Security of phone communications



Similar documents
SS7: Locate. Track. Manipulate.

Defending mobile phones. Karsten Nohl, Luca Melette,

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Mobile network security report: Poland

GSM security country report: USA

Global System for Mobile Communication Technology

Mobile network security report: Belgium

GSM security country report: Germany

An Example of Mobile Forensics

Mobile network security report: Netherlands

Mobile network security report: Germany

Mobile network security report: Poland

GSM and UMTS security

Worldwide attacks on SS7 network

Chap. 1: Introduction

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

SIGNALING SYSTEM 7 (SS7) SECURITY REPORT

Feature and Technical

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

International Journal of Computing and Business Research (IJCBR)

Mobile network security report: Greece

SPYTEC 3000 The system for GSM communication monitoring

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Locating Mobile Phones using Signalling System #7. Tobias Engel

Mobile network security report: Norway

Mobile Communications

UMTS security. Helsinki University of Technology S Security of Communication Protocols

TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN. Bahrain Number Portability Implementation Routing and Charging specification

Global System for Mobile Communications (GSM)

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

SIP and VoIP 1 / 44. SIP and VoIP

Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities

Evaluating GSM A5/1 security on hopping channels

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Wireless and Mobile Network Architecture

House intercoms attacks

Wireless Encryption Protection

SS7 & LTE Stack Attack

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

SecureCom Mobile s mission is to help people keep their private communication private.

Network Security. Chapter 14. Security Aspects of Mobile Communications

Security in the GSM Network

@msecnet / Bogdan ALECU

Mobile Phone Security. Hoang Vo Billy Ngo

GSM and IN Architecture

Software on the witness stand: what should it take for us to trust it? Sergey Bratus & Anna Shubina, Dartmouth Ashlyn Lembree, Franklin Pierce Law

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

Global System for Mobile Communication (GSM)

Mobile Phone Network Security

Notes on Network Security - Introduction

Karsten Nohl, Breaking GSM phone privacy

User Authentication Guidance for IT Systems

GSM Risks and Countermeasures

Mobile self- defense. Karsten Nohl SRLabs Template v12

(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks

CS Cellular and Mobile Network Security: GSM - In Detail

Mobile SMS and Data Roaming Explained

Securing SIP Trunks APPLICATION NOTE.

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

IY2760/CS3760: Part 6. IY2760: Part 6

Khomp KGSM-USB SPX and Elastix Server

GSM System Architecture

Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

A Framework for Secure and Verifiable Logging in Public Communication Networks

VOIP Security Essentials. Jeff Waldron

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

VoIP Security Threats and Vulnerabilities

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

The GSM and GPRS network T /301

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Cellular Network Organization

Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim

Verint GI2. Gi2 Features Verint Systems Inc. All rights reserved.

Threats to be considered (1) ERSTE GROUP

Wireless Security: Token, WEP, Cellular

Bit Chat: A Peer-to-Peer Instant Messenger

Chapter 37. Secure Networks

TETRA Security. TETRA MoU Association Association House South Park Road Macclesfield Sk11 6SH England

2 System introduction

End-2-End QoS Provisioning in UMTS networks

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

Transcription:

Security of phone communications Authentication, identification and mobile security Matej Kovačič (CC) 2015 This work is published under Creative Commons licence: AttributionNonCommercial-ShareAlike 2.5 Slovenia. Full legal text of the licence is available on a website: <http://creativecommons.org/licenses/by-ncsa/2.5/si/legalcode>. Pictures: (CC) OpenClipArt.org, Matej Kovačič, Jaka Hudoklin (personal archive) and quoted authors (C).

Authentication and identification Authentication: a proof that message originated from holder of some given secret. Identification: a nontransferable proof that the other pa rty knows some given secret (wit hout revealing secret) Identification requires that the verifier check the info rmation presented against all th e entities it knows about. Authen tication requires that the inform ation be checked for a single, pr eviously identified entity.

Spoofing the identity of SMS sender

Sending of SMS from arbitrary number <http://provider.com/sms/json? username=xxxxxxxx&password=xxxxxxxxx&from=phrea ker&to=38631123456&text=sending%20of%20sms %20from%20number%20which%20is%20not%20a %20number.> EAS Y AS PIE!

Sending of SMS from arbitrary number

Spoofing the identity of a caller

Calling with arbitrary caller ID 1: setting-up the infrastructure 2 1 3 4 phone network internet VPN

Calling with arbitrary caller ID 2: look into the virtual PBX

Calling with arbitrary caller ID 3: result on a phone [video]

Calling with arbitrary caller ID 4: traffic data recorded by the mobile provider

Practical»use«:-)

What does it means for the data retention measures and eavesdropping?

Courts tend to regard computer-generated materials as inherently trustworthy evidence. This has consequences for court procedure. In a court witnesses are sworn in and crossexamined to expose biases and conflicts. But what about software as a witness? Sergey Bratus, Ashlyn Lembree in Anna Shubina. 2010. Software on the Witness Stand: What Should It Take for Us to Trust It?

