@msecnet / www.m-sec.net. Bogdan ALECU



Similar documents
SMS Fuzzing SIM Toolkit Attack

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

SHORT MESSAGE SERVICE SECURITY

How to make the s you Send with Outlook and Exchange Appear to Originate from Different Addresses

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

FMC VoIP. User Manual. OfficeServ 7000

Worldwide attacks on SS7 network

SIP and VoIP 1 / 44. SIP and VoIP

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

EE4607 Session Initiation Protocol

WE VoIP User Guide For OfficeServ 7000 Series

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N Rev 003 Issue 1

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Using your Encrypted BlackBerry

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Networking for Caribbean Development

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Lawful Interception in German VoIP Networks

Lucent VPN Firewall Security in x Wireless Networks

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Link Gate SIP. (Firmware version 1.20)

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Quick Start Guide v1.0

INTRODUCTION TO FIREWALL SECURITY

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

Guideline for setting up a functional VPN

1. Mobile VoIP solutions and Services:

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

White Label Mobile AG, Liechtenstein

Global System for Mobile Communication Technology

Securing SIP Trunks APPLICATION NOTE.

WIRELESS ALARM MONITORING. User Manual V1.2

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

8x8 Virtual Office Mobile User Guide for iphone

WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

CanMobile. CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions:

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

Setting Up Message Notifications in Cisco Unity 8.x

User Manual. Vogue2.8-D6

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

8x8 Virtual Office Mobile User Guide for ios

Deploying iphone and ipad Mobile Device Management

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

ABC SBC: Charging and Accounting. FRAFOS GmbH

Injecting SMS Messages into Smart Phones for Security Analysis

Harness The Power of Hosted VoIP

ETM System SIP Trunk Support Technical Discussion

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

DTK Overview. Zendesk Connector. Abstract DTK Zendesk connector overview and configuration document.

Installation and setup guide V 1.0

Broadband Phone Gateway BPG510 Technical Users Guide

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Chapter 11 Cloud Application Development

WAN Data Link Protocols


Media Gateway Controller RTP

CTS2134 Introduction to Networking. Module Network Security

Functional Specifications Document

User Manual. Version Yeastar Technology Co., Ltd.

ENTERPRISE DATA CENTER CSS HARDWARE LOAD BALANCING POLICY

SS7 & LTE Stack Attack

Vulnerability Scan. January 6, 2015

ZTE Australia Help Guides MF91

CS 356 Lecture 16 Denial of Service. Spring 2013

UIP1868P User Interface Guide

Proxy firewalls.

Fig : Packet Filtering

Recommended IP Telephony Architecture

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

PRImaGate Switch RACK 3U

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Security of IPv6 and DNSSEC for penetration testers

ipecs Communicator Installation and Operation Guide Please read this manual carefully before operating your set. Retain it for future reference.

VoIP telephony over internet

Intro to Firewalls. Summary

IP Filtering for Patton RAS Products

HELSINKI UNIVERSITY OF TECHNOLOGY NETWORKING LABORATORY. Assignment 2: sipspy Jegadish.D 1

UX5000 with CommPartners SIP Trunks

Wave SIP Trunk Configuration Guide FOR BROADVOX

Back, start, and search key Lock the keys and screen Unlock the keys and screen Set the keys and screen to lock automatically...

Ozeki Message Server 6 Product Guide. Copyright, Ozeki Informatics Ltd. Number of pages: 185

SIP : Session Initiation Protocol

P2P VoIP for Today s Premium Voice Service 1

Avaya IP Office 8.1 Configuration Guide

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Service Descriptions

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Xorcom IP-PBX Software Features

Application Note 24. Making and receiving GSM Circuit-Switched Data Calls (CSD). Applies to routers with Siemens wireless WAN modules only.

