SlideShare a Scribd company logo
1 of 59
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Hacking Telco equipment
The HLR/HSS
Laurent Ghigonis
Security researcher at P1 Security
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
What are we talking about ?
A mobile network operator Core Network
Network passive capture showing Global Titles
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Mobile Operators
• Conveys the majority of voice communications
worldwide
• Conveys our data
• Conveys growing M2M traffic
• Emergency systems notifications uses it
=> We now rely on it and we have some security
expectations
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Mobile Operators and governance
• In Europe
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Mobile Operators and governance
• In France
Lets check the reality …
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HSS Front End
HLR Front End
AuC HSM
Provisioning DSA
3 Back Ends
Provisioning Gateway
Install Server
Admin
Routing DSA
The Witness : An HLR/HSS
Typical HLR/HSS in use in operator Core Network
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HLR/HSS in Mobile Core Network
A mobile network operator Core Network
Network passive capture showing Global Titles
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HLR/HSS in Mobile Core Network
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HLR/HSS in Mobile Core Network
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HLR/HSS in Mobile Core Network
• HLR is used in all 2G Operator Network
• HSS is used in all 3G/4G Operator Network
• Stores customer data
– Subscriber identifier (IMSI)
– Subscriber encryption keys
– Subscriber approximate location
– Subscriber SIM plan options
• Critical to the operator
– HLR down == Network down, no calls possible
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HLR/HSS in Mobile Core Network
HLR/HSS receiving subscriber location update
from the operator SS7/Diameter signaling links
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Lets make it talk …
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Plan
HLR/HSS Robustness assessment
• Virtualization
– Virtualization and instrumentation
• System Analysis
– Localroot, Framework complexity
• Network Fuzzing
– SS7 Protocols
• Binaries Reverse
– More vulns
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HLR/HSS Virtualization
No, it’s not ATCA / NFV
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
An HLR/HSS is an ecosystem
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
An HLR/HSS is an ecosystem
• HLR + HSS Front-end
• HLR Administration server
• Application/Database routing servers
• HLR Backend/Database (multiple)
• HSM (Hardware Security Module) for keys
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HLR/HSS is never alone
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Where to start
• Most exposed from the outside
=> HLR/HSS Front-end
– Receives SS7/Diameter traffic
• Telecom network stacks
– Receives provisioning requests
– Connected to the HSM
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
HSS Front End
HLR Front End
AuC HSM
Provisioning DSA
3 Back Ends
Provisioning Gateway
Install Server
Admin
Routing DSA
Where to start
Typical HLR/HSS in use in operator Core Network
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Virtualization of HLR/HSS
Frontend
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Original Equipment Manufacturer
• Specs of the real equipment
– i386 / x64 / Sparc
– Solaris / CentOS
– 32 GB of RAM
– CPU 16 Cores
– TB hard drive + External SAN
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Qemu/KVM
• Faster than VirtualBox
• More flexible
• Tweak code to add more network interfaces
• VDE Switch for networking
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Qemu/KVM
qemu-system-x86_64 
-machine type=pc,accel=kvm:tcg -pidfile ./myhlr.pid 
-m 7.2g -smp 4 -drive file=/dev/mapper/lvm-vm--myhlr,cache=none 
-vnc 127.0.0.1:2,password,tls,lossy -display curses -rtc base=localtime,driftfix=slew 
-net vde,vlan=1,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=1,macaddr=52:54:00:00:10:01 
-net vde,vlan=2,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=2,macaddr=52:54:00:00:10:02 
-net vde,vlan=3,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=3,macaddr=52:54:00:00:10:02 
-net vde,vlan=4, sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=4,macaddr=52:54:00:00:10:02 
-net vde,vlan=5,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=5,macaddr=52:54:00:00:10:02 
-net vde,vlan=6,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=6,macaddr=52:54:00:00:10:02 
-net vde,vlan=7,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=7,macaddr=52:54:00:00:10:02 
-net vde,vlan=8,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=8,macaddr=52:54:00:00:10:02 
-net vde,vlan=9,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=9,macaddr=52:54:00:00:10:02 
-net vde,vlan=10,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=10,macaddr=52:54:00:00:10:02 
-net vde,vlan=11,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=11,macaddr=52:54:00:00:10:02 
-net vde,vlan=12,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=12,macaddr=52:54:00:00:10:02
• Physical partition for disk
– Do not use disk file on host btrfs
• super slow
• ext4 is ok
– http://www.linux-kvm.org/page/Tuning_KVM
• Curses output
• Improvements: serial terminal
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Qemu/KVM
• Solaris 10
– Qemu/KVM ok for x64
