! Exposes directly signaling network (HNBAP), HLR/HSS (Diameter,...), infrastructure network (routing, NTP,...) to the user.
23 Core Network (CN) scan! Some Core Network start of migration since 2008 to IPv6! SCTP based (RFC4960, Stream Control Transmission Protocol)! Still SS7 encapsulated! Implementations make scanning easy...
24 SCTP scan! Pioneered in SCTPscan, ported into nmap.! Both don t work anymore (SCTP protocol evolved).! Now in SCTPscan NG Attacker! INIT! INIT! INIT-ACK! Servers! ABORT! Port 101! Fast, positive, TCP-like! Port 102!
25 CN Scan specificities! SCTP changed a lot, public tools don t work anymore. (Difficulty)! IPv6 starts to be deployed, scan is completely possible but regular consultants don t know how to. (Size)! CN Protocols are very complex (ASN.1 madness, Difficulty) cannot be tested by hand! Signaling protocols address ranges makes then hard to assess by hand (Size)! Size + Difficulty increase requires automation
26 Scan & Address spaces SSN Scanning GTT Scanning DPC Scanning
27 Scan IP vs. Telecom Signaling TCP/IP SS7 IPsec endpoint scan, MPLS label scan, VLAN tag scan SCTP endpoint scan Arp or Ping scan MTP3 or M3UA scanning Ping scan using TCP SYN SCCP DPC scanning TCP SYN or UDP port/service scanning SCCP SSN (SubSystem Number) scanning Service-specific attacks and abuses (e.g. attacks over HTTP, SMB, RPC,...) Application (*AP) traffic injection (e.g. MAP, INAP, CAP, OMAP...)
28 SIGTRAN Audit Strategies SCTP portscan For each M3UA, M2PA, SUA peering (internal, national, intl..) DPC scan For each DPC SSN scan For each SS7 application or SSN (HLR,...) Application tests MAP tests INAP tests CAP tests... 28
29 National and International SPCs! SANC and ISPCs! SANC assigned by ITU" "! SPCs" "
30 Scan to network maps! Multiple formats for Point Code representation (3-8-3, NIPC, 5-4-5, Hex, Decimal)! One Point Code can represent many different addresses.! Helps target good part of the network (SMSC, Testbed, HLR cluster or BSCs?)
31 LTE scanning strategies! Mix between SIGTRAN scan and IP scan! Target protocols: S1, X2! Inter- enodeb communications (X2)! Communication between enodebs and Core Network! Tools: SCTP connect scan, SCTPscan NG or PTA
32 3. Exploit! Standard vulnerabilities:! Known vulnerabilities are present, but scarce: proprietary tools, network elements,...! Misconfiguration is present often: once working, people don t touch (fix) the network.! Simple architecture problems: HLR without SSL on OAM, logs exposed, vulnerable VLAN setup! And unstandard / Telecom specific vulnerabilities:
33 HLR heap overflow One single SS7 MAP packet HLR crash! consequences for operator. DoS at first, then exploitable Solaris (sometime old, sometime exotic architecture) Reverse engineering after Hardcoded crypto keys!! Many vulnerabilities Works on HSS too
34 ASN.1 paradise or hell! ITU is ASN.1 addicted! Plenty of TLV, tons of complex protocols! Encodings:! Old protocols: BER, DER! Newer: PER, Aligned, Unaligned! Encoding bombs, Decompression bombs! e.g. LTE S1 protocol between ehnb and SGW, MME
35 SCTP Fuzz Target! Protocol Specification is huge! RFC 5062, RFC 5061, RFC 5043, RFC 4960, RFC 4895, RFC 4820, RFC 4460, RFC 3873, RFC 3758, RFC 3554, RFC 3436, RFC 3309, RFC 3286, RFC 3257, RFC 2960! Good target for vulnerabilities! CVE CVSS Severity: 7.1 (HIGH), CVE CVSS Severity: 7.8 (HIGH), CVSS Severity: 7.8 (HIGH), CVE CVSS Severity: 10.0 (HIGH), CVE CVSS Severity: 7.8 (HIGH), CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE CVE (33 vulnerabilities)
36 Scapy and SCTP! send(ip(dst=" ")/sctp(sport=2600,dport=2500)/ SCTPChunkInit(type=1))! send(ip(dst=" ")/sctp(sport=2600,dport=2500)/ SCTPChunkInit(type=1)/SCTPChunkParamCookiePreservative()/ SCTPChunkParamFwdTSN()/SCTPChunkParamIPv4Addr())! send(ip(dst=" ")/sctp(sport=2600,dport=2500)/ SCTPChunkInit(type=1)/SCTPChunkParamAdaptationLayer()/ SCTPChunkParamCookiePreservative()/SCTPChunkParamFwdTSN ()/SCTPChunkParamIPv4Addr()/ SCTPChunkParamUnrocognizedParam()/ SCTPChunkParamECNCapable()/SCTPChunkParamHearbeatInfo()/ SCTPChunkParamHostname()/SCTPChunkParamStateCookie())! It can get ugly... and i m not even fuzzing here. Use better solution.
