SMS Fuzzing SIM Toolkit Attack
|
|
|
- Silvester Griffith
- 10 years ago
- Views:
Transcription
1 SMS Fuzzing SIM Toolkit Attack Bogdan Alecu Abstract In this paper I will show how to make a phone send an SMS message without the user s consent and how to make the phone not to receive any message. The method used works on any phone, no matter if it s a smartphone or not and also on any GSM/UMTS network. I will present how you can take advantage of sending a special crafted SIM Toolkit command message in order to achieve all that. Finally, I will present the results and their impact on the user and mobile networks security. 1 Introduction SMS stands for Short Message Service and represents a way of communication via text between mobile phones and/or fixed lines, using a standardized protocol. It is an effective way of communication as the user just writes some text and it s almost instantly delivered to the destination. SMS as used on modern handsets was originated from radio telegraphy in radio memo pagers using standardized phone protocols and later defined as part of the Global System for Mobile Communications (GSM) series of standards in 1985 as a means of sending messages of up to 160 characters, to and from GSM mobile handsets.1 Since then a lot of things have changed regarding this service and now it can be used for multiple purposes: MMS Multimedia Messaging Service, OTA Over The Air phone configuration, notification for 1 1
2 voice mail, , fax, micropayments paying a very small sum of money for different services. All these ways of using SMS can lead to security issues as their implementation isn t fully tested and more important because SMS is like an opened firewall: every phone has it implemented and the phone always receives the message. There have been discovered different errors, security issues related to the SMS: remote DoS for Nokia S60 phones2, phone crashing, rebooting, remote executing EXE files, hijacking mobile data connections3, etc. Until now most of the SMS related security issues have been found by accident. This is also the case for the current security issue presented in the paper. I was experimenting with the binary message sending multipart messages: sending the second part but the message had only one part, sending the s part message, etc. and trying to configure the SMSC number stored by sending SIM Application Toolkit messages when suddenly I ve noticed that my phone started to send a message by itself. Later on, after playing more with the message that caused this behavior, my phone was not receiving any other messages. I tried putting the SIM on another phone, resetting the SMSC number but nothing helped. In this paper I will show how you can achieve the above behavior, why it happens, what are the security implications and how you can protect. But first, a little bit of theory 2 SMS The Point-to-Point Short Message Service (SMS) provides a means of sending messages of limited size to and from GSM mobiles. The provision of SMS makes use of a Service Centre, which acts as a store and forward centre for short messages. Two different point-to-point services have been defined: mobile originated and mobile terminated. Mobile originated messages will be transported from an MS to a Service Centre (SC). These may be destined for other mobile users, or for subscribers on a fixed network. Mobile terminated messages will be transported from a Service Centre to an MS. These may be input to the Service Centre by other mobile users (via a mobile originated short message) or by a variety of other sources, e.g. speech, telex, or facsimile. The text messages to be transferred contain up to 140 octets. An active MS shall be able to receive a short message TPDU - Transfer protocol data unit - (SMS-DELIVER) at any time, independently of whether or not there is a speech or data call in progress. A report will always be returned to the SC; either confirming that the MS has
3 received the short message, or informing the SC that it was impossible to deliver the short message TPDU to the MS, including the reason why. 4 An active MS shall be able to submit a short message TPDU (SMS-SUBMIT) at any time, independently of whether or not there is a speech or data call in progress. A report will always be returned to the MS; either confirming that the SC has received the short message TPDU, or informing the MS that it was impossible to deliver the short message TPDU to the SC, including the reason why SMS-SUBMIT details Here are the basic elements for SMS-SUBMIT type: 4 ETSI TS V7.5.0 ( ), page 13 5 ETSI TS V7.5.0 ( ), page 13 3