– Fails for SPARC
• Stock kernel
– /kernel
– /usr/kernel
• Custom kernel modules
– For Telecom Signaling [Signalware]
• Uses grub
• Failsafe mode
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Inside the machine
• ZFS filesystem
• Solaris 10
• Everything is installed via packages
• Multiple Oracle databases
– Even on HLR/HSS Front-end only
• A lot of Middleware framework to start the
actual network stacks / applications
• Telco stacks: based on Ulticom Signalware
• The OS expects its precious network cards
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
System Analysis
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
The filesystem
• ZFS = Filesystem + Volume manager
• ZFS pool (often mirrored)
– ZFS root pool
• 100-200GB usually enough
• Prepare free space for system/processes dump
– ZFS Dump pool
• Should be more than size of your RAM
– ZFS SWAP pool
• Should be more that size of your RAM
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
The filesystem
• ZFS offers good resilience against data corruption,
and is very picky when there is too much
corruption
– You can’t recover when filesystem is too much broken
– You can try
$ zdb -e -p /dev/dsk/c0t3d0p0 -F -X -AAA -dd rpool 1
$ zpool import -f -F -X 19485729304958623456 mypool
$ zpool import -o readonly=on -o autoreplace=on -o
failmode-continue -m -N -f -F -X 19485729304958623456
mypool
• If it fails
– Code your own tool by modifying ZOL
http://zfsonlinux.org/
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Filesystem /advdata/
autoinstmnt/
bin@
boot/
cust_data/
dump@
environment.txt*
etc/
export/
false/
global@
home/
installmnt/
kernel/
lib/
mnt/
net/
nsr/
opt/
patchmnt/
platform/
root/
rpool/
rtp_environ.txt
sbin/
tftpboot/
ti_var/
tmp/
TspAcc@
TspAccBackup@
TspCore@
tspinst/
TspTickets@
updateSW/
usr/
var/
vol/
Grub/platform + failsafe
Applications data
Kernel
Telco specific apps
Home + Applications data + Telco specific apps
Crashdumps from Telco specific apps
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Some packages installed
application SMAWrtp
Telecommunication Service Platform (TSP) Base Package
application OMNI
Signalware System
application S6U-4
Signalware System
application OMNI-C7X
Signalware C7 Extensions
application INTPahacu
AC Utimaco HSM
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Low hanging fruits
• SUID executables
– SUID Total: 162 (155 binaries, 7 scripts)
– SUID Root: 142 (137 binaries, 5 scripts)
• Signalware
Boot process
“becoming root”
by Design
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Local roots
• Of course, we often find multiple local roots
• Some are really too easy (one command):
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Example of Telco network stack:
NSN TSP / RTP + Ulticom Signalware
• TSP + RTP framework are found on NSN NT-
HLR
– Found in many European and Worldwide
operators
– Very similar to Apertio OneHLR
• TSP: Telco Server Platform (Ericsson) / Telco
Service Platform (NSN, others, generic name)
• RTP: Resilient Telco Platform (NSN)
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Example of Telco network stack:
NSN TSP / RTP + Ulticom Signalware
• SS7 Protocol handling
Reminder: SS7 stack
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Network Fuzzing
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Fuzzing SS7: M3UA
• Example: Flooding badly handled
– Leads to alerts flooding in OSS
– Leads to loss of previous alerts !
– P1VID#799
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Fuzzing SS7: SCCP
• Example result: 1 specific MSU repeated 2 times
causes DoS of all Signaling Interconnections
– HLR is down during 2 minutes
– Total Denial of Service of the network
– Nobody can receive calls in the whole country
core 'core.xxx' of 15477: /export/home/xxx
01 msu_processing ()
02 msg_distribution ()
03 main ()
04 _start ()
– If the attack is repeated, the DoS is permanent during
the attack
– P1VID#773
So long for the critical infrastructure …
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Fuzzing SS7: SCCP
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Fuzzing SS7: MAP
• Example results: 1 specific MSU causes MAP
process crashes
– 5 MSU/second makes HLR totally unresponsive to
any other MAP Query
• Total Denial of Service of the network
• Nobody can receive calls in the whole country
– 1 MSU/second makes HLR totally drop 50% of
other MAP Queries
• Network is highly perturbed
• 50% of the called in the whole country are failing
– P1VID#772
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Fuzzing Diameter
• Process Crash with 1 specific manually crafted MSU
Logs do not even report process crash.
Neither the OSS Alerts.
Application logs:
Services_Esm_Log_Message: vc_Priority=LOG_ERR, vc_MessageInformation=ESM:
Service could not be processed correctly,
vc_AdditionalInformation=Reason: xxxxxxxxx data unavailable, Message Type:
S6a-xxxxxxxxx
Services_Esm_Log_Message: vc_Priority=LOG_ERR, vc_MessageInformation=ESM:
Service could not be processed correctly,
vc_AdditionalInformation=Reason: xxxxxxxxx data unavailable, Message Type:
S6a-xxxxxxxxx
UTC Tue Sep 3 01:20:44 2013 Services_Esm_Log_Message: vc_Priority=LOG_ERR,
vc_MessageInformation=ESM: Service could not be processed correctly,
vc_AdditionalInformation=Reason: xxxxxxxxx data unavailable, Message Type:
S6a-xxxxxxxxx
Services_Esm_Log_Message: vc_Priority=LOG_ERR, vc_MessageInformation=ESM:
Service could not be processed correctly,
vc_AdditionalInformation=Reason: xxxxxxxxx data unavailable, Message Type:
