Mobile Phone Network Security



Similar documents
GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Mobile network security report: Poland

Mobile network security report: Belgium

GSM security country report: USA

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

GSM security country report: Germany

SS7: Locate. Track. Manipulate.

Mobile network security report: Netherlands

Mobile network security report: Poland

Mobile network security report: Germany

How to hack your way out of home detention

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME

How To Understand The Gsm And Mts Mobile Network Evolution

Security in cellular-radio access networks

GSM and UMTS security

UMTS security. Helsinki University of Technology S Security of Communication Protocols

GSM Risks and Countermeasures

SPYTEC 3000 The system for GSM communication monitoring

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim

IMSI-Catch Me If You Can: IMSI-Catcher-Catchers

Mobile network security report: Greece

Worldwide attacks on SS7 network

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Defending mobile phones. Karsten Nohl, Luca Melette,

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

Global System for Mobile Communication Technology

An Example of Mobile Forensics

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Mobile network security report: Norway

LTE security and protocol exploits

A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications ABSTRACT

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

2G/3G Mobile Communication Systems

9.1 Introduction. 9.2 Roaming

LTE Overview October 6, 2011

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor

Mobile Communications

LTE Security How Good Is It?

Delivery of Voice and Text Messages over LTE

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Chapter 6 Wireless and Mobile Networks

Using TEMS Pocket. Johan Montelius

introduction to femtocells

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

LTE and IMSI catcher myths

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

ETSI TS V ( )

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Protocol Signaling Procedures in LTE

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

GSM services over wireless LAN

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

Chapter 2 Mobility Management for GPRS and UMTS

ETSI TS V6.5.0 ( )

General Packet Radio Service (GPRS): Mobility- and Session Management

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Customer Training Catalog Training Programs WCDMA RNP&RNO Technical Training

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Mobile Phone Security. Hoang Vo Billy Ngo

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/ ; Suresh.Leroy@alcatel.be +32/3/ ; Guy.Reyniers@alcatel.

Security of phone communications

ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices

Mobile Wireless Overview

Basic Network Design

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Wireless Security: Token, WEP, Cellular

OpenBTS and the Future of Cellular Networks

Topics in Network Security

Advanced SIP Series: SIP and 3GPP Operations

2 System introduction

The GSM and GPRS network T /301

Agilent Network Monitoring Content Intercept Manager

ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks

2G Mobile Communication Systems

(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks

Minimization of Drive Tests (MDT) in Mobile Communication Networks

SS7 & LTE Stack Attack

Department of Public Safety and Correctional Services. Non-Jamming Cell Phone Pilot Summary

RADIUS. Brief brochure. Product Purpose

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

ENGN4536 Mobile Communications

CS Cellular and Mobile Network Security: GSM - In Detail

Product Description. HiLink E3531 HSPA+ USB Stick V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Mobility and cellular networks

Mobile self- defense. Karsten Nohl SRLabs Template v12

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

ETSI TS V3.1.0 ( )

Transcription:

Mobile Phone Network Security Internet Security [1] VU Adrian Dabrowski, Markus Kammerstetter, Georg Merzdovnik, Stefan Riegler and Aljosha Judmayer inetsec@seclab.tuwien.ac.at

Mobile phone networks 1G Not standardized 2G (GSM) From 1980es Introduced SIM Started as CS, now PS 3G (UMTS) From 1990es 4G (LTE) From 2000nd Planes User Plane Voice, Data, SMS Signaling Plane Call setup,... Management Plane Network organization

Structure of a 2G/3G System Source: LTE Security Dan Forsberg

Legend User Equipment (UE) Radio Access Network (RAN) Core Network (CN) Universal Terrestrial Radio Access Network (UTRAN) GSM/EDGE Radio Access Network (GERAN) GPRS Support Node (SGSN) Gateway GPRS Support Node (GGSN) Mobile Switching Centre (MSC)

Radio Layer Physical Channels!= Logical Channels Broadcast Channels Carry Beacon Information Paging & signaling to idle devices Unencrypted Dedicated Channels Communication to a specific UE(ME). Often encrypted

GSM Encryption A5/0 No encryption, banned from many networks (i.e. Tmobile Austria) A5/1 Standard today A5/2 Export Version, broken 199 A5/3 + 4 Backport of UMTS Katsumi based cipher

GSM Encryption

IMEI IMSI - TMSI International Mobile Equipment Identifier The phone International Mobile Subscriber Identifier The SIM card (i.e., the user) Temporary Mobile Subscriber Identifier A temporary UserID / SessionID (should) Prevent tracking since signaling plane is unencrypted

Attacks: TMSI deanonymization TMSI deanonymization Record Paging Traffic Call known Number, hangup before full channel setup (=before starts ringing) Use set of recorded pages to filter candidates Aka sieve Repeat until one candidate left

Attacks: Internet interconnectivity GPRS tunneling over Internet Publicly reachable tunnel endpoints have been found via port scanning at several Telcos DNS infrastructure, e.g., epc.mncxxx.mccxxx.3gppnetwork.org

Attacks: SIM Cloning COMP128 weakness Key derivation algorithm Secret key recovery by analyzing thousands of responses SIM card cloning Used via programmable multi-sims and development SIM cards

Attacks: Decryption GSM Cipher Rainbow tables available (~2TB) Decode session key (eavesdropping) In seconds...