4 Table 1 - Basic elements of the SMS-SUBMIT type 6 1) Provision; Mandatory (M) or Optional (O). 2) Representation; Integer (I), bit (b), 2 bits (2b), Octet (o), 7 octets (7o), 2-12 octets (2-12o) 3) Dependent on the TP-DCS Example of SMS-SUBMIT Octet(s) 00 6 Description Info about SMSC here the length is 0, which means that the SMSC stored in the phone should be used. ETSI TS V7.5.0 ( ), page 42 4
5 01 First octet of the SMS-SUBMIT message. It indicates that there is no reply path, User Data Header, Status Report Request, Validity Period, Reject Duplicates. The message type is SMSSUBMIT. 00 TP-Message-Reference. The "00" value here lets the phone set the message reference number itself. 0B Address-Length. Length of phone number (11) 91 Type-of-Address. Here it is the international format of the phone number F9 The phone number in semi octets TP-PID, none specified 00 TP-DCS, none specified 0B TP-User-Data-Length. Length of message = length of septets = 11 E8329BFD06DDDF TP-User-Data. These octets represent the message "hello world". Table 2 Details of how SMS-SUBMIT is composed In order to send this message trough AT commands via a GSM modem, the following steps should be performed: a) Set the modem in PDU mode: AT+CMGF=0 b) Check if modem is able to process SMS: AT+CSMS=0 c) Send the message: AT+CMGS=23 > B F900000B E8329BFD06DDDF In order to better understand, see below some screenshots from WireShark used for capturing the debug mode of a Nokia
6 Figure 1 Capture from dct3tap software 7 Figure 2 Capture from Wireshark compiled with GSMTAP showing an outgoing SMS 7 6
7 Figure 3 Capture from Wireshark compiled with GSMTAP showing the SMS-SUBMIT packet 2.2 SMS-DELIVER details Here are the basic elements for SMS-DELIVER type: 7
8 Table 3 - Basic elements of the SMS-DELIVER type 8 1) Provision; Mandatory (M) or Optional (O) 2) Representation; Integer (I), bit (b), 2 bits (2b), Octet (o), 7 octets (7o), 2-12 octets (2-12o) 3) Dependent on the TP-DCS In order to better understand how the previous message was received by the phone, I will attach some screenshots from WireShark used for capturing the debug mode of a Nokia ETSI TS V7.5.0 ( ), page 38 8
9 Figure 4 Capture Wireshark compiled with GSMTAP showing an incoming message Figure 5 Capture Wireshark compiled with GSMTAP showing details of SMS-DELIVER packet 2.3 User Data Header (UDH) The User Data Header contains octets that are added to the beginning of the user data part. UDH provides value added services, creating a smart messaging. Field Length Length of User Data Header 1 octet 9
10 Information-Element-Identifier "A" (IEI) 1 octet Length of Information-Element "A" (IEDL) 1 octet Information-Element "A" Data (IED) n octets, based on IEDL UDH can be used for: Ringtone WAP Push Operator logo VCARD Concatenation of messages SIM Toolkit Security headers SIM Toolkit Security headers There are two types of secure commands in the user data: - Command Packet - a secured packet transmitted by sending entity to the receiving entity, containing secured application message - Response Packet - secured packet transmitted by receiving entity to the sending entity, containing secured response and possibly application data Figure 6 Structure of the command packet according to GSM Command Packet Length (CPL) - shall indicate the number of octets from and including the Command Header Identifier to the end of the Secured Data, including any padding octets required for ciphering. Command Header Length (CHL) - the number of octets from and including the SPI to the end of the RC/CC/DS
11 Security Parameter Indicator (SPI) - defines the security level applied to the input and output message Ciphering Key Identifier (KIc) - Key and algorithm Identifier for ciphering Key Identifier (KID) - Key and algorithm Identifier for Redundancy Check (RC) / Cryptographic Checksum (CC) / Digital Signature (DS) Toolkit Application Reference (TAR) - is part of the header that identifies and triggers the Over The Air (OTA) feature, which is an application on the SIM Counter (CNTR) - Replay detection and Sequence Integrity counter Padding counter (PCNTR) - indicates the number of padding octets used for ciphering at the end of the secured data 3 About mobile phone Currently there are two types of phones: feature phones and smartphones. Feature phones run the GSM stack and other applications on a proprietary firmware, with no operating system, by using a single processor baseband processor. They also have a USB port which is used for connecting to a computer, thus acting as a terminal adapter from which the user sends AT commands. Smartphones have two processors: one is the baseband and the other is the application processor for the applications and the user interface. Each processor has its own memory allocation, no matter if there is a separate memory for each or a shared one. 4 Test case Like I specified before, this security issue has been discovered by a mistake, when playing with different binary messages. In order to make it easy for me to compose these binary messages, a few tools have been used. Also since I didn t have any hardware available for using the OpenBSC or OpenBTS, I just used the live networks. Since I wanted to keep the spending to minimum, I just chose a pay as you go plan for 5 EUR which has unlimited texting in the same network. 