S6a-xxxxxxxxx
Behind that, process core dumps are created…
P1VID#718
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Does redundancy saves you ?
• No !
• Same N front-ends == same crashes
• Messages just needs to be sent N times
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Binaries reverse
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Often, too much help…
• Binaries not stripped
– Debug symbols / function names / … available
• No anti-debug mechanism
• Libraries headers on production machines
– Great help in understanding the internals
• Large documentation about internals on
production machines
– Great help in understanding the internals
• Updated binaries and previous binaries both on
production machines
– Binary diff to track issues fixed
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Signalware Kernel modules
• Example: Parsing of SCCP header
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Signalware Kernel modules
• Kernel modules signaling parsing is robust
• IPC to communicate with userland binaries
• Complexity leads to other type of errors
– Logic errors
– Race conditions
– Slow handling of some types of MSUs
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Signalware userland binaries
• Parsing less robust (less tested)
• Example logic error due to IPC / Framework
complexity:
Can be triggered from the International SS7 network
Null pointer dereference
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
So verdict ?
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
So verdict ?
• Misconceptions!
– No crashes on a Critical Core Network Element
• FAIL
– Robustness against network attacks
• FAIL
• Redundancy != Robust, attack kills Front-end one by one
– Modern
• Depends, but from what we see there is much room for
improvement
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Mobile Operators and governance
• Reality on Threats analysis: Maybe
• Reality of Telco equipment security: Very bad
• Public information: Very bad
• Telco private sector information: Didn’t see impact
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Consequences
• Mobile Network crashes for unknown publicly
available reason
• Spying on phone calls / customer activities from a
single point (Core Network) is relatively easy
• Fraud
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Recommendations
• Secure SDLC (Secure Software Development Life Cycle)
– Design
– Implementation
– Testing
• Especially for vendors custom stacks/services
TCAP/MAP parsing bugs leading to overflows, …
• Vendors security audits (HLR isolated)
– System audit
– Network audit
• Testbed audits (HLR in environment)
– System audit
– Network audit
– Before deploying to production
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Recommendations: securing the OS
• Use Solaris Zones to split services: P1VID#764
• Use Solaris Audit mechanism: P1VID#765
• Authenticate the hardware
– To prevent emulation
• Use the latest OS protections against exploitation
– Solaris 11 has ASLR
– Use custom Linux kernel
• Use a firewall by default on the machine itself
• …
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Recommendations: OSS
• Make it faster !
– People should be able to use it to react when
under attack
– E.g. NSN @vantage commander
• Need access to all low-level network traffic for
forensics
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Recommendations: For the operators
• Push the vendors to fix the bugs
• Some of the attacks we discovered can be filtered
– Operators do not have to wait for bugs to be fixed
– Filter at perimeter boundaries
(typically STP / Router)
– Depends on STP / Router models and security
“features”
• Sometime filtering options are charged by vendor
• It is possible to filter also at the SCCP provider
level
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
To be continued
• Telecom Network Elements security is low
– We tested multiple Network Element
types/models, from different vendors
• Vendors, Governments and security
researchers have work to do
• Vulnerability disclosure in security critical
infrastructure is scarce
– Dangerous ?
– Not if there is collaboration
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
Other aspects of Telecom Security
• We talked here about equipment security
– It’s a work in progress, and only HLR/HSS
– Mainly Network Equipment Vendor responsibility
• Also consider
– Other Network Elements security
– GRX / IPX / SCCP Providers security
– Deployment security (passwords policies,
filtering…), Operator responsability
– Telecom Network Fraud (SS7 spoofing, Call/SMS
Spoofing, …), Operator responsability
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
References
Governance literature on critical infrastructure:
• European level
– 2007:
http://www.nato-pa.int/default.asp?COM=1165&LNG=0
– 2012
http://www.nato.int/cps/en/natolive/news_88054.htm?selectedLocale=en
– 2013
http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/crisis-and-
terrorism/critical-infrastructure/index_en.htm
http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/crisis-and-
terrorism/critical-infrastructure/docs/swd_2013_318_on_epcip_en.pdf
• France
– 2012
http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000026638421
&dateTexte=&categorieLien=id
– 2013
http://www.gouvernement.fr/gouvernement/livre-blanc-2013-de-la-defense-et-
de-la-securite-nationale
2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
That’s it, please react.
Thank you
laurent@p1sec.com
http://www.p1sec.com