37 SIGTRAN Stack de-synchronization: " more exposure & attacks! IP/SCTP/M3UA std by IETF! MTP3/SCCP/TCAP std by ITU! Finite State Machine in M3UA can be tricked into believing you re a peer.! Once you re signaling peer you can...
38 SS7 ISUP Call Initiation Flow IAM attack: Capacity DoS! ` Attack Quiz!
39 SS7 ISUP Call Release Flow REL attack: Selective DoS Attack Quiz!
40 User targeted DoS
41 Sending hostile MSU (MAP)! Sent from any network (in the world)! to any target mobile phone! HLR Lookup may be used to prepare attack (IMSI gathered through SRI_for_SM) IMSI scanning / querying needed!! Phone is registered on network, can make call, cannot receive calls or SMS.
42 Attack success
43 Fuzzing, research and DoS! Fuzzing only in testbed environment! Because it s easy to DoS equipments! Telecom developer obviously don t think like hackers! MGW: hardcoded Backdoor found in OAM terminal! enodeb: protocol flaw leads to DoS! HLR/HSS: DB/Directory protocol leads to DoS + Diameter flaw! Equipments are rarely tested before integration/production
44 Complete audit process
45 4. Detect & Protect! IP IDS don't detect these problems! Previous Lack of IDS for telecom networks! Fraud Management Systems target only CDR: bills, statistical analysis! DShield.org don t log SCTP attempts! netstat -anp doesn t list SCTP associations! hard to track! We re building tools to help.
46 Tales of Telecom Honeypots! Fraud and attacks in telecom is mostly stealth! But the impact is massive (100k to 3 million Euro per incident is typical)! Telecom engineers mindset is not as open for proactive security as in IP crowds! Prefer not to do anything and suffer from attacks! If nothing is there to detect attacks, there are no attacks! Lack of threat intelligence in the telecom domain
47 SS7 Honeypot Deployment (standalone) Attacker Attacker who tries to conduct fraud on the target system SS7 Provider SS7 Provider who manages SS7 links (like ISP) P1 Telecom Honeypot SS7 Honeypot with SS7 link and address (pointcode or SPC)
48 SS7 Honeypot Deployment (integrated) Attacker P1 Telecom Honeypot Attacker who tries to conduct fraud on the operator s system Other operator s equipment Existing Operator SS7 Honeypot within operator SS7 network
49 Architecture A" T" T" A" C" K" E" R" S SS7 or SIGTRAN interconnection Front HP Front HP Front HP VPN Real time Monitoring Master Honey Pot! Interconnection is like a VPN, always two-way Attack record DB Forensic P1 Telecom Auditor Real time audit of the attacker! If attackers does requests (interco), we can request too! We conduct scan with P1 Telecom Auditor through interco.
50 Detection results! Realtime detection of scans (IDS)! SIGTRAN scans! SS7 scans! Detection of telecom specifics! SIM Boxes (subscription fraud),! traffic steering and anti-steering packets/techniques! Illegal traffic routing (mostly SMS, never seen before by operator, lost in traffic )
51 Honeypot results! Threat intelligence!! Nice attacker fingerprints:! Single node attackers (stack on one system)! Whole carrier infrastructure attacking (insider? relay? approved?)! Helps the blacklisting of IDs, Phone numbers,...! And identification of the fraudsters
52 Conclusions! End of walled garden era, more exposed:! High Exposure in term of IP-reachability (starting in 3G/IMS) and reachability of the IP-equipment (specifically in LTE networks)! Network complexity (planes/layers) and protocol diversity make it very hard to get right from the beginning.! Few dare to audit / test their telecom environment.! Tools and services are now mature and efficient.! First need to visualize the problem: discovery, awareness.
