A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications



Similar documents
A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications ABSTRACT

GSM Network and Services

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Mobile Wireless Overview

Cellular Networks: Background and Classical Vulnerabilities

Topics in Network Security

Solution of Exercise Sheet 5

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

2G/3G Mobile Communication Systems

The GSM and GPRS network T /301

Mobile Office Security Requirements for the Mobile Office

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

GSM Risks and Countermeasures

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Tinfoil attack. A study on the security threats and weaknesses of GSM-based communication in BMW cars. Thijs Houtenbos, Jurgen Kloosterman

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

CISCO IOS NETWORK SECURITY (IINS)

SSL VPN Technology White Paper

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Network Configuration Settings

Security. TestOut Modules

Basics of Internet Security

Securing VoIP Networks using graded Protection Levels

Who is Watching You? Video Conferencing Security

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Security Requirements for Wireless Networking

CareGiver Remote Support Information Technology FAQ

Directory and File Transfer Services. Chapter 7

Jarkko Kuisma

Where every interaction matters.

Access Your Cisco Smart Storage Remotely Via WebDAV

General Packet Radio Service (GPRS)

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

SpiderCloud E-RAN Security Overview

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

How To Understand The Gsm And Mts Mobile Network Evolution

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

SS7 & LTE Stack Attack

Own your LAN with Arp Poison Routing

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Sophos Certified Architect Course overview

GregSowell.com. Mikrotik Security

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Protocol Security Where?

GPRS Network Security

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

Security issues in Voice over IP: A Review

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

How To Pass A Credit Course At Florida State College At Jacksonville

Locking down a Hitachi ID Suite server

Chapter 6 Wireless and Mobile Networks

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

8 Steps for Network Security Protection

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

8 Steps For Network Security Protection

International Journal of Computing and Business Research (IJCBR)

Chapter 11 Cloud Application Development

Cloud Security:Threats & Mitgations

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

LTE Overview October 6, 2011

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Mobile Application Part protocol implementation in OPNET

EE6390. Fall Research Report. Mobile IP in General Packet Radio System

Secure distribution of the device identity in mobile access network. Konstantin Shemyak senior security specialist, Nokia Siemens Networks

Windows Remote Access

Link Layer and Network Layer Security for Wireless Networks

ViewPoint Mobile Quick Start Guide

The Shift to Wireless Data Communication

CTS2134 Introduction to Networking. Module Network Security

CS5008: Internet Computing

Secure Sockets Layer

Linksys E2000 Wireless-N Router Configuration Guide

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Cornerstones of Security

Exam Questions SY0-401

TPR0439CX. Application Note. How to secure Femtocells using VaultIC TM Security Modules?

information security and its Describe what drives the need for information security.

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Why a Reverse Proxy with My Instant Communicator for mobiles??

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Transcription:

www.taddong.com A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications David Perez Jose Pico

Introduction It has been proved that GSM is vulnerable to multiple attacks (rogue base station, cryptographic, SMS, OTA, etc.) Rogue Base Station attacks have been demonstrated before against GSM, e.g.: PRACTICAL CELLPHONE SPYING. Chris Paget. DEF CON 18 (July 2010) http://www.defcon.org/html/defcon-18/dc-18- speakers.html

Introduction Is it possible to extend these attacks to GPRS/EDGE, i.e., to mobile data transmissions? If YES, what is the impact of such attack?

Introduction Objectives In this presentations we will show that GPRS/EDGE is also vulnerable to rogue base station attacks, just like GSM We will describe: The vulnerabilities that make this attack possible The tools that can be used to perform the attack How to perform the attack How to extend this attack to UMTS What an attacker can gain from it

GPRS/EDGE ARQUITECTURE

The vulnerabilities Lack of mutual authentication GEA0 support UMTS GPRS/EDGE fallback Just like GSM

The threats How many people, organizations, or, in general, entities, might be interested in eavesdropping and/or manipulating the mobile data communications of other entities, like competitors, nation enemies, etc? And how many of those potential attacking entities could dedicate a budget of $10,000 to this purpose?