More Related Content

What's hot

Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxtharinduwije
 
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - InnovileGPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - InnovileAhmet Ozturk
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architectureVikas Shokeen
 
Attacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsAttacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsPositiveTechnologies
 
Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...3G4G
 
VoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedVoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedSyniverse
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sipVikas Shokeen
 
How to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetHow to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetPositive Hack Days
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe LangloisAttacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe LangloisP1Security
 
Beginners: Open RAN, White Box RAN & vRAN
Beginners: Open RAN, White Box RAN & vRANBeginners: Open RAN, White Box RAN & vRAN
Beginners: Open RAN, White Box RAN & vRAN3G4G
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration FlowKent Loh
 
Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...DefCamp
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G TestingIxia
 
UMTS UTRAN Call Flow
UMTS UTRAN Call FlowUMTS UTRAN Call Flow
UMTS UTRAN Call FlowSujeet Kumar
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core NetworkHamidreza Bolhasani
 

What's hot (20)

Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
 
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - InnovileGPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architecture
 
Attacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsAttacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOs
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...Intermediate: 5G Applications Architecture - A look at Application Functions ...
Intermediate: 5G Applications Architecture - A look at Application Functions ...
 
VoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedVoLTE Charging and Clearing Explained
VoLTE Charging and Clearing Explained
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
Sipwise rtpengine
Sipwise rtpengineSipwise rtpengine
Sipwise rtpengine
 
How to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetHow to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the Planet
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe LangloisAttacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
Attacking SS7 - P1 Security (Hackito Ergo Sum 2010) - Philippe Langlois
 
Beginners: Open RAN, White Box RAN & vRAN
Beginners: Open RAN, White Box RAN & vRANBeginners: Open RAN, White Box RAN & vRAN
Beginners: Open RAN, White Box RAN & vRAN
 
Hacking techniques
Hacking techniquesHacking techniques
Hacking techniques
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...
 
LTE Testing | 4G Testing
LTE Testing | 4G TestingLTE Testing | 4G Testing
LTE Testing | 4G Testing
 
UMTS UTRAN Call Flow
UMTS UTRAN Call FlowUMTS UTRAN Call Flow
UMTS UTRAN Call Flow
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
 

Similar to Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis

D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via smsqqlan
 
adm6: ip6tables, pf.conf, ipf mit python in deutsch
adm6: ip6tables, pf.conf, ipf mit python in deutschadm6: ip6tables, pf.conf, ipf mit python in deutsch
adm6: ip6tables, pf.conf, ipf mit python in deutschMarc Manthey
 
RenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypotsRenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypotsAPNIC
 
Homer metrics | LORENZO MANGANI Y FEDERICO CABIDDU - VoIP2DAY 2017
Homer metrics | LORENZO MANGANI Y FEDERICO CABIDDU - VoIP2DAY 2017Homer metrics | LORENZO MANGANI Y FEDERICO CABIDDU - VoIP2DAY 2017
Homer metrics | LORENZO MANGANI Y FEDERICO CABIDDU - VoIP2DAY 2017VOIP2DAY
 
Decreasing Incident Response Time
Decreasing Incident Response TimeDecreasing Incident Response Time
Decreasing Incident Response TimeBoni Bruno
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptIwan89629
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersYury Chemerkin
 
