Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek



Similar documents
House intercoms attacks

Security in cellular-radio access networks

LTE and IMSI catcher myths

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

2G/3G Mobile Communication Systems

Mobile Office Security Requirements for the Mobile Office

The GSM and GPRS network T /301

Karsten Nohl, Chris Paget 26C3, Berlin GSM SRSLY?

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

introduction to femtocells

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

International Journal of Computing and Business Research (IJCBR)

Femtocells: A Poisonous Needle in the Operator s Hay Stack

Dirty use of USSD codes in cellular networks

How To Understand The Gsm And Mts Mobile Network Evolution

Global System for Mobile Communications (GSM)

Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim

GSM Risks and Countermeasures

A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

Security of phone communications

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Global System for Mobile Communication (GSM)

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Let Me Answer That For You: Exploiting Broadcast Information in Cellular Networks

A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications ABSTRACT

LTE security and protocol exploits

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Mobile Phone Security. Hoang Vo Billy Ngo

GSM and UMTS security

GSM Network and Services

How to hack your way out of home detention

Worldwide attacks on SS7 network

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

SS7 & LTE Stack Attack

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

How To Test Gsm Cell Phone Network On A Cell Phone

Mobile network security report: Poland

Mobile Phone Network Security

LTE Security How Good Is It?

Mobile network security report: Greece

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Global System for Mobile Communication Technology

GSM BASICS GSM HISTORY:

Mobile Communications

Mobile Wireless Overview

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

GPRS Network Security

@msecnet / Bogdan ALECU

4th European Tcl/Tk User Meeting. Tcl used for testing in the mobile world

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

Mobile network security report: Norway

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

GSM Architecture Training Document

SS7: Locate. Track. Manipulate.

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

Evaluating GSM A5/1 security on hopping channels

Authentication and Security in Mobile Phones

(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks

Defending mobile phones. Karsten Nohl, Luca Melette,

Cellular Network Organization

2 System introduction

Development of Wireless Networks

GSM System. Global System for Mobile Communications

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

Karsten Nohl, Breaking GSM phone privacy

Mobile network security report: Belgium

GSM security country report: Germany

GSM security country report: USA

IMSI Catchers and Mobile Security

Provides a communication link between MS and MSC; Manages DB for MS location. Controls user connection. Transmission.

Wireless Security: Token, WEP, Cellular

CS Cellular and Mobile Network Security: GSM - In Detail

Practical Attacks on DOCSIS

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Security and Authentication Concepts

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Mobile network security report: Netherlands

Security in the GSM Network

Mobile network security report: Poland

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Mobile network security report: Germany

2G Mobile Communication Systems

Network Infrastructure Security in Cellular Data Networks: An Initial Investigation

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Wireless Telecommunication Systems GSM, GPRS, UMTS. GSM as basis of current systems Satellites and

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

TETRA Security for Poland

Transcription:

Mobile Security Practical attacks using cheap equipment Presented the 07/06/2016 Business France By Sébastien Dudek For

Content Security measures Recent publications in the hacking community Practical attacks Results of our short researches

GSM and GPRS: confidentiality GPRS authentication algorithm A3/A8 Communication ciphered with A5/1 algorithm with a Kc key (derived from Ki) Kc is generated with the A8 Algorithm The Ki key is stored in the AuC (Authentication Center) and SIM (Subscriber Identity Module)

GSM and GPRS: architecture BTS: Base Transceiver Station BSC: Base Station Controller MSC: Mobile Switch Center VLR: Visitor Location Register HLR: Home Location Register AuC: Authentication Center

GSM and GPRS: Handover Source: article.sapub.org A stronger signal will likely attract User Equipments Useful for attackers

GSM and GPRS: few differences GPRS authentication SGSN Ciphering in GSM is done at Layer 1 on the TCH (Traffic Channel) and DCCH (Dedicated Control CHannel) Ciphering in GPRS is done at Layer 2 LLC (Logical Link Control) with GEA1 algorithm

GSM and GPRS: possible attacks No mutual authentication Fake rogue BTS Reuse of Authentication triplet RAND, RES, Kc many times Signaling channel not encrypted open for attacks Attacks on the A5/1 algorithm... Interception is possible on GSM and GPRS