4.1 Tools used Here is the software and hardware that I used: - PDUspy for better understating the incoming message and building my own crafted message (available at 11
12 Figure 7 Overview of PDUSpy - Nokia 3310 with F-BUS USB cable I bought the cable on E-Bay Figure 8 Nokia 3310 with F-BUS cable attached - dct3tap command line utility (Linux) to capture the GSM Um and SIM-ME interfaces from a Nokia DCT3 phone (eg. 3310) and forward via GSMTAP to the Wireshark protocol analyzer. This tool has been created by Duncan Salerno and is available on 12
13 - Wireshark development release rc2 compiled and patched with GSMTAP and SIMCARD in order to decode GSM traffic and SIM access. Instructions on how to patch it can be found at - NowSMS Gateway for an easy way of sending messages and connection to an SMS provider by SMPP - Figure 9 Image from NowSMS showing the available connection types - Gemalto GemPC Twin reader for accessing the SIM - SIMinfo Python script for reading the SIM files (available at The attack I will not give the exact binary message that was sent, but describe why the issue is possible. First of all, it is important that the SIM to have the service data download via SMS Point-to-Point allocated and active. Also the SIM must have a SIM Toolkit Application on it 13
14 in order to work. Below you will find a table with the results from reading the SIM files with SIMinfo script. File readed result card reader Gemplus GemPC Twin B 9F F C A0 73 BE tries left (10 to unblock) 3 tries left (10 to unblock) 4 card ATR ICCID CVH1 CVH2 number of CHV/UNBLOCK CHV/ADM CHV1/PIN is disabled IMSI Kc [seq.] PLMN selector (user priority) forbidden PLMN user controlled PLMN operator controlled PLMN phase SIM service table - 1 CHV1 disable function - 2 Abbreviated Dialling Numbers (ADN) - 3 Fixed Dialling Numbers (FDN) - 4 Short Message Storage (SMS) - 5 Advice of Charge (AoC) - 6 Capability Configuration Parameters (CCP) - 7 PLMN selector - 8 RFU - 9 MSISDN - 10 Extension1-11 Extension2-12 SMS Parameters - 13 Last Number Dialled (LND) - 14 Cell Broadcast Message Identifier E C70D0 [2] 2 and PROFILE DOWNLOAD required 14
15 - 15 Group Identifier Level 1-16 Group Identifier Level 2-17 Service Provider Name - 18 Service Dialling Numbers (SDN) - 19 Extension3-20 RFU - 21 VGCS Group Identifier List (EFVGCS and EFVGCSS) - 22 VBS Group Identifier List (EFVBS and EFVBSS) - 23 enhanced Multi-Level Precedence and Pre-emption Service - 24 Automatic Answer for emlpp - 25 Data download via SMS-CB - 26 Data download via SMS-PP - 27 Menu selection - 28 Call control - 29 Proactive SIM administration data MS operation mode OFM (Operational Feature Monitor) length of MNC in the IMSI normal operation enabled 2 Table 4 Result of file reading on SIM where Data download via SMS-PP is present The type of message sent is addressed directly to the SIM, by setting the PID to 0x7F, corresponding to USIM Data Download, as you will see below. Also the DCS has to be a class 2 message type. According to GSM here is what happens when these are set10: If the service "data download via SMS Point-to-point" is allocated and activated in the SIM Service Table, then the ME shall follow the procedure below: - When the ME receives a Short Message with protocol identifier = SIM data download, and data coding scheme = class 2 message, then the ME shall pass the message transparently to the SIM using the ENVELOPE (SMS-PP DOWNLOAD) command. - The ME shall not display the message, or alert the user of a short message waiting. In other words, the phone will not display anything and the user will not be aware of this attack. Let s have a look at the secure command SMS header. One of its components is the Security Parameter Indicator (SPI). SPI is 2 octets long and it has the following structure: 10 ETSI GSM 11.14, December 1996, Version 5.2.0, page 33 15