Attacks: SS7 SS7 Attacks Signaling System 7 Signaling Backbone within and between many Telcos Telcos fully trust each other e.g. Anytime Interrogation Find cell ids (=location) of any phone Share Session key in case of roaming, etc Works also without roaming

Attacks: IMSI Catchers aka Stingray Used for Tracking users Eavesdropping calls, data, texts Man-in-the-Middle Attack phone using operator system messages (e.g. Management Interface, reprogram APN, HTTP-Proxy, SMS/WAP-Server...) Attack SIM (c.f. SIM card rooting, otherwise filtered by most mobile carriers), Attack Baseband Geotargeting ads (e.g. SMS) Intercept TAN, mobile phone authentication,

A Mobile Network

A Mobile Network with a Mobile Station

Location Areas

A wild IMSI Catcher appears..

A wild IMSI Catcher appears Use UMTS/GSM Protocol; not very effective!

A Real Network Source: Let me answer that for you, Golde et al., TROOPERS & USENIX

Cell tower density Source: Sendekataster.at

IMSI Catchers Identification only Retrive IMSI / IMEI / TMSI Reject Location Update Tracking UMTS downgrade Blocking UMTS transmission Spoofing System messages Traffic Man-in-the-Middle Hold in Cell Actively intercept traffic Relay to real network Active or passive decryption Hold but intercept passively Imprison in cell, so phone is not lost to a neighbor cell

IMSI Catchers Source: Verfassungsschutz (via DuD 26, 2006)

IC: Car Installation Source: Gamma Group

IC: Car Installation Source: Gamma Group

Car Installation Source: Gamma Group

IC: Car Installation Source: Gamma Group

IC: Car Installation Source: Gamma Group

Body IMSI Catcher Source: Gamma Group

Only for Law Enforcement? Known Producers Rohde & Schwarz Gamma Group Ability IAI Elta Septier Meganet NeoSoft Proximus Cyttek DIY USRP based Kirstin Paget DEFCON 19 US$1,500 D. Werhle Master's Thesis Freiburg B. Postl Master's Thesis Vienna

How to catch an IMSI Catcher?

Artifact: Frequency Unused or guard channel Only found in Full Scan Announced neighbor freq., but unused Careful not to create interference Detactability Frequency plans e.g. radio regulatory Self created

Artifact: Cell ID New CID/LAC needed To provoke Location Update Request Random? Use real one not used in that geographical region Detectability Cell IDs are very stable Cell Database (local) Also for frequencies Correlation with GPS coordinates

Artifact: Location Update / Register Just providing a better signal Is not enough Timers, Hysteresis Unpredictable radio environment RF Jamming? Forcing full scan Detectability: Watching noise levels

Artifact: UMTS handling Downgrading to GSM e.g. Mayer and Wetzel, 2005 [1] Detectability: Noise and Signal levels GSM layer in most Database of deployed UMTS networks regions where UMTS is available, (selectively) and GSM usage is Jamming unlikely Downgrade LUR Cell Database Others... [1] Mayer and Wetzel, A man-in-the-middle attack on UMTS, ACM Workshop on Wireless security, 2005

Downgrade 4G 3G 2G Pre-authentication traffic is unprotected - includes GET_IDENTITY (IMSI, IMEI) Location Updates can be rejected unauthenticated Needed for Roaming case Reject cause: You don't have a subscription for this service

Encryption Older IMSI Catchers: Downgrade encryption to Detectability: Cipher Indicator 'none' (A5/0) Feature request A5/1 and A5/2 can be in Android, 2009, decrypted with rainbow assigned 2013 tables Roaming! In realtime A5/3 rolled out at the moment IC will have to do active MITM again

Artifact: Cell Imprisonment Networks provides up to 32 neighbor frequencies MS stores typ. 6+1 Used for hand overs, LAR, IC will likely provide an empty (eq.) NL To not loose phone to a neighbor cell Detectability: Neighbor cell list

Traffic forwarding a) relay via other MS Loose caller ID No incoming calls b) via SS7 or similar Caller ID correct Loose incoming calls c) recover secret SIM key Impersonate to network with victims identity Detectability: Call tests (?)

Usage Pattern Identification Mode Short living cells MITM Mode Longer living cells Both: Unusual locations for cells

Cell capabilities and parameter fingerprinting Cell capabilities & parameters Organization of logical channels on physical channels Timeout values Can be different on each cell, but typically they are the same over the whole network Differ between networks Detectability: Cell and network database

Network Monitor Mode 9731-3006-8132-3476-9712

Detection Matrix

Two approaches Mobile IMSI Catcher Catcher Standard Android API No need to root phone No need for a specific chipset (e.g. GoldX) Easy Interface Stationary IMSI Catcher Catcher Network of measuring stations Good locations, larger coverage Cheap RaspberryPi based

Mobile IMSI Catcher Catcher

Two approaches - Features Mobile IMSI Catcher Catcher GPS + Neighbor cell listing Geographical correlation Cell-IDs Cell Capabilities RF and NCL manipulations Limited to NCL but mobile Stationary IMSI Catcher Catcher Cell-ID mapping Frequency usage Cell lifetime Cell capabilities, network parameters Jamming

Stationary IMSI Catcher Catcher

WIP: Network operator has no global view Currently in a project with a major Austrian carrier Finding IMSI Catcher based on operator data Network operator has no global view Some transactions are designed decentralized One transaction can leave trace on many levels/protocols 2G/3G/4G interaction grown historically Monitoring solutions have to carry high load e.g. > 100K LUR/min but still extract and correlate data meaningfully

Work in Progress Verified with USRP based IMSI Catcher Need commercial devices for testing Build dense measurement network Goal: 20-40 stations Implement 3G + LTE Android-APP Fine tune ruleset for everyday situations Problem zones: Tunnels Underground

(Bachalor's and Master's) Thesis' opportunities Port 2G broadcast sniffing to FPGA (BladeRF) Implement 3G GNU Radio, SDR Implement 4G GNU Radio, SDR Implement client stack More ideas? Contact: dabrowski@seclab.tuwien.ac.at