How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph



Similar documents
introduction to femtocells

Femtocells: A Poisonous Needle in the Operator s Hay Stack

Dirty use of USSD codes in cellular networks

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications ABSTRACT

Security Requirements for Wireless Networking

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

Designing federated identity management architectures for addressing the recent attacks against online financial transactions.

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Topics in Network Security

VoIP Security regarding the Open Source Software Asterisk

SS7 & LTE Stack Attack

Worldwide attacks on SS7 network

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

74% 96 Action Items. Compliance

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

SpiderCloud E-RAN Security Overview

ICANWK406A Install, configure and test network security

Mobile Office Security Requirements for the Mobile Office

Introducing STAR-GATE Enhancements for Packet Cable Networks

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Recommended IP Telephony Architecture

A Guide to New Features in Propalms OneGate 4.0

Mobile Voice Off-Load

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)

UMTS security. Helsinki University of Technology S Security of Communication Protocols

MaaS360 Mobile Service

Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunication

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Upcoming Enhancements to LTE: R9 R10 R11!

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, Academic Research Journals.

Building A Secure Microsoft Exchange Continuity Appliance

Mobile Communications TCS 455

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Network Services Internet VPN

STABLE & SECURE BANK lab writeup. Page 1 of 21

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

What is Web Security? Motivation

GSM v. CDMA: Technical Comparison of M2M Technologies

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

3GPP TS V9.0.0 ( )

SIGNALING SYSTEM 7 (SS7) SECURITY REPORT

Xerox Mobile Print Cloud

Dell NetReady Mobile Broadband Service User's Guide

Certified Ethical Hacker Exam Version Comparison. Version Comparison

what does it mean for the mobile professional?

On LTE Security: Closing the Gap Between Standards and Implementation

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Optus SMS for MS Outlook and Lotus Notes

Canopy Wireless Broadband Platform

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Mobility and cellular networks

information security and its Describe what drives the need for information security.

Mobile network security report: Poland

The Hidden Dangers of Public WiFi

Cornerstones of Security

Mobile Wireless Overview

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Authentication and Security in Mobile Phones

How To Secure An Rsa Authentication Agent

The Benefits of SSL Content Inspection ABSTRACT

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Security and Vulnerability Testing How critical it is?

A Framework for Secure and Verifiable Logging in Public Communication Networks

The Trivial Cisco IP Phones Compromise

SIP Roaming Server Product Overview. Mobile Convergence Technology

CTS2134 Introduction to Networking. Module Network Security

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Avaya TM G700 Media Gateway Security. White Paper

Security and Risk Analysis of VoIP Networks

Avaya G700 Media Gateway Security - Issue 1.0

How To Protect A Web Application From Attack From A Trusted Environment

Internet Banking System Web Application Penetration Test Report

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

GPRS and 3G Services: Connectivity Options

Cisco Advanced Services for Network Security

HMS Industrial Networks. Putting industrial applications on the cloud

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure

Introduction to the EIS Guide

Potential Targets - Field Devices

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

Windows Remote Access

SonicWALL PCI 1.1 Implementation Guide

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Transcription:

. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011

3G/UMTS femtocells HNB Subsystem (HNS) mobile telecommunication history 0G - 1950 : not so handy 1G - 1980 : similar to 2G, but with analog voice (like in PSTN) 2G - 1991 : GSM in Europe, CDMA in the USA. Very successful,... and now broken 2.5G : GPRS. Packet Switching capability 3G - 2002 : UMTS in Europe, CDMA 2000 in the USA. Usable mobile Internet 3.5G : HSDPA, faster download. 3.75G : HSUPA, faster upload. 3.9G : LTE/WiMAX 4G : LTE-Advanced, WiMAX 2 : Higher bandwidth, no Circuit Switching R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 2 / 33

3G/UMTS femtocells HNB Subsystem (HNS) UMTS architecture (simplified) R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 3 / 33

3G/UMTS femtocells HNB Subsystem (HNS) UMTS architecture (complex) R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 4 / 33

3G/UMTS femtocells HNB Subsystem (HNS) cells R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 5 / 33

3G/UMTS femtocells HNB Subsystem (HNS) technology What is a femtocell : it's an access point (sometimes called FAP) it connects the mobile phone to the 3G/UMTS network compatible with every UMTS capable mobile phone small cells, with a coverage of less than 20m low power device easy to install, you only have provide power and Internet access technical name : Home Node B (HNB) R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 6 / 33

3G/UMTS femtocells HNB Subsystem (HNS) user advantages advantages provided to the users : can be installed at home to provide coverage (if not available) provides high bandwidth (not shared with the public) can provide location based services (kids arrived at home) but nothing Wifi can not provide for free, except you don't have to configure the phone. R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 7 / 33

3G/UMTS femtocells HNB Subsystem (HNS) operator advantages advantages for the operator : extended coverage, near to the users traffic offloads from their public infrastructure cheap hardware, that the user even has to buy no installation cost no maintenance cost new revenue possibilities IP connectivity conclusion : femtocells are a great opportunity for the operators. R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 8 / 33

3G/UMTS femtocells HNB Subsystem (HNS) HNB in UMTS network R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 9 / 33