16 Figure 10 Coding of the first SPI octet 11 Figure 11 Coding of the second SPI octet 12 The vulnerability is possible due to the second byte: here you can set how the proof of receipt (PoR) to be sent via SMS-DELIVER-REPORT or SMS-SUBMIT. When is set to be on SMS-SUBMIT the phone will try to send back a reply to the originated sender. If we set it to acknowledge the receipt via DELIVER REPORT, the phone will report to the network the status of the message. Since we don t have valid entries for the KIc, KID, 11 ETSI TS V8.9.0 ( ), page ETSI TS V8.9.0 ( ), page 13 16
17 TAR, the result of the STK command is an error so the report will be an error. The sending SMSC then thinks that the phone hasn t received the message and it will try again to send the message, putting on hold any other future messages that are supposed to be delivered, until the initial message expires. Below you will find a list of images taken from Wireshark indicating how the phone behaves when the special crafted message with PoR set to SMS-SUBMIT is sent. Figure 12 Capture from Wireshark showing the receipt of the STK message First, the message is received from the network 17
18 Figure 13 - Capture from Wireshark showing the receipt of the STK message As you can see, the PID is set to SIM Data download, DCS to SIM specific message class 2 and the Information Element has the STK headers. 18
19 Figure 14 - Capture from Wireshark showing GSM SIM packet Next the SIM prepares to send a reply message GSM ENVELOPE packet and sends it to the network. Figure 15 - Capture from Wireshark showing the automated SMS-SUBMIT Again, note the SIM Toolkit Security Headers. 19
20 Figure 16 - Capture from Wireshark showing GSM SIM packet with STK reply The most important proof: the SMS was sent automatically due to a SIM Toolkit operation and not due to a human intervention. SIM Application Toolkit provides Value Added Services for the mobile operators. Basically is a set of commands written on the SIM card which helps the card to communicate with the mobile device, making it possible to initiate commands independently of the network or handset. Figure 17 Communication between the phone and the SIM 13 Starting with the future phones, all of them are able to communicate via SIM Toolkit
21 Figure 18 Communication between the phone and the SIM 14 One of the best examples of the STK usage is the extra-menu that you see on your phone, from which you can find details about weather, recharge account, your bank account details, etc
22 Figure 19 - Capture from Wireshark showing report error In the above capture you can see what happens when the messages comes with the SPI byte having the POR set to DELIVER REPORT. First the phone receives the message (Network to MS) and reports to the network that there was an issue (CP-DATA (RP) RPERROR). Further the network believes that the phone was not able to properly receive the message and it will try over and over to send it, until it has expired. 5 Results and impact As stated before, by sending this crafted STK message we can make the phone send automatically a reply to the originated sender. Another behavior is that the phone will not be able to receive any messages until the malformed one expires. I first discovered the vulnerability somewhere in June 2010 and worked on better understanding it. Meanwhile on August I have reported the vulnerability to CERT (Computer Emergency Response Team) and they have assigned a CVE but it was not published yet. Details about this will be published on At the time of this writing I am still waiting for a reply from CERT regarding the date they will disclose it. An important thing to note is that the issue only works for the SIM cards that have SIM Application Toolkit (STK) / USIM Application Toolkit (USAT) implemented. Now more and 22
23 more operators have these kinds of cards due to the continuous development of the mobile banking, so it won t be so hard for an attacker to succeed. However, even with this limitation, the attack works no matter the phone you use or the mobile network GSM / UMTS. Tests have been made on different feature phones and smartphone and they all succeeded. Another thing that should be taken into consideration is that the type of message is addressed directly to the SIM. This means that the operator should allow the users to send this type of SMS, which normally only the mobile operator would send. In practice not many networks firewall the SMS, making it the perfect environment for an attacker since the SMS is always on. However, even if the operator would filter such messages, it would be possible to send the SMS if you have access to a SMSC. This brings us to a developed method of attack. When