53 Credits! Everybody from Telecom Security Task Force! Fyodor Yarochkin! Emmanuel Gadaix! Raoul Chiesa! Daniel Mende, Rene Graf, Enno Rey! Everyone at P1 Security and P1 Labs
54 Thank you! Questions?" Ask: Hackito Ergo Sum, Paris, France April 2012 Russia is the country of honor for Hackito 2012! Submit a talk!
55
56 Backup slides P1 Security"
57 Problem! Mobile Network Operators and other Telecom Operators! use Fraud Management System that are reactive only, only see fraud when it has stolen money from the operator,! have no way to tell if their network weaknesses are,! must wait for fraud, network downtime, crashes, spam, intrusions to happen in order to see how it happened.! Governments, safety agencies and telecom regulators! have no way to assess the security, resiliency and vulnerability of their Telecom Critical Infrastructure
58 P1 Security Solution! PTA gives vision on Telecom signaling networks (SS7, SIGTRAN, LTE sig), a security perimeter previously without technical audit.! Telecom and Mobile Operator can scan and monitor their signaling perimeter as they do for their Internet and IP perimeter, detecting vulnerabilities before hackers, fraudsters and intruders do.! Delivers metric for management, reports and fixes for experts.! Right now, all the following problems go undetected (next pages) and could be detected with PTA:
59 PTA Deployment
60 PTA Audits! PTA Audits simulate human analysis of a SS7 signaling network.! It is composed of a set of signaling tests each representing one category of attack scenario or one specific attack or fraud attempt.! The Test Knowledge Base is constantly updated with new attack scenarios.! The behavior, strategy and analysis of the Audit results is driven by a Machine Learning engine using SVM methods to mimic the intelligence of a human expert.
61 Web Access: Easy & Standardized
62 Report Management
63 PTA Report
64 Who?! Established management team! Avg of 15 year of industry background, both Security and Telecom.! Successful Entrepreneurs (Qualys, INTRINsec, TSTF)! Start-up launched in January 2009! Already established references in Europe and Asia! Financial backing from private investors
Telecom Signaling attacks on 3G and LTE networks
Telecom Signaling attacks on 3G and LTE networks from SS7 to all-ip, all open [email protected] P1 Security Inc. v1.1 Telecom security intro SIP, PBX,... Periphery, customer side. Long gone world
Philippe Langlois, P1 Security Inc. [email protected]
Telecommunications Infrastructure Security Getting in the SS7 kingdom: hard technology and disturbingly easy hacks to get entry points in the walled garden. Philippe Langlois, P1 Security Inc. [email protected]
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Immersed Network Discovery and Attacks. Philippe Langlois Telecom Security Task Force [email protected] http://www.tstf.
Immersed Network Discovery and Attacks Specifics of Telecom Core Network (CN) insider attacks Philippe Langlois Telecom Security Task Force [email protected] http://www.tstf.net 1 Speaker Introduction
Remotely crashing HLR MSC STP
Remotely crashing HLR MSC STP MME Why it took telecom industry 20 years to recognize the problems with SS7 Philippe Langlois, P1 Security Intro Philippe Langlois Founder of Qualys, Worldnet, TSTF, WaveSecurity,
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
LTE Attach and Default Bearer Setup Messaging
LTE Attach and Default Bearer Setup Messaging 2012 Inc. All Rights Reserved LTE Attach Message Sequence Chart enodeb MME SGW HSS Initial UE Message Update Location Update Location Answer Create Session
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
Introduction. Channel Associated Signaling (CAS) Common Channel Signaling (CCS) Still widely deployed today Considered as old technology
VoIP and SS7 Introduction Channel Associated Signaling (CAS) Still widely deployed today Considered as old technology Common Channel Signaling (CCS) Separation of signaling and call paths Signaling System
Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014
VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator
4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
SS7: Locate. Track. Manipulate.