Simplest-Ownage-Human-Observed… - Routers
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - RoutersLogicaltrust pl
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free softwareGiuseppe Paterno'
 
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...VOIP2DAY
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewallsAkapo Damilola
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsToradex
 
Advanced Log Processing
Advanced Log ProcessingAdvanced Log Processing
Advanced Log ProcessingAnton Chuvakin
 
Redteaming HID attacks
Redteaming HID attacksRedteaming HID attacks
Redteaming HID attacksJuan Espin
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...Felipe Prado
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones HijackingPriyanka Aash
 
Alexander Bolshev, Alexander Malinovsky - HART (in)security
Alexander Bolshev, Alexander Malinovsky - HART (in)securityAlexander Bolshev, Alexander Malinovsky - HART (in)security
Alexander Bolshev, Alexander Malinovsky - HART (in)securityDefconRussia
 

Similar to Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis (20)

ACS-2010
ACS-2010ACS-2010
ACS-2010
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
 
adm6: ip6tables, pf.conf, ipf mit python in deutsch
adm6: ip6tables, pf.conf, ipf mit python in deutschadm6: ip6tables, pf.conf, ipf mit python in deutsch
adm6: ip6tables, pf.conf, ipf mit python in deutsch
 
RenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypotsRenasCON 2023: Learning from honeypots
RenasCON 2023: Learning from honeypots
 
Homer metrics | LORENZO MANGANI Y FEDERICO CABIDDU - VoIP2DAY 2017
Homer metrics | LORENZO MANGANI Y FEDERICO CABIDDU - VoIP2DAY 2017Homer metrics | LORENZO MANGANI Y FEDERICO CABIDDU - VoIP2DAY 2017
Homer metrics | LORENZO MANGANI Y FEDERICO CABIDDU - VoIP2DAY 2017
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
Decreasing Incident Response Time
Decreasing Incident Response TimeDecreasing Incident Response Time
Decreasing Incident Response Time
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Filip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routersFilip palian mateuszkocielski. simplest ownage human observed… routers
Filip palian mateuszkocielski. simplest ownage human observed… routers
 
Simplest-Ownage-Human-Observed… - Routers
 Simplest-Ownage-Human-Observed… - Routers Simplest-Ownage-Human-Observed… - Routers
Simplest-Ownage-Human-Observed… - Routers
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free software
 
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
Federico Cabiddu - VoIP2DAY 2016 | VoIP and RTC Troubleshooting using the Sip...
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewalls
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux Systems
 
Advanced Log Processing
Advanced Log ProcessingAdvanced Log Processing
Advanced Log Processing
 
Redteaming HID attacks
Redteaming HID attacksRedteaming HID attacks
Redteaming HID attacks
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
 
Parrot Drones Hijacking
Parrot Drones HijackingParrot Drones Hijacking
Parrot Drones Hijacking
 
Alexander Bolshev, Alexander Malinovsky - HART (in)security
Alexander Bolshev, Alexander Malinovsky - HART (in)securityAlexander Bolshev, Alexander Malinovsky - HART (in)security
Alexander Bolshev, Alexander Malinovsky - HART (in)security
 

Recently uploaded

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesSanjay Willie
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your QueriesExploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
Exploring ChatGPT Prompt Hacks To Maximally Optimise Your Queries
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis

  • 1. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Hacking Telco equipment The HLR/HSS Laurent Ghigonis Security researcher at P1 Security
  • 2. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security What are we talking about ? A mobile network operator Core Network Network passive capture showing Global Titles
  • 3. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Mobile Operators • Conveys the majority of voice communications worldwide • Conveys our data • Conveys growing M2M traffic • Emergency systems notifications uses it => We now rely on it and we have some security expectations
  • 4. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Mobile Operators and governance • In Europe
  • 5. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Mobile Operators and governance • In France Lets check the reality …
  • 6. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HSS Front End HLR Front End AuC HSM Provisioning DSA 3 Back Ends Provisioning Gateway Install Server Admin Routing DSA The Witness : An HLR/HSS Typical HLR/HSS in use in operator Core Network
  • 7. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HLR/HSS in Mobile Core Network A mobile network operator Core Network Network passive capture showing Global Titles
  • 8. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HLR/HSS in Mobile Core Network
  • 9. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HLR/HSS in Mobile Core Network
  • 10. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HLR/HSS in Mobile Core Network • HLR is used in all 2G Operator Network • HSS is used in all 3G/4G Operator Network • Stores customer data – Subscriber identifier (IMSI) – Subscriber encryption keys – Subscriber approximate location – Subscriber SIM plan options • Critical to the operator – HLR down == Network down, no calls possible
  • 11. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HLR/HSS in Mobile Core Network HLR/HSS receiving subscriber location update from the operator SS7/Diameter signaling links
  • 12. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Lets make it talk …
  • 13. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security
  • 14. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Plan HLR/HSS Robustness assessment • Virtualization – Virtualization and instrumentation • System Analysis – Localroot, Framework complexity • Network Fuzzing – SS7 Protocols • Binaries Reverse – More vulns
  • 15. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HLR/HSS Virtualization No, it’s not ATCA / NFV
  • 16. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security An HLR/HSS is an ecosystem
  • 17. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security An HLR/HSS is an ecosystem • HLR + HSS Front-end • HLR Administration server • Application/Database routing servers • HLR Backend/Database (multiple) • HSM (Hardware Security Module) for keys
  • 18. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HLR/HSS is never alone
  • 19. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Where to start • Most exposed from the outside => HLR/HSS Front-end – Receives SS7/Diameter traffic • Telecom network stacks – Receives provisioning requests – Connected to the HSM
  • 20. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security HSS Front End HLR Front End AuC HSM Provisioning DSA 3 Back Ends Provisioning Gateway Install Server Admin Routing DSA Where to start Typical HLR/HSS in use in operator Core Network
  • 21. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Virtualization of HLR/HSS Frontend
  • 22. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Original Equipment Manufacturer • Specs of the real equipment – i386 / x64 / Sparc – Solaris / CentOS – 32 GB of RAM – CPU 16 Cores – TB hard drive + External SAN
  • 23. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Qemu/KVM • Faster than VirtualBox • More flexible • Tweak code to add more network interfaces • VDE Switch for networking
  • 24. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Qemu/KVM qemu-system-x86_64 -machine type=pc,accel=kvm:tcg -pidfile ./myhlr.pid -m 7.2g -smp 4 -drive file=/dev/mapper/lvm-vm--myhlr,cache=none -vnc 127.0.0.1:2,password,tls,lossy -display curses -rtc base=localtime,driftfix=slew -net vde,vlan=1,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=1,macaddr=52:54:00:00:10:01 -net vde,vlan=2,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=2,macaddr=52:54:00:00:10:02 -net vde,vlan=3,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=3,macaddr=52:54:00:00:10:02 -net vde,vlan=4, sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=4,macaddr=52:54:00:00:10:02 -net vde,vlan=5,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=5,macaddr=52:54:00:00:10:02 -net vde,vlan=6,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=6,macaddr=52:54:00:00:10:02 -net vde,vlan=7,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=7,macaddr=52:54:00:00:10:02 -net vde,vlan=8,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=8,macaddr=52:54:00:00:10:02 -net vde,vlan=9,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=9,macaddr=52:54:00:00:10:02 -net vde,vlan=10,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=10,macaddr=52:54:00:00:10:02 -net vde,vlan=11,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=11,macaddr=52:54:00:00:10:02 -net vde,vlan=12,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=12,macaddr=52:54:00:00:10:02 • Physical partition for disk – Do not use disk file on host btrfs • super slow • ext4 is ok – http://www.linux-kvm.org/page/Tuning_KVM • Curses output • Improvements: serial terminal
