Chris Paget Defcon 18 Practical Cellphone Spying.

Slides:



Advertisements
Similar presentations
IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Advertisements

GSM network and its privacy Thomas Stockinger. Overview Why privacy and security? GSM network‘s fundamentals Basic communication Authentication Key generation.
GSM: SRSLY?. What’s coming up Overview of GSM arch & crypto –Hacking as we go... OpenBootTS-1.0 –GSM Base Station LiveCD Demo BTS is live – feel free.
GSM Global System for Mobile Communications
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Three Police Technology Wireless Communications.
Wireless and going mobile Browsing via low energy photons.
First Generation (1G) Alison Griffiths C203 Ext:3292
08/16/01.
ESTeem Training Class Radio Technology Overview. Radio Basics Terminology – Familiarization with radio expressions Basic Components – Transmitter – Receiver.
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Wireless Network Technologies Asst. Prof.
Cellular Telephones How Do They Work and Are They Safe? Meagan Morrell May 3, 2000.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
Technician License Course Chapter 5 Operating Station Equipment Lesson Plan Module 11: Transmitters, Receivers and Transceivers.
System parameters and performance CDMA-2000, W-CDMA (UMTS), GSM 900, WLAN a, WLAN b, Bluetooth. By Øystein Taskjelle.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Cellular Networks No. 1  Seattle Pacific University Cellular Wireless Networks Common issues for wireless solutions Kevin Bolding Electrical Engineering.
Cellular Mobile Communication Systems Lecture 8
CELLULAR NETWORK. Early mobile system Cellular Network Use of one powerful transmitter located on high location. Range of signals was upto 50km. These.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Technician License Course Chapter 2 Lesson Plan Module 3 – Modulation and Bandwidth.
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Overview of cellular system
COMT 3911 Cellular and PCS Technical Issues COMT 391.
Clint Miller KCØJUO and Paul Cowley KB7VML Story County ARES January 16 th, 2016.
Layer One challenge Biró László Miklós HA5YAR
How to hack into mobile phones via bluetooth & How to Hack Wireless Internet Connections in 3 Easy Steps PresentedBy Pradosh H.S.
DATA AND COMPUTER COMMUNICATIONS Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
Wireless Wide Area Network. Cell Phones A necessity in today’s society Advanced Radios Full Duplex Communication.
Lecture 3 Course Instructor: Marzia ALAM
PRESENTATION BY K.B KIRAN HAM RADIO SECURITY. WHAT IS A HAM RADIO? Device that is designed to use Radio frequency spectrum for purposes of private recreation,
GSM security: feit en fictie NLUUG Najaarsconferentie 2010 Fabian van den Broek Institute for Computing and Information Sciences (iCIS)
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
(Worldwide Interoperability for Microwave Access)
Mobile communication methods
Cellular Networks Part 2
Wireless Network PMIT- By-
Cellular Networks Wireless Transmission Cellular Concept
Instructor Materials Chapter 6 Building a Home Network
Physical layer protocol bluetooth
Wireless Technologies
Difference Between Block Diagram and Schematic Diagram [Req 5a]
Wireless Network Security
Bandwidth Utilization
Which telecommunication service is better for you?
Mobile communication methods
CBS- CDMA.
Chapter 3: Wireless WANs and MANs
3G Security Principles Build on GSM security
Chapter 4: Digital Transmission
How Your Cellphone Works…
Overview We were looking at technologies to connect a bunch of nodes
Technician Licensing Class
Radio Frequency Interference
WLAN Security Antti Miettinen.
Mobile Phone Technology
Antti Miettinen (modified by JJ)
A. Talk louder into the microphone B. Let the transceiver cool off
Wireless Wide Area Networks
Cellular Telephone Networks
Dept. of Business Administration
Chapter 9 – Mobile systems and networks
Security in Wide Area Networks
Cellular Telephone Networks
Cellular Systems.
Presentation transcript:

Chris Paget Defcon 18 Practical Cellphone Spying

Before we start: Privacy ● Cellular calls will be recorded during the talk ● TURN OFF YOUR PHONE if you don't consent ● Data will not be kept after the talk ● The BTS is booted from USB with no HDD ● A best-effort will be made to connect all calls

What is an IMSI? ● International Mobile Subscriber Identity ● Primary identifier for a subscriber ● Kind of like a GSM username ● Lives on the SIM card ● Somewhat protected ● Replaced by a TMSI when you camp to a tower ● ICCID (printed on the SIM) is closely related ● Less so outside the USA

What's an “IMSI Catcher”? ● A spoofed GSM tower ● The handset camps to the strongest signal ● The attacker can always win ● In GSM the BTS (tower) picks all the settings ● Instructs handset on A5 use, Tx power, Rx gain, etc ● Strong signal + negotiate A5/0 = pwned ● Attacker is the tower -> full control of handset ● Technique was patented by R&S in Europe in 1993 ● Not sure about the USA, either way it's public info

IMSI Catcher Crypto ● Attacker creates the BTS ● Cellphone connects to BTS ● BTS tells cellphone to disable crypto (A5/0) ● Attacker wins, no rainbow tables needed. ● The cellphone could warn you, but won't ● Too confusing for users ● Warning is explicitly disabled by operators

Spectrum Usage ● Four bands for GSM globally: ● 850, 900, 1800, 1900 ● GSM-850 and GSM-1900 used in the USA ● 900 and 1800 are primarily European ● GSM-900 downlink: MHz ● US ISM Band: MHz ● Overlap at MHz ● Quad-band phones can see an ISM-band BTS ● European phones, too

ISM band ● Industrial, Scientific, Medical ● Low power, low utilisation, frequency hopping ● ISM is a secondary user ● It's a ham band! ● Hams don't like it because of ISM ● Too much clutter ● So, can we operate a BTS on a Ham license? ● In the ISM band, at least?

Amateur Radio ● Licenses are fairly easy to get ● for parrot-learning ● Take the time to understand, much better ● 1500W power limit (!) ● Unspecified digital codes are OK ● As long as the specifications are public ● No crypto allowed (not a problem here :) ● No antenna limits, only RF exposure limits ● Station must identify itself every 10 minutes

Identifying the Station ● Morse out a callsign every 10 minutes ● Straight CW, no modulation needed ● It's kinda hard to integrate morse into GSM... ● Easy solution - a second transmitter ● Same frequency, slightly higher power ● Overwrite the GSM signal (self-DoS for a sec) ● Need an easily-scriptable 900MHz transmitter

ID-ME ● A hacked IM-ME is perfect ● Travis Goodspeed did most of the work already: ● me-goodfet-wiring-tutorial.html ● +10dBm output, wide frequency range ● Easily programmable in C ● Again, use Travis' GoodFET to flash it ● Match frequency and power level to the USRP ● Combine signals together and amplify

BTS Setup ● USRP1 ● 2x RFX900 daughterboards ● ClockTamer ( – Very precise configurable clock (+/- 100Hz at 1.9GHz) ● Laptop computer ● Debian ● OpenBTS ● Asterisk ● Basic BTS, voice only (no data)

Demo 1 Starting the BTS in test mode

Spoofing a Network ● Networks are identified by MCC / MNC ● Mobile Country Code (310 for USA) ● List on Wikipedia ● Mobile Network Code (2-3 digits) ● Again, Wikipedia ● Trivial to change ● Spoof any GSM network, worldwide ● Network Name is sometimes also checked ● Case-sensitivity isn't much of a defense

Demo 2 Spoofing MNC/MCC Changing Network Name

That's all, folks! ● We now have a simple IMSI catcher ● Phones will camp to the tower & send their traffic ● Can filter handsets by IMSI / IMEI ● IMEI == Equipment Identifier ● It takes time for handsets to migrate across ● We can make the process faster... ● Outbound calls only ● More to come on that

Speeding up Handover ● How to make more handsets connect? ● And do so more rapidly? ● Lots of possibilities: ● Neighbour lists ● Changing LAC ● Band Jamming ● Receive Gain