sending the message between different networks or the same network it doesn t have such a great financial impact. First of all, if you send the message to someone registered to the same operator as yours, most probably that person won t be charged extra due to the billing plan which most of the time offers you some messages within the network. If you send to someone registered on a different network, even internationally, it will cost you too much. The question is how can we create a considerable financial impact? The answer is to use a SMSC provider. There are plenty such providers over the Internet to which you can connect in different ways: by , HTTP, SMPP. The issue is that not all forward correctly the APDU packets to all or some mobile operators. During my research, after contacting about 10 different providers I found two that correctly forwarded the messages to the destination networks tested. It will take you some time, but in the end you ll find for sure one that works. Most of these providers allow you to change the sender number (address) to either numeric or alphanumeric and they have really good rates for SMS somewhere in the low euro cent area and even cheaper than the rates you have on your own operator. 23
24 Figure 20 Capture from NowSMS showing the options from SMPP connection Given all these, now we can send a spoofed binary message coming from Thailand. Since the command message sends the reply to the originated number, it will send the reply in Thailand, thus paying much more and making the user get a pretty expensive bill. Even so, the attacker won t gain any money. To overcome this, the attacker can easily get a premium rate number which will charge 10 EUR per message received. All that is left to do is to spoof the sender with the premium rate number he got. Now for only one message sent which is a few cents he gains 10 times more. This has a great impact on the users and it s not much they can do. How to protect from such attacks? There are a few ways: Mobile operators could filter command messages that are not coming from themselves. Even if it s a network protection, users not being protected if not all of the operators implement such security or in case someone comes with their own built network like OpenBTS / OpenBSC, I still consider it would be the best protection especially if we think about the premium rate numbers attack. Some mobile devices have the option to ask the user about SIM actions. If the option is set, when the phone will try to send the message it will ask to allow this. See some images about this configuration and how the phone behaves. Use a SIM card that has the service "data download via SMS Point-to-point" deactivated or one that doesn t have any Toolkit Application on it. 24
25 Use a Nokia DCT3 phone and stay always connected with the F-BUS cable and Wireshark opened (hard to make it always). However it s hard to answer such an ambiguous question as we don t have any information about the type of message, the content, the destination. Also some SIM cards are configured to automatically send a message to the network operator in order to receive settings for MMS and Internet access when they are put in a new device. Most probably the users will allow the phone to send the message. 25
26 References ETSI TS V7.5.0 ( ), page 13 ETSI TS V7.5.0 ( ), page 38 ETSI GSM 11.14, December 1996, Version 5.2.0, page 33 ETSI TS V7.5.0 ( ), page 42 ETSI TS V8.9.0 ( ), page 13 ETSI TS V8.9.0 ( ), page
@msecnet / www.m-sec.net. Bogdan ALECU
Business logic flaws in mobile operators services Bogdan Alecu About me Independent security researcher Sysadmin Passionate about security, specially when it s related to mobile devices; started with NetMonitor
Error and Confirmation Codes
Error and Confirmation s The following two tables list the error and confirmation codes that can be returned within SMS replies or notifications. Table 14: Error s 8 008 10 00A 21 015 27 01B 28 01C 29
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal Source: Gemplus, Oberthur, Schlumberger Title: Over-The-Air (OTA) technology Document for: Discussion and decision Agenda
Protocol of the Communication between SIM and mobile phone
Protocol of the Communication between SIM and mobile phone This protocol oft the layer 7 (application layer) and the layer 2 (data transmission layer) was made with an Siemens SL55 mobile phone in the
Insert a smart card and push the Test button, if the card is working you can see the reset response:
For extracting SIM-card data you need to have a working PC/SC compatible smart card reader. PC/SC is for chip card readers like Printer & Fax management for printers: it separates hardware from applications