You have a remote-controlled tracking device in your pocket Tobias Engel @2b_as 2 Signalling System #7 Protocol suite used by most telecommunications network operators throughout the world
Nokia Siemens Networks his 700 Integrated signaling application solutions
Nokia Siemens Networks his 700 Integrated signaling application solutions Today s and the next generation networks use the Signaling System No. 7 (SS7) to exchange information within and between the networks.
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification
TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Chapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
UNDERSTANDING CORE TELECOM SECURITY
SOLUTION BRIEF -TELECOM UNDERSTANDING CORE TELECOM SECURITY If you think you re not affected, consider that a 2013 Congressional survey of more than 150 utility companies revealed more than a dozen utilities
SCTPscan - Finding entry points to SS7 Networks & Telecommunication Backbones
SCTPscan - Finding entry points to SS7 Networks & Telecommunication Backbones Philippe Langlois Telecom Security Task Force [email protected] 1 Agenda History of telecommunications security Review
Affording the Upgrade to Higher Speed & Density
Affording the Upgrade to Higher Speed & Density Ethernet Summit February 22, 2012 Agenda VSS Overview Technology Q&A 2 Corporate Overview World Leader in Network Intelligence Optimization Deployed in 80%
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
3GPP TS 29.119 V7.0.0 (2007-06)
TS 29.119 V7.0.0 (2007-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; GPRS Tunnelling Protocol (GTP) specification for GLR (Release 7) The present
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements. P1 Security
LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements P1 Security 1 LTE ENVIRONMENT 2 LTE Network Overview 3 Corporate & Mobile Data risk increased LTE from agackers perspechve All IP always on always
XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies
XPROBE-NG What s new with upcoming version of the tool Fyodor Yarochkin Armorize Technologies Abstract Attacks trends analysis and network modern discovery requirements lazy scanning, application level
Signaling Delivery Controller : Control Your 4G Network
Data Sheet Traffix Systems Signaling Delivery Controller : Control Your 4G Network The Traffix Signaling Delivery Controller (SDC) assists operators in scaling and managing services and applications in
Securing the Interconnect Signaling Network Security
Securing the Interconnect Signaling Network Security Travis Russell Director, Cyber Security, Service Provider Networks Oracle Communications August, 2015 Current security landscape Much attention has
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin
XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
IP Multimedia System: general aspects and migration perspectives
IMS TPC EPC IP Multimedia System: general aspects and migration perspectives Dr. Leo Lehmann Federal Office of Communication, Switzerland ITU Workshop on Developments regarding telecommunication network
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Just as the ecommerce companies have
Protecting IMS Networks From Attack Krishna Kurapati Krishna Kurapati is the founder and CTO of Sipera Systems (www.sipera.com), a company that specializes in security for VOIP, mobile and multimedia communications.
How To Understand And Understand The Gsp Protocol On A Cell Phone Or Ipad Or Ipa (For A Cell) On A Sim Simlan 2 Or Ipam (For An Ipa) On An Ipad 2 Or 4 Or Ipap
HITB Labs: Practical Attacks Against 3G/4G Telecommunication Networks Jim Geovedi Daniel Mende [email protected], [email protected] Agenda Overview 3G / 4G Backhaul Networks Backend Protocols in depth The Lab
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Mobile Assurance. Centralized Roaming Management System (CRMS) Brochure. www.jdsu.com/nse
Mobile Assurance Centralized Roaming Management System (CRMS) Brochure Mobile Assurance Centralized Roaming Management System CRMS Benefits Maximize Revenues Pinpoint the precise details of roaming-service
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions
Mobile Packet Backbone Network Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 6 MOBILE PACKET BACKBONE NETWORK (M-PBN) R5.1 DELTA... 7 MOBILE PACKET
An Oracle White Paper November 2013. Typical Key Performance Indicator Reports for Performance Intelligence Centers
An Oracle White Paper November 2013 Typical Key Performance Indicator Reports for Performance Intelligence Centers Disclaimer The following is intended to outline our general product direction. It is intended
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
Denial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Securing Next Generation Mobile Networks
White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile
Networking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
MED: Voice over IP systems
www.ptt.co.uk Online course specification MED: Voice over IP systems Target audience: This online course is designed for those who will be responsible for the design or maintenance of Voice over IP (VoIP)
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS
Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.