GSM Neighbours ● Each BTS knows what other towers are nearby ● It tells the handset what channels to look on ● Handsets monitor neighbour channels ● Speedier handoff when you relocate ● Attacker can use this info to: ● Identify a neighbour that's far from the local cell ● Set up the IMSI catcher on that frequency ● Make cellphones attach to his BTS more quickly

Finding Neighbours ● Nokia 3310 (900/1800) / 3390 (1900) ● Network Monitor mode – Effectively sniffs your own GSM connection ● Fbus/Mbus switching cable ● Gammu ● Records traces to XML ● Open in Wireshark ● Neighbour list is in “System Info type 2” burst

Demo 3 Finding GSM neighbours

Location Area Code ● LAC is broadcast by the BTS ● It groups together a bunch of cells in one area ● Easier handoffs within that area ● If a handset sees the LAC change... ●...it assumes it has moved to a new location... ●...and hands off to the new tower. ● Change the LAC, entice more handsets.

Demo 4 Changing LAC

Handset Powerup ● When first turned on, handset knows nothing ● No tower frequencies, current LAC, etc ● Performs a long scan to find towers ● Chooses which by MCC/MNC and signal strength ● Shorter scan once towers are found. ● When signal is lost, a similar process happens ● Advantageous to an attacker

Loss of Signal ● We're only talking about 2G GSM here ● 3G is much better ● Jam GSM, handset performs wider search ● Easier to find the attackers BTS ● Jam 3G, handset drops back to 2G ● Intercepting 3G is much harder ● Force the victim down to 2G instead ● Can the attacker jam both bands?

Noise Generation ● Attacker can transmit high-power noise ● Obscure the signal from the tower ● Same end result – handset loses signal ● Noise generators aren't too expensive ● $450 on eBay ● Power amps aren't too expensive ● $400 for 100W ● 100W of noise == BIG cellphone disruption

Noise Output 892 Mode1910 Mode

Demo 5 Jamming cellular bands

Just kidding!!! ● Jamming cellphone bands is evil ● Knocks out everything: GSM, CDMA, 3G, etc. ● Impossible to defend against ● Only a short burst needed... ● WAY too offensive for this demo ● How far would the DoS extend? ● I have a 100W amplifier and good antennas ● That'll probably DoS most of Las Vegas ● Obviously not going to happen :)

Receive gain ● BTS can tell handset (effectively): ● “Treat my signal as if it were X dB stronger” ● The handset will go along with this ● It's an instruction from the BTS – has to comply ● Attacker can configure this in his BTS settings ● OpenBTS doesn't support it yet ● This method is the essence of the R&S patents.

Inbound calls ● IMSI catcher is a completely separate network ● Carrier thinks phone is off or has no signal ● If phone is off, carrier sends calls to voic ● Where else is it going to go? ● Result: Attacker doesn't see inbound calls ● Solution: Spoof the caught IMSI ● At least as far as the “real” network.

Spoofing to the Carrier ● Already know IMSI/IMEI ● Don't know Ki (secret key that authenticates IMSI) ● Connect to carrier with victim IMSI ● Pass RAND challenge along to victim ● Break victim's keystream, recover session key ● Re-use session key to talk to carrier

Breaking the session key ● ONLY time when crypto attacks are needed ● For an IMSI catcher, at least ● Attacker negotiates weakest cipher possible ● A5/2 ideally, trivial to crack ● Handset may reject A5/2 (some do) ● Negotiate A5/1 instead, need rainbow tables for Kc ● Either way, outbound calls are plaintext.

Are there solutions? ● Not really - GSM is badly broken. ● Many of these weak configs are needed ● GSM is global, countries have differing crypto laws ● Primary solution: Use 3G! ● 3G cipher is showing cracks, not broken yet ● Secondary solution: More crypto ● Treat GSM like the internet – encrypt before using ● Best solution: Turn off 2G GSM ● We're at 3.5G(HSPA), 4G on the horizon.

Demo 6 Making and recording calls