3G/4G: advantages 3G came with the KASUMI encryption algorithm Then SNOW-3G second encryption algorithm for 3G, also used for 4G (in case KASUMI is broken) Additionally to SNOW-3G, 4G uses AES CBC 128 bits to cipher communications Thank to USIM 3G and 4G network use mutual authentication But accesses to 3G networks are possible with previous SIM card possible bypass of mutual authentication In 2011, ZUC algorithm has been introduced with 128 bits key Encryption algorithm is strong and mutual authentication make it difficult to intercept communications

Mobile interception: signal attraction A User Equipment connects to the closer Base Station 3G/4G downgrades to 2G via jamming attacks a simple Gaussian noise in targeted channels protocol attacks difficult baseband strange behaviors

State Of the Art: publications Many publications exist: Attacks on GSM A5/1 algorithm with rainbow tables (at 26c3, Chris Paget and Karsten Nohl) OsmocomBB (at 2010 at 27c3, Harald Welte and Steve Markgraf) Hacking the Vodaphone femtocell (at BlackHat 2011, Ravishankar Borgaonkar, Nico Golde, and Kevin Redon) An analysis of basebands security (at SSTIC 2014, Benoit Michau) Attacks on privacy and availability of 4G (In October 2015, Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi and Jean-Pierre Seifert) How to not break LTE crypto (at SSTIC 2016, Christophe Devine and Benoit Michaud)

State Of the Art: tools Hardware USRP from 700 (without daughter-boards and antennas) SysmoBTS from 2,000 BladeRF from 370 (without antennas) Software Setup a mobile network OpenBTS: GSM and GPRS network compatible with USRP and BladeRF OpenUMTS: UMTS network compatible with some USRP OpenLTE: LTE network compatible with BladeRF and USRP OpenAir: LTE network compatible with some USRP YateBTS: GSM and GPRS network compatible with USRP and BladeRF Analyze traffic libmich: Analyze and craft mobile packets captured with GSMTAP Wireshark: Analyze GSMTAP captured packets OsmocomBB: sniff and capture GSM packets

Passive attacks in GSM CCCH (Common Control Channels) give a lot of information Management messages, sometimes SMS in clear, TMSIs,... CCCH paging request can be exploited to locate someone Tools OsmocomBB, Airprobe,...

Capture a specific channel (1) List of ARFCN

Capture a specific channel (2) Leaked TMSI Use SMS Class-0 messages to track a user

GSM Lab setup: for interception 1 BladeRF = 370 2 Antennas = 15 each YateBTS software = FREE Total cost = 400

GSM interception: User Equipment behaviors A User Equipment decide to register to another base station if it can register to any MCC/MNC BTS close to it it can register to a test network close to it only the current used network isn t reachable anymore, even if a rogue base station is closer the signal is strong and the mutual authentication succeeded (not the case in GSM/GPRS) Everything depends on the mobile stack implementations...

Demo... Fake Base Station

Other vulnerable devices Interception of Intercoms

Results on intercoms On a Link idp GSM intercom leak of user phone numbers send Intercom specific commands send AT commands to interact with the targeted baseband update users with premium rated numbers (e.g: Allopass) Further work Reduce the model replacing the computed with a Raspberry Pi 3, or an ODROID device from about 50 Semi-automatic channel jamming on 3G Study of protocol attacks on 3G and 4G

3G 2G downgrade: hardware Downgrade is difficult with traditional jammers an attacker needs to focus to few specific bands bands of the targeted operators A simple HackRF can be used (340 )

Jamming video demo...

Alternatives to Jamming attacks Protocol attacks on 4G and 3G using OpenLTE for 4G, or Open-UMTS for 3G a compromized femtocell for 3G, and 4G femtocell thanks to serial port, or unsecure update

Lab setup: to find bugs 1 USRP: 700 2 daughter boards: about 120 each 2 TX and RX antennas: about 30 each OpenBTS Software: Free

Fuzzing lab in real

Fuzzing: our results Made a fuzzing test framework MobiDeke (not released publicly) Results found on a HTC Desire Z Found multiple application crashes Mostly Java exception not exploitable 1 exploitable vulnerability on SETUP CALLS handling used to compromize the baseband Presented at hack.lu conference in 2012 with Guillaume Delugré

Conclusion Attacks on GSM and GPRS are affordable: less than 1,000 Attacks 3G and 4G are difficult, but mutual authentication could be bypassed depending on the baseband implementation Publicly vulnerable femtocell can be found through Ebay (with serial ports, or unsecure download processes) The IoT ecosystem uses a lot GSM and 3G stacks (for example digital intercoms) vulnerable to the same attacks as traditional mobile devices