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
SIM Toolkit In Practice
Bachelor Thesis SIM Toolkit In Practice August 27, 2012 Author: Supervisors: Sjors Gielen [email protected] Erik Poll Fabian van den Broek {erikpoll,f.vandenbroek @ cs.ru.nl Abstract This paper gives
Technical Specifications (GPGPU)
TS 131 116 V6.7.0 (2005-03) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Remote APDU Structure for (Universal) Subscriber
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
ETSI TS 121 111 V8.0.1 (2008-01) Technical Specification
TS 121 111 V8.0.1 (2008-01) Technical Specification Universal Mobile Telecommunications System (UMTS); USIM and IC card requirements (3GPP TS 21.111 version 8.0.1 Release 8) 1 TS 121 111 V8.0.1 (2008-01)
3GPP 21.11 V1.1.0 (1999-01) Third Generation Partnership Project (3GPP); USIM and IC Card Requirements TSGT3#1(99)032
TSG-Terminals Working Group 3 (USIM) meeting #1 Nice 25 th - 27 th January, 1999 TSGT3#1(99)032 Technical Report Third Generation Partnership Project (); USIM and IC Card Requirements 2 Reference
UNDERSTANDING SMS: Practitioner s Basics
UNDERSTANDING SMS: Practitioner s Basics Michael Harrington, CFCE, EnCE It is estimated that in 2006, 72% of all mobile phone users world wide were active users of SMS or text messaging. In European countries
SMS based remote control system
EE 318 Electronics Design Project Report, EE Department, IIT Bombay, April 2006 SMS based remote control system Ashish Deswal ( 03007020 ) Shaleen Harlalka ( 03007015 ) Arjun Arikeri ( 03007032 ) Ashish
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
Injecting SMS Messages into Smart Phones for Security Analysis
Injecting SMS Messages into Smart Phones for Security Analysis Collin Mulliner Deutsche Telekom Laboratories/ TU-Berlin [email protected] Charlie Miller Independent Security Evaluators [email protected]
SMS Application Note. SIM5360_SMS_Application_Note_V0.01
SMS Application Note 0 Document Title: SIM5360 SMS Application Note Version: 0.01 Date: 2014-02-21 Status: Document ID: Developing General Notes Simcom offers this information as a service to its customers,
Fuzzing the Phone in your Phone (Black Hat USA 2009)
Fuzzing the Phone in your Phone (Black Hat USA 2009) Collin Mulliner TU-Berlin / T-Labs [email protected] Charlie Miller Independent Security Evaluators [email protected] June
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Ozeki Message Server 6 Product Guide. Copyright, Ozeki Informatics Ltd. Number of pages: 185
Copyright, Ozeki Informatics Ltd. Number of pages: 185 Table of contents TABLE OF CONTENTS 1 INTRODUCTION 4 Terms of use 5 Summary of changes 6 About Ozeki Message Server 6 7 Package contents 8 Ozeki Message
Diafaan SMS Server 3.0 Manual. 2009-2015 Diafaan communication software
Diafaan SMS Server 3.0 Manual 2 Diafaan SMS Server 3.0 Manual Table of Contents Part I Welcome to Diafaan SMS Server 5 Part II Getting started 7 1 Gateways... and connectors 10 2 Add a... gateway 12 Add
Attacking SMS. BlackHat USA 2009. RingZero https://luis.ringzero.net
Attacking SMS BlackHat USA 2009 Zane Lackey ([email protected]) Luis Miras ([email protected]) Agenda SMS Background Overview SMS in mobile security Testing Challenges Attack Environment Attacks Implementation
Setting Up Message Notifications in Cisco Unity 8.x
CHAPTER 23 Setting Up Message Notifications in Cisco Unity 8.x See the following sections in this chapter: Overview of Message Notifications in Cisco Unity 8.x, page 23-1 Setting Up Text Message Notifications
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
GUIDING ROBOTS USING MOBILE PHONE
24th International Symposium on on Automation & Robotics in in Construction (ISARC 2007) Construction Automation Group, I.I.T. Madras GUIDING ROBOTS USING MOBILE PHONE Atish Kumar Patra Department of Electrical
Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Configuring connection settings Nokia E50 Configuring connection settings Legal Notice Copyright
ETSI TS 102 223 V9.0.0 (2009-10) Technical Specification. Smart Cards; Card Application Toolkit (CAT) (Release 9)
TS 102 223 V9.0.0 (2009-10) Technical Specification Smart Cards; Card Application Toolkit (CAT) (Release 9) 2 TS 102 223 V9.0.0 (2009-10) Reference RTS/SCP-T003r08av900 Keywords smart card 650 Route des
Study Paper on Security Accreditation Scheme for SIM
May 2014 MOBILE Study Paper on Security Accreditation Scheme for SIM TEC TELECOMMUNICATION ENGINEERING CENTRE KHURSHID LAL BHAWAN, JANPATH NEW DELHI - 110001 INDIA 1 Introduction... 4 2 Security Threats...