3G/UMTS femtocells HNB Subsystem (HNS) HNB Subsystem R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 10 / 33

ordering location verification final solution requirements How to get a femtocell: choose a country from the 12 which deploy them get an address and IP from this country, because usage in only allowed within the country select an operator from the 18 which offer them get a mobile phone subscription from this operator, required to get the femtocell service gently ask for a femtocell get it for free, one time payment, or monthly fee enjoy R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 11 / 33

ordering location verification final solution requirements Location verification operators have to verify where the femtocell is, for several reasons: prevent you to avoid roaming costs in foreign countries UMTS uses the 2.1 GHz freq. band, a licensed spectrum band. The operators own the radio licenses for the femtocell only for their country location of the users is required for lawful interception R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 12 / 33

ordering location verification final solution techniques How to find were the femtocell is located: IP : geoip, even knowing the ISP is enough GNSS : GPS macrocell : cells bacon county, network, and location information (MCC, MNC, LAC) R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 13 / 33

ordering location verification final solution attacks R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 14 / 33

ordering location verification final solution R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 15 / 33

blind dating recovery to failure customizing under the hood R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 16 / 33

blind dating recovery to failure customizing network testing first approach : sniffing only DHCP,and NTP. Then everything goes over IPsec probing ports (nmap) only port 80 is open linux has been detected, but the source code is not public web interface available protected access, no documentation, even the customer service was unaware serial port found on PCB login prompt not enabled First impression : the device is secure. But the first impression is not the last impression. R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 17 / 33

blind dating recovery to failure customizing recovery mode and purpose critical point : the recovery procedure remember : keep femtocells cheap no maintenance cost no local support So if something does not work right, do a factory reset. For that, the recovery procedure has been created. R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 18 / 33

blind dating recovery to failure customizing process overview R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 19 / 33

blind dating recovery to failure customizing flaws and exploits ➀ flaws : recovery image is downloaded over HTTP credentials are in plain text normally the image is encrypted, but modified URL will return unencrypted version image is still signed. it can't be altered, but viewed exploit : the recovery process can be analyzed R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 20 / 33

blind dating recovery to failure customizing flaws and exploits ➂ flaws : integrity of parameter and image list relies only on HTTPS file is not signed HTTPS uses authentication, but not mutual exploit : you can provide your own lists R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 21 / 33

blind dating recovery to failure customizing flaws and exploits ➄ flaws : real name of the files are in the image list encryption keys are in the image list exploit : you can get an decrypt the images R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 22 / 33

blind dating recovery to failure customizing reconfigure the parameter list contains some interesting values : the login prompt for the serial port can be enabled the root password is the same then in the recovery image, stored in md5 the public key used to verify the signatures is in there it's possible to clone femtocells (except the SIM) [General] pcbid=p04s... imei=357539... mac=00:1b:67:... hwflag=2 serial=p04s... [BootSigning] pubkey=ee:17:c5:f2:... R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 23 / 33

blind dating recovery to failure customizing reflash you can provide your own image list : the URLs, encryption keys and signatures are in there your can provide your own images your can use the previously obtained images, and modify them now it's possible to install anything R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 24 / 33

blind dating recovery to failure customizing web interface found while analyzing the images : credentials for web interface are in a local database the previously discovered interface is provided by the operator. it only contains the status and subscriber list a hidden web interface is provided by the vendor. it contains the complete configuration the hidden web pages can be accessed without authentication R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 25 / 33

look around play locally HNS services use the femtocell to explore behind the security gateway : Performance Measurement server : stores the femtocell activity OAM server : used to update the femtocell HMS server : used to configure and provision the femtocell R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 26 / 33

look around play locally Reconfiguration you can change the femtocell settings : disable macrocell sniffing add phone to the subscriber list provide own security gateway change cell configuration R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 27 / 33

past future present significance of the attacks privacy threats - recording phone calls, SMS.. R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 28 / 33

past future present significance of the attacks eavesdropping accessing infrastructural elements R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 29 / 33

past future present threat list Attacks, effects, and impact are documented in the 3GPP femtocell standard (TR 33.820) group threat impact Fraudulent software update / configuration changes Compromise of HNB Physical attacks on a Compromise of HNB authentication Booting HNB with fraudulent software Credentials HNB token by local physical intrusion ( re-flashing ) Harmful up to disastrous Extremely harmful Configuration attacks Mis-configuration of HNB Irritating to harmful on a HNB Mis-configuration of access control list (ACL) or compromise of the access Irritating to harmful control list Protocol attacks on a HNB Man-in-the-middle attacks on HNB first network access Compromise of an HNB by exploiting weaknesses of active network services Manipulation of external time source Threat of HNB network access Changing of the HNB location without reporting Attacks on the core Misconfiguration of the firewall in the network, including HNB modem/router location-based attacks HNB announcing incorrect location to the network User Data and identity User s network ID revealed to Home privacy attacks (e)nodeb owner Very Harmful Extremely harmful Harmful Harmful Harmful Annoying Harmful Breaking users privacy It also includes recommendations and countermeasures R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 30 / 33

past future present conclusion and opening femtocells is an effective technology in terms of offloading the traffic and of new business cases but... the operators need to do their homework follow the specifications, secure the device and network access some serious threats (ongoing work): re-use the telecom infrastructure elements build a MitM, to be used during communications R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 31 / 33

past future present Thanks Thanks to : Nico Golde, TU Berlin Collin Mulliner, TU Berlin Prof. Jean-Pierre Seifert, TU Berlin Benjamin Michéle, TU Berlin R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 32 / 33

past future present questions Danke Questions? R. Borgaonkar, K. Redon Femtocell: Femtostep to the Holy Grail 33 / 33