  • 25. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Qemu/KVM • Solaris 10 – Qemu/KVM ok for x64 – Fails for SPARC • Stock kernel – /kernel – /usr/kernel • Custom kernel modules – For Telecom Signaling [Signalware] • Uses grub • Failsafe mode
  • 26. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Inside the machine • ZFS filesystem • Solaris 10 • Everything is installed via packages • Multiple Oracle databases – Even on HLR/HSS Front-end only • A lot of Middleware framework to start the actual network stacks / applications • Telco stacks: based on Ulticom Signalware • The OS expects its precious network cards
  • 27. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security System Analysis
  • 28. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security The filesystem • ZFS = Filesystem + Volume manager • ZFS pool (often mirrored) – ZFS root pool • 100-200GB usually enough • Prepare free space for system/processes dump – ZFS Dump pool • Should be more than size of your RAM – ZFS SWAP pool • Should be more that size of your RAM
  • 29. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security The filesystem • ZFS offers good resilience against data corruption, and is very picky when there is too much corruption – You can’t recover when filesystem is too much broken – You can try $ zdb -e -p /dev/dsk/c0t3d0p0 -F -X -AAA -dd rpool 1 $ zpool import -f -F -X 19485729304958623456 mypool $ zpool import -o readonly=on -o autoreplace=on -o failmode-continue -m -N -f -F -X 19485729304958623456 mypool • If it fails – Code your own tool by modifying ZOL http://zfsonlinux.org/
  • 30. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Filesystem /advdata/ autoinstmnt/ bin@ boot/ cust_data/ dump@ environment.txt* etc/ export/ false/ global@ home/ installmnt/ kernel/ lib/ mnt/ net/ nsr/ opt/ patchmnt/ platform/ root/ rpool/ rtp_environ.txt sbin/ tftpboot/ ti_var/ tmp/ TspAcc@ TspAccBackup@ TspCore@ tspinst/ TspTickets@ updateSW/ usr/ var/ vol/ Grub/platform + failsafe Applications data Kernel Telco specific apps Home + Applications data + Telco specific apps Crashdumps from Telco specific apps
  • 31. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Some packages installed application SMAWrtp Telecommunication Service Platform (TSP) Base Package application OMNI Signalware System application S6U-4 Signalware System application OMNI-C7X Signalware C7 Extensions application INTPahacu AC Utimaco HSM
  • 32. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Low hanging fruits • SUID executables – SUID Total: 162 (155 binaries, 7 scripts) – SUID Root: 142 (137 binaries, 5 scripts) • Signalware Boot process “becoming root” by Design
  • 33. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Local roots • Of course, we often find multiple local roots • Some are really too easy (one command):
  • 34. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Example of Telco network stack: NSN TSP / RTP + Ulticom Signalware • TSP + RTP framework are found on NSN NT- HLR – Found in many European and Worldwide operators – Very similar to Apertio OneHLR • TSP: Telco Server Platform (Ericsson) / Telco Service Platform (NSN, others, generic name) • RTP: Resilient Telco Platform (NSN)
  • 35. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Example of Telco network stack: NSN TSP / RTP + Ulticom Signalware • SS7 Protocol handling Reminder: SS7 stack
  • 36. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Network Fuzzing
  • 37. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Fuzzing SS7: M3UA • Example: Flooding badly handled – Leads to alerts flooding in OSS – Leads to loss of previous alerts ! – P1VID#799
  • 38. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Fuzzing SS7: SCCP • Example result: 1 specific MSU repeated 2 times causes DoS of all Signaling Interconnections – HLR is down during 2 minutes – Total Denial of Service of the network – Nobody can receive calls in the whole country core 'core.xxx' of 15477: /export/home/xxx 01 msu_processing () 02 msg_distribution () 03 main () 04 _start () – If the attack is repeated, the DoS is permanent during the attack – P1VID#773 So long for the critical infrastructure …
  • 39. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Fuzzing SS7: SCCP
  • 40. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Fuzzing SS7: MAP • Example results: 1 specific MSU causes MAP process crashes – 5 MSU/second makes HLR totally unresponsive to any other MAP Query • Total Denial of Service of the network • Nobody can receive calls in the whole country – 1 MSU/second makes HLR totally drop 50% of other MAP Queries • Network is highly perturbed • 50% of the called in the whole country are failing – P1VID#772
  • 41. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Fuzzing Diameter • Process Crash with 1 specific manually crafted MSU Logs do not even report process crash. Neither the OSS Alerts. Application logs: Services_Esm_Log_Message: vc_Priority=LOG_ERR, vc_MessageInformation=ESM: Service could not be processed correctly, vc_AdditionalInformation=Reason: xxxxxxxxx data unavailable, Message Type: S6a-xxxxxxxxx Services_Esm_Log_Message: vc_Priority=LOG_ERR, vc_MessageInformation=ESM: Service could not be processed correctly, vc_AdditionalInformation=Reason: xxxxxxxxx data unavailable, Message Type: S6a-xxxxxxxxx UTC Tue Sep 3 01:20:44 2013 Services_Esm_Log_Message: vc_Priority=LOG_ERR, vc_MessageInformation=ESM: Service could not be processed correctly, vc_AdditionalInformation=Reason: xxxxxxxxx data unavailable, Message Type: S6a-xxxxxxxxx Services_Esm_Log_Message: vc_Priority=LOG_ERR, vc_MessageInformation=ESM: Service could not be processed correctly, vc_AdditionalInformation=Reason: xxxxxxxxx data unavailable, Message Type: S6a-xxxxxxxxx Behind that, process core dumps are created… P1VID#718