Mobile identity spoofing

Mobile identity spoofing in GSM network (without possession of mobile phone and/or SIM card) [Vulrenabilities were fixed in most of Slovenian GSM networks, procedure is not working anymore. However, similar attacks could be possible via SS7 abuse...]

Mobile phone with Calypso chipset...

...USRP, HackRF and HackRF clones Rad10 - HackRF clone.

RTL-SDR DVB-T with Elonics 4000 chipset.

GSM analysis with RTL-SDR Airprobe RTL-SDR

Use of weak encryption (A5/1)

Locating of user in mobile network We start sending silent SMS'es to a mobile number. During this we observe which TMSI number is receiving (encrypted) data. GSM network TMSI Mobile phone user does not detect reception of silent SMS. silent SMS Osmocom

Capture and cryptanalysis of A5/1 5. A3 GSM network 16 BE AF encrypted data C3 D0 42 90 1C C8 C8 C3 29 2B 2B 2B 2B 2B CONTENT OF DATA BURST IN GSM 72 FE BC 10 74 70 C4 2B Kraken From the air we passively capture encrypted data packets. With the help of guessing the contents of the GSM burst (guessing the padding bits) we calculate one-time encryption key. We use cryptanalysis to reconstruct session key Kc. In the process we need no access to the SIM card, mobile phone or mobile network! Kc

Cracking A5/1 session key Kc in a practice Cracking (cryptanalysis) with Kraken and predictions we are using in our gsmcrack.py...

Cracking A5/1 session key Kc in a practice and decrypted SMS message (received through 2G network). Application gsmcrack.py automatically identifies the TMSI number from the phone number (by sending silent SMS's). When we have TMSI of the target, our application is able to automatically follow the phone to an assigned dedicated channel and record encrypted message.

Mobile identity in mobile network Users in the mobile network does not identify themselves by the phone number, but with the IMSI and TMSI number. Important parameters are also the encryption key Kc and the Key sequence number. GSM network IMSI, TMSI, Kc, Key sequence number

Mobile identity spoofing If Kc does not change by every transaction, mobile identity can be easily spoofed. First, we have to identify IMSI number of our target... 1. HLR lookup HLR lookup is done through web service we get IMSI number.

SIM spoof Mobile identity spoofing with sim spoof command. For spoofing we need IMSI number (SS7 lookup), TMSI number (from the network), session key (we chack it) and key sequence number (from the network). In networks with A5/0 we need only TMSI and key sequence number no cryptanalysis needed!

Mobile identity spoofing Two SMS messages sent by spoofed mobile identity. Similarly it is possible to spoof voice calls too. [video]

SS7 attacks

Attacks on mobile networks through SS7 Signaling System 7 (SS7) is an architecture for performing out-of-band signaling in support of the call-establishment, billing, routing, and information-exchange functions of the public switched telephone network. Support for mobile telephony (roaming, SMS, data) has been added in 1990's and 2000's. Through SS7 it is possible to access Home Location Register, Visitor Location Register and Mobile Switching Center...

Attacks on mobile networks through SS7 With abuse of CAMEL protocol (Customised Applications for Mobile networks Enhanced Logic) it is possible to intercept outgoing calls: legitimate use: user who uses roaming in foreign country wants to call local number. MSC asks gsmscf (GSM Service Control Function) in his home network what to do with number in local format. gsmscf rewrites number in international format and forwards this number to MSC to call. attack: all calls are routed to the attacker with false gsmscf address rewrite. Attacker intercept the call and target it to its final destination.

Attacks on mobile networks through SS7 +386 1 4284000 +38 5 MSC, gsmscf 14 569 964 386 14 284 000 86 +3 000 4 8 2 14

Attacks on mobile networks through SS7 Incoming calls interception is also possible: attacker pretends that user is roaming in his network. This is possible because SS7 updatelocation command is not authenticated attacker can send updatelocation command with his global title to user's HLR. All calls and SMS messages are now routed to the attacker. Consequences for two-factor authentication systems (mtan,...)?

Attack on mobile networks through SS7 TMSI deanonimisation and encryption key stealing: attacker intercepts TMSI number (for instance with OsmocomBB or RTL-SDR equipment)... attacker asks MSC for IMSI number og a giver TMSI number... with updatelocation command attacker can get phone number of user (MSISDN)... when attacker sends sendidentification SS7 request, MSC returns even session encrpyption key (Kc) of the user! Result: passive eavesdropping of mobile communications is possible and also mobile identity spoofing.

But there's an old saying inside the NSA: "Attacks always get better; they never get worse." --Bruce Schneier

! D E T S U B Questions? Ilustracija: (CC) SulphurSpoon @ DeviantArt https://pravokator.si