Hacking Communication System

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Secure Mobile IP Communication
PROTEI Tomorrow Technologies Today Company profile 2009.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
GSM Protocol Stack Shrish Mammattva Bajpai. What is Protocol Stack ? A protocol stack (sometimes communications stack) is a particular software implementation.
ENGR 475 – Telecommunications
TEL 355: Communication and Information Systems in Organizations Architecture: Signaling System 7 (SS7) Professor John F. Clark.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Telecoms Networks Mohamed Mokdad HES – Biel/Bienne.
Signalling Systems System which allows various network components to exchange information –In particular, it supports call / connection control network.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
COMPUTER NETWORKS.
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Computer Networks IGCSE ICT Section 4.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
Signaling Basic Concepts of CCS 7 Training Center
OSI Model Routing Connection-oriented/Connectionless Network Services.
Signaling & Network Control Dr. Eng. Amr T. Abdel-Hamid NETW 704 Winter 2006 Intelligent Networks.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
11/21/991 PSTN A T1 (1.5 Kbps) is a time-multiplexed signal of 24 DS0 (64 kbps) A T-S-T (Time-Space-Time) division multiplexed switch maps bits arriving.
Lecture 10. Signaling The process of generating and exchanging information between network components to establish, monitor or release connections and.
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
[Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. GPRS/UMTS Security Requirements Guto Motta
VoIP Technology Briefing
Figure 4-1 ADPCM (adaptive differential pulse code modulation) Difference.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Mobile Communication Common Channel Signaling System No. 7 (i.e., SS7 or C7) is a global standard for telecommunications defined by the International Telecommunication.
#1EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks Lecture 2: Switching Network.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
GMLC ULFG II Contents Objective 1 GSM Architecture 2 GMLC Configuration GMLC 3 GMLC Request Flow 1 GMLC Architecture Simulation 4.
Updated 12/20011 Emerged Technologies Signaling System Seven – SS7 Nirmala Shenoy Information Technology Department Rochester Institute of Technology.
NETWORK SIGNALING. GSM Network Architecture (protocols) CM MM RR MM LAPD m radio LAPD m radio LAPD PCM RR’ BTSM CM LAPD PCM RR’ BTSM UmUm A bis A SS7.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
GSM TOWARDS LTE NETWORKS
Managing Telecommunications Chapter 6 Emily Gehm Jessica Paul Melanie Wall.
GLOBAL SYSTEM FOR MOBILE (GSM)
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Components of wireless LAN & Its connection to the Internet
TBE 2710 Chapter 12 Signaling.
PTCL Training & Development
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Switching Topic 2 VLANs.
Communication Protocol Engineering Lab.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Chap 5. IS-41 Network Signaling
Signaling Gateway A Signaling Gateway creates a bridge between the SS7 network and an IP network, under the control of the Gateway Controller. A Signaling.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
Protocol Technology Common Channel Signaling System 7 (SS7) Part 1 Gusztáv Adamis BME TMIT 2016.
Signaling & Network Control Dr. Eng. Amr T. Abdel-Hamid NETW 704 Winter 2006 SCCP + TCAP.
Protocol Technology SCCP & TCAP Gusztáv Adamis TMIT 2016.
BY KAMAL RAJ SINGH ID : 2009H124492P M.E. COMMUNICATION ENGG.
Signalling System No. 7.
ITU Workshop on “SS7 Security” Geneva, Switzerland 29 June 2016
3G architecture and protocols
NET 3710 Signaling.
Data Networking Fundamentals
Switching & Data Networks Switching and Interconnection Networks
Name:Shivalila A H,Shima
Background PSTN/SS7 networking IP networking ATM networking
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Prepared By: GOPIKA D K/SHRUTHI N Department: ECE Date:
GPRS Architecture Ayan Ganguly Bishakha Roy Akash Dutta.
Dept. of Business Administration
JAIN FOR MAP PROJECT GROUP: Maurizio Bonuccelli Piero Lauri
Presentation transcript:

Hacking Communication System Akib Sayyed akibsayyed@gmail.com

About Me Telecom Security Researcher Spoke at NullCon 2012 Works on SDR ,GNURADIO Certified Psycho 

About Company Payatu Technologies Pvt. Ltd. Boutique Security Testing Company Blackbox/Product/Web/Mobile Audits Security Trainings Organizers of nullcon Security Conference

What are we looking at Hacking GSM Hacking Core Telecom Network

Hacking GSM

What can we do with GSM Listen Call Impersonate some1’s Identity Track Location

Listening to Calls More like a Rocket Science Till 2006 People built own crackers and interceptors Some of them are open source Easy to build Open Source Software and Hardware available to receive data and Crack encryption.

Cost for 1 Interceptor 1500 Rs Phone 20000 Rs hard disk with rainbow tables 20000 Rs worth Computer Home Made Software + Open Source Code And your interceptor is ready

Protecting Calls Upgrade encryption Standard Allow A5/3 Randomize SI and Padding End to End Call encryption Use 3G :P

Impersonating Use some’1s identity while making request to network This allows one to impersonate identity of some1else. Can Make/ Receive Calls Send/Receive SMS Divert Calls

Protection Against Impersonating End User Cannot do anything Operator Need to work on same Authenticate Calls Authenticate SMS Authenticate USSD Request

Hacking Core Network (SS7 and SIGTRAN)

Core Network in Telco Image Credits : http://www.gl.com

Core Network 2G /3G Based on SS7/SIGTRAN and IP In simple words Either TDM(T1/E1) or IP (SCTP/TCP IP) No authentication (No User Name and Password) (on SS7)

SS7 is used for Carry Voice SMS USSD (Unstructured Supplementary Service Data ) Call Handling Operation and Maintenance Mobility Services Location Management ......

SS7 /SIGTRAN Stack Image Credit : Mobicents

Protocols in SS7/Sigtran MTP1/2/3,M3UA SCCP -> Signalling Connection Control Part TCAP -> Transaction Capability Application Part ISUP -> ISDN User Part MAP -> Mobile Application Part CAP ->Camel Application Part INAP-> Intelligent Network Application Part

MTP1/2/3 And M3UA Provides physical , data link layer and Network layer MTP1 = Message Transfer part 1 MTP2 = Message Transfer part 2 MTP3 = Message Transfer part 3 M3UA = MTP3 User Adaption Layer

SCCP /TCAP Signalling Connection Control Part Provides Extended Routing , Flow Control ,Connection Oriented /Connection less Relies on MTP for basic routing and error correction Transaction Capability Application Part Facilitate Multiple Concurrent dialog Between Same SSN More like session handler

MAP Mobile Application Part SMS USSD Call Handling , Routing Location Management

CAP Camel Application Part Intelligent Network Application Part Used when subscriber is roaming Allow home network to monitor and control calls made by subscriber Intelligent Network Application Part

Routing in SS7 Based on PC (Point Code) == LAN IP Based on GT (Global Title) == WAN IP SSN (Sub System Number) == Port Number STP(Signalling Transfer Point) == Router SSP (Service Switching Point) SCP (Service control point)

Routing based on Point Code Image Credit : Cisco

Routing Based on GTT Image Credit : Cisco

Routing based on GTT Image Credit : Cisco

Where we can attack SCCP- Signalling Connection Control Part TCAP- Transaction Capabilities Application Part ISUP – ISDN user part MAP – Mobile application part CAP - Camel Application part INAP- Intelligent network application part

Some Example of Attacks Purging MS from HLR Insert Subscriber Data Delete Subscriber Data Send Authentication info Flood Send Routing info Exposes IMSI of subscriber Hostile Location Update Cancel Location Update MAP ATI exposes Location of subscriber

How to protect network Check if network is vulnerable to such attack We have our own proprietary tool for doing same Perform filtering of non required message at point code level or STP level Use SS7 Firewall /IDS

DEMO

Thanks Questions