  • 42. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Does redundancy saves you ? • No ! • Same N front-ends == same crashes • Messages just needs to be sent N times
  • 43. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Binaries reverse
  • 44. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Often, too much help… • Binaries not stripped – Debug symbols / function names / … available • No anti-debug mechanism • Libraries headers on production machines – Great help in understanding the internals • Large documentation about internals on production machines – Great help in understanding the internals • Updated binaries and previous binaries both on production machines – Binary diff to track issues fixed
  • 45. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Signalware Kernel modules • Example: Parsing of SCCP header
  • 46. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Signalware Kernel modules • Kernel modules signaling parsing is robust • IPC to communicate with userland binaries • Complexity leads to other type of errors – Logic errors – Race conditions – Slow handling of some types of MSUs
  • 47. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Signalware userland binaries • Parsing less robust (less tested) • Example logic error due to IPC / Framework complexity: Can be triggered from the International SS7 network Null pointer dereference
  • 48. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security So verdict ?
  • 49. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security So verdict ? • Misconceptions! – No crashes on a Critical Core Network Element • FAIL – Robustness against network attacks • FAIL • Redundancy != Robust, attack kills Front-end one by one – Modern • Depends, but from what we see there is much room for improvement
  • 50. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Mobile Operators and governance • Reality on Threats analysis: Maybe • Reality of Telco equipment security: Very bad • Public information: Very bad • Telco private sector information: Didn’t see impact
  • 51. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Consequences • Mobile Network crashes for unknown publicly available reason • Spying on phone calls / customer activities from a single point (Core Network) is relatively easy • Fraud
  • 52. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Recommendations • Secure SDLC (Secure Software Development Life Cycle) – Design – Implementation – Testing • Especially for vendors custom stacks/services TCAP/MAP parsing bugs leading to overflows, … • Vendors security audits (HLR isolated) – System audit – Network audit • Testbed audits (HLR in environment) – System audit – Network audit – Before deploying to production
  • 53. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Recommendations: securing the OS • Use Solaris Zones to split services: P1VID#764 • Use Solaris Audit mechanism: P1VID#765 • Authenticate the hardware – To prevent emulation • Use the latest OS protections against exploitation – Solaris 11 has ASLR – Use custom Linux kernel • Use a firewall by default on the machine itself • …
  • 54. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Recommendations: OSS • Make it faster ! – People should be able to use it to react when under attack – E.g. NSN @vantage commander • Need access to all low-level network traffic for forensics
  • 55. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Recommendations: For the operators • Push the vendors to fix the bugs • Some of the attacks we discovered can be filtered – Operators do not have to wait for bugs to be fixed – Filter at perimeter boundaries (typically STP / Router) – Depends on STP / Router models and security “features” • Sometime filtering options are charged by vendor • It is possible to filter also at the SCCP provider level
  • 56. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security To be continued • Telecom Network Elements security is low – We tested multiple Network Element types/models, from different vendors • Vendors, Governments and security researchers have work to do • Vulnerability disclosure in security critical infrastructure is scarce – Dangerous ? – Not if there is collaboration
  • 57. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security Other aspects of Telecom Security • We talked here about equipment security – It’s a work in progress, and only HLR/HSS – Mainly Network Equipment Vendor responsibility • Also consider – Other Network Elements security – GRX / IPX / SCCP Providers security – Deployment security (passwords policies, filtering…), Operator responsability – Telecom Network Fraud (SS7 spoofing, Call/SMS Spoofing, …), Operator responsability
  • 58. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security References Governance literature on critical infrastructure: • European level – 2007: http://www.nato-pa.int/default.asp?COM=1165&LNG=0 – 2012 http://www.nato.int/cps/en/natolive/news_88054.htm?selectedLocale=en – 2013 http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/crisis-and- terrorism/critical-infrastructure/index_en.htm http://ec.europa.eu/dgs/home-affairs/what-we-do/policies/crisis-and- terrorism/critical-infrastructure/docs/swd_2013_318_on_epcip_en.pdf • France – 2012 http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000026638421 &dateTexte=&categorieLien=id – 2013 http://www.gouvernement.fr/gouvernement/livre-blanc-2013-de-la-defense-et- de-la-securite-nationale
  • 59. 2014, Hackito Ergo Sum - Security ConferenceHacking Telco equipment: The HLR/HSS – Laurent Ghigonis – P1 Security That’s it, please react. Thank you laurent@p1sec.com http://www.p1sec.com