The tools

We run all our tests inside a faraday cage, to avoid emissions into the public air interface (Um) The tools A real attacker won t need this, but...

The tools ip.access nanobts Commercial BTS GSM/GPRS/EDGE capable Manufactured by ip.acccess (www.ipaccess.com) IP-over-Ethernet Abis interface

The tools PC GNU/Linux OS Uplink to the Internet Small netbook is enough

The tools OpenBSC Awesome work from Harald Welte, Dieter Spaar, Andreas Evesberg and Holger Freyther http://openbsc.osmocom.org/trac/ [OpenBSC] is a project aiming to create a Free Software, GPL-licensed Abis (plus BSC/MSC/HLR) implementation for experimentation and research purpose. What this means: OpenBSC is a GSM network in a box software, implementing the minimal necessary parts to build a small, self-contained GSM network.

The tools OsmoSGSN Included in OpenBSC http://openbsc.osmocom.org/trac/wiki/osmo-sgsn OsmoSGSN (also spelled osmo-sgsn when referring to the program name) is a Free Software implementation of the GPRS Serving GPRS Support Node (SGSN). As such it implements the GPRS Mobility Management (GMM) and SM (Session Management). The SGSN connects via the Gb-Interface to the BSS (e.g. the ip.access nanobts), and it connects via the GTP protocol to a Gateway GPRS Support Node (GGSN) like OpenGGSN

The tools OpenGGSN Started by: Jens Jakobsen Currently maintained by: Harald Welte http://sourceforge.net/projects/ggsn/ OpenGGSN is a Gateway GPRS Support Node (GGSN). It is used by mobile operators as the interface between the Internet and the rest of the mobile network infrastructure.

Cell-phone jammer The tools Capable of jamming the frequency bands assigned to UMTS/HSPA in a particular location, while leaving the GSM/GPRS/EDGE bands undisturbed A mobile phone jammer is an instrument used to prevent cellular phones from from receiving signals from base stations. When used, the jammer effectively disables cellular phones. [Source: Wikipedia] Please note: even owning a jammer is illegal in some countries

The attack: initial setup

The attack: step 1 1 Cell characterization

The attack: step 2 2 Attacker starts emitting

The attack: step 3 3 Victim camps to rogue cell

The attack: step 4 4 Attacker gets full MitM control of victim s data communications

The attack in action iphone falls in the rogue base station trap

What happened?

Extending the attack to UMTS How can we extend this attack to UMTS devices?

Extending the attack to UMTS: Simply add step 0 0 Jam UMTS band

The impact Let us see what an attacker could gain from the attack...

Leveraging the attack: example 1 Attacker sniffs a google search from an iphone

What happened?

Leveraging the attack: example 2 Phising attack against an ipad (http version)

What happened?

Leveraging the attack: example 3 Phising attack against an ipad (https version)

What happened?

Leveraging the attack: example 4 Attacker takes over a Windows PC via GPRS/EDGE

What happened? remote desktop user / password

Leveraging the attack: example 5 Attacking a 3G Router in order to control the IP traffic of all devices behind it

What happened?

Leveraging the attack: example 6 Attacking other GPRS/EDGE devices

What happened? FTP

Defending ourselves So, what can we do to protect our mobile data communications?

Countermeasures Configure our mobile devices to only accept 3G service, rejecting GPRS/EDGE Encrypt our data communications at higher layers (https, ssh, IPsec, etc.) Install and configure firewall software in our mobile devices

Summing up (I) A rogue base station attack against GPRS/EDGE devices is totally feasible, just as it is against GSM devices

Summing up (II) This kind of attack gives an attacker a privileged position to launch IP-based attacks against a GPRS/EDGE device......or even to attack the GPRS/EDGE stack itself

Summing up (III) The attack can be extended to UMTS by simply using a jammer Effective against any 3G device configured to fall back to GPRS/EDGE when UMTS is not available

Conclusion We must protect our GPRS/EDGE mobile data communications: Know the vulnerabilities Evaluate the risks Take appropriate countermeasures

Thank you! David Perez david@taddong.com Jose Pico jose@taddong.com