GSM Diallers - How to Use and Install the Rebel Simii Dialler

Transcription:

Business logic flaws in mobile operators services Bogdan Alecu

About me Independent security researcher Sysadmin Passionate about security, specially when it s related to mobile devices; started with NetMonitor (thanks Cosconor), continued with VoIP and finally GSM networks / mobile phones @msecnet / www.m-sec.net

GOALS o SIM Toolkit: what is it, how can we exploit it o Understanding of business logic flaws in mobile operators services o What you should do in order to protect from these attacks

TOPICS 1. 2. 3. 4. 5. SIM TOOLKIT HTTP HEADERS DATA TRAFFIC VULNERABILITY THE EXTRA DIGIT SUMMARY

1 SIM TOOLKIT

1 SIM TOOLKIT Example of SIM Toolkit icon on your mobile device

1 SIM TOOLKIT For sending Ringtones, operator logo, concatenated messages, SMS makes use of the User Data Header

1 SIM TOOLKIT ETSI TS 101 181 V8.9.0

1 SIM TOOLKIT The type of message sent is addressed directly to the SIM, by setting the PID to 0x7F, corresponding to USIM Data Download and by setting DCS to F6

1 SIM TOOLKIT then the ME shall pass the message transparently to the SIM shall not display the message, or alert the user of a short message waiting ETSI GSM 11.14

1 SIM TOOLKIT Security Parameter Indicator

1 SIM TOOLKIT

1 SIM TOOLKIT UDH (User Data Header): 027000 PID (Protocol ID): 7F DCS (Data Coding Scheme): F6 000e0d00210000b20000aabbccddee00 CPL CHL SPI SPI KIc KID 00100001 TAR CNTR

1 SIM TOOLKIT

1 SIM TOOLKIT SIM card automatically replies to the sending number Nothing in Inbox, Outbox only on your bill

1 SIM TOOLKIT LET S SEE IT IN ACTION!

2 HTTP HEADERS

2 HTTP HEADERS Mobile operators have their own WAP / WEB page for customers: Balance check Money transfer Download music, videos, wallpapers Subscribe to services (eg. custom ringback tones)

2 HTTP HEADERS

2 HTTP HEADERS User Agent Switcher https://addons.mozilla.org/enus/firefox/addon/user-agent-switcher/

2 HTTP HEADERS Operators know who to charge based on HTTP headers Sniff the traffic your phone does and look for the headers having mobile number Privacy Leaks in Mobile Phone Internet Access by Collin Mulliner

2 HTTP HEADERS 8/12/201

2 HTTP HEADERS The old fashioned way of the attack

2 HTTP HEADERS CSD (Circuit Switched Data) Think about it like dial-up Since it involves actually placing a phone call, it is exposed to the same vulnerabilities like a regular call

2 HTTP HEADERS

2 HTTP HEADERS DEMO TIME!

3 Data traffic vulnerability

3 MOBILE DATA TRAFFIC What happens when you reach data limit? Have you ever tried to perform a DNS query?

3 MOBILE DATA TRAFFIC But what if you setup a VPN server listening on port 53 UDP (DNS port) connect to this server and route all the traffic

3 MOBILE DATA TRAFFIC Internet traffic Works also in Roaming!

4 The extra digit

4 THE EXTRA DIGIT Do you have a flat-rate plan with unlimited minutes in the operator s network?

4 THE EXTRA DIGIT Do not try this at home! Take a ported number that was in your network Add two more digits to the end of the number Place the call You will be charged like calling in your network

4 THE EXTRA DIGIT

4 THE EXTRA DIGIT If that does not work - try with one digit, all the digits - divert all calls to that number, but add a digit at the end of it

5 Summary

5 Summary S U m m a ry Our technology does not allow unauthorized access. Occurrence of errors in billing regarding data traffic or voice is excluded.

5 Summary S u m m a ry o Test yourself and report the issues to your carrier o Check if your carrier allows you to disable access to premium rate services

5 Summary S u m m a ry o Filter SIM command messages o Do not rely only on the caller ID o Always authenticate, do not forget about privacy

THANK YOU FOR YOUR ATTENTION msecnet www.m-sec.net alecu@m-sec.net