3GPP TS 31.220 V8.0.0 (2008-03)
TS 31.220 V8.0.0 (2008-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the Contact Manager for UICC applications
SMS Access and SMS Bedrift. Whitepaper
062009 SMS Access and SMS Bedrift Connection to the SMS Centre Whitepaper VERSION 2.3, JUNE 2009 VERSION 2.2 Contents +1 Abbreviations and terms... 4 2 General... 5 3 SMS transmission... 6 3.1 Transmission
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue
SAP Brief SAP Mobile Services SAP SMS Firewall 365 Objectives Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue Cloud-based managed service helps control messaging abuse Cloud-based
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
'HYHORSHU V*XLGH 606ZLWKWKH0
'HYHORSHU V*XLGH 606ZLWKWKH0 ,1752'8&7,21 6HUYLFH&HQWHU1XPEHU&6&$ 6HOHFW0HVVDJH6HUYLFH&606 6HOHFW0HVVDJH)RUPDW&0*) 606,17(;702'( 7H[W0RGH3DUDPHWHU&603 1.1 Text-Mode-Parameter First-Octet )2! 7 1.2 Text-Mode-Parameter
Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.
Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended
SIM Card Security. Sheng He 108005239797. Seminar Work. Chair for Communication Security Prof. Dr.-Ing. Christof Paar
SIM Card Security Sheng He 108005239797 Seminar Work at Chair for Communication Security Prof. Dr.-Ing. Christof Paar advised through Thomas Eisenbarth 12.07.2007 Ruhr-University of Bochum Contents 1 Overview...3
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
TCP Packet Tracing Part 1
TCP Packet Tracing Part 1 Robert L Boretti Jr ([email protected]) Marvin Knight ([email protected]) Advisory Software Engineers 24 May 2011 Agenda Main Focus - TCP Packet Tracing What is TCP - general description
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Network Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
NAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SHORT MESSAGE SERVICE (SMS) SECURITY SOLUTION FOR MOBILE DEVICES by Yu Loon Ng December 2006 Thesis Advisor: Co-Advisor: Gurminder Singh John Gibson
Voice Call Addon for Ozeki NG SMS Gateway
Voice Call Addon for Ozeki NG SMS Gateway Document version v.1.0.0.0 Copyright 2000-2011 Ozeki Informatics Ltd. All rights reserved 1 Table of Contents Voice Call Addon for Ozeki NG SMS Gateway Introduction
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Development Of An SMS Based Alert Systemusing Object Oriented Design Concept
Development Of An SMS Based Alert Systemusing Object Oriented Design Concept Adewale Adeyinka. A., Abdulkareem Ademola, Adelakun Adebiyi. A. Abstract: An automated lecture alert management system has been
Device Implementation Guidelines
Device Implementation Guidelines June 2013 Secure element architects for today s generation Device Implementation Guidelines 2 Document History Version Date Editor Remarks 1.1 07/06/2013 Handset Task Force
Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014
VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 Contents 1. Introduction 2. Summary 3. Mobile network scheme 4. GTP protocol 5. Searching for mobile operator
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
SMSFORUM. SMPP v3.4 Protocol Implementation guide for GSM / UMTS. Version 1.0
SMSFORUM SMPP v3.4 Protocol Implementation guide for GSM / UMTS Version 1.0 SMPP v3.4 Protocol Implementation guide for GSM / UMTS May 30 th 2002 Version 1.0 2001 SMS Forum COPYRIGHT All rights reserved.
SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.
SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing
Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Legal Notice Copyright Nokia 2006. All rights reserved. Reproduction, transfer, distribution
Technical documentation
Technical documentation HTTP Application Programming Interface SMPP specifications Page 1 Contents 1. Introduction... 3 2. HTTP Application Programming Interface... 4 2.1 Introduction... 4 2.2 Submitting
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
http://www.mobilesenegal.com
A d i Day Academic D on M Mobile bil Solutions S l ti for f Sénégal g 2010 http://www.mobilesenegal.com Dr. Christelle Scharff [email protected] Pace University Jean-Marie Preira [email protected] ESMT James
White Paper. Bearer Independent Protocol (BIP)
White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9
ETSI TS 102 226 V9.2.0 (2010-04) Technical Specification. Smart Cards; Remote APDU structure for UICC based applications (Release 9)
TS 102 226 V9.2.0 (2010-04) Technical Specification Smart Cards; Remote APDU structure for UICC based applications (Release 9) 2 TS 102 226 V9.2.0 (2010-04) Reference RTS/SCP-T02850v920 Keywords protocol,
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
QTEL MOBILE EMAIL CORPORATE EDITION
QTEL MOBILE EMAIL CORPORATE EDITION Overview With Qtel Mobile Email Corporate Edition, you ve got a secure, easy mobile email solution you can deploy across your entire organization, keeping your employees
A Silent SMS Denial of Service (DoS) Attack
A Silent SMS Denial of Service (DoS) Attack N.J Croft and M.S Olivier Information and Computer Security Architectures (ICSA) Research Group Department of Computer Science University of Pretoria Pretoria
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring the Forefront TMG HTTP Filter Abstract In this article I will show you how to configure
SIM900_Custom Application Building Tutorial_Application Note_V1.00
SIM900_Custom Application Building Tutorial_Application Note_V1.00 Document Title: SIM900 Custom Application Building Tutorial Application Note Version: 1.00 Date: 2010-9-16 Status: Document Control ID:
DO MORE WITH YOUR HOME PHONE
CALL 13 2200 VISIT A TELSTRA STORE telstra.com/homephone HOME FEATURES USER GUIDE DO MORE WITH YOUR HOME PHONE C020 JAN13 XXXXXXXX PHONE FEATURES THAT MAKE LIFE EASIER Our home features make it easy for
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
OpenBTS and the Future of Cellular Networks
OpenBTS and the Future of Cellular Networks Overview Range Networks is a new breed of network equipment provider. It is meeting the demand for low cost, easy to install GSM cellular networks for remote
Forensics and the GSM mobile telephone system
Forensics and the GSM mobile telephone system Abstract Svein Yngvar Willassen, M.Sc, Senior Investigator, Computer Forensics, Ibas AS The GSM system has become the most popular system for mobile communication
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
NovaTec release information firmware 00.06.07.00
NovaTec release information firmware 00.06.07.00 2 Known Issues None. The firmware now needs a valid firmware license to activate telephony functions. Without a valid license a system running firmware
1. Amendment of Section I. Invitation to Bid item no. 6 and 7 are hereby amended as follows: From:
Republic of the Philippines Department of Finance INSURANCE COMMISSION 1071 United Nations Avenue Manila BIDS AND AWARDS COMMITTEE SUPPLEMENTAL BID BULLETIN NO. 2 SUPPLY, DELIVERY, INSTALLATION AND COMMISSIONING
BUSINESS MOBILE PLUS AND BUSINESS MOBILE MAXIMISER PLANS
VISIT A TELSTRA STORE CALL 13 2000 OR YOUR ACCOUNT REPRESENTATIVE CLICK TELSTRA.COM/BUSINESS Exclusive business offers, ABN required. BUSINESS MOBILE PLUS AND BUSINESS MOBILE MAXIMISER PLANS XXXXXX MAR11
GSM GSM 02.67 TECHNICAL July 1996 SPECIFICATION Version 5.0.1
GSM GSM 02.67 TECHNICAL July 1996 SPECIFICATION Version 5.0.1 Source: ETSI TC-SMG Reference: TS/SMG-010267QR ICS: 33.060.50 Key words: Digital cellular telecommunications system, Global System for Mobile
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Smartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
SMPP protocol analysis using Wireshark (SMS)
SMPP protocol analysis using Wireshark (SMS) Document Purpose Help analyzing SMPP traffic using Wireshark. Give hints about common caveats and oddities of the SMPP protocol and its implementations. Most
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-
MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Quick Start Guide Now SMS/MMS Gateway
Quick Start Guide Now SMS/MMS Gateway This document is intended for new users of the Now SMS/MMS gateway, as a quick start toward a working installation. In this guide, we will perform the following steps:
Chapter 4 Customizing Your Network Settings
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.
SPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
