SlideShare a Scribd company logo
1 of 50
Download to read offline
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Worldwide attacks
on SS7 network
P1 Security – Hackito Ergo Sum 26th April 2014
Pierre-Olivier Vauboin (po@p1sec.com)
Alexandre De Oliveira (alex@p1sec.com)
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Agenda
Overall telecom architecture
Architecture diagrams for 2G / 3G
Most important Network Elements
SS7 stack and interconnections
Practical attack scenarios
Mapping the SS7 network
Tracking user location
Sending spoofed SMS
Demo
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Telecom Overview
Evolution from 2G to 3G
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Practical Attack Scenarios
SS7 Attack Vectors
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Agenda
Overall telecom architecture
Architecture diagrams for 2G / 3G
Most important Network Elements
SS7 stack and interconnections
Practical attack scenarios
Mapping the SS7 network
Tracking user location
Sending spoofed SMS
Demo
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Siemens MSC
MSC: 5-50 per MNO
Connected to 20-50 BSC
In charge of call establishment
Interfaces the BSC toward the rest of the network
Connects the calls of the mobile users
UE is attached to one MSC
MAP Protocol
Generates CDR (Charging Data Record)
Security impact: Key compromise, content
compromise, regional DoS, location tracking, …
MSC
Mobile Switching Center
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
HLR: 1-20 per MNO
“Heart” of SS7 / SIGTRAN
Subscriber database
IMSI
Authentication (AuC) : Ki
Current subscriber location
Supplementary services
Queries from international partners (roaming)
MAP Protocol
Security impact: Key compromise, global DoS
HLR / HSS
Home Location Register
Home Subscriber Server
NSN HLR / HSS
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
HLR / HSS
Home Location Register
Home Subscriber Server
I’m Root !
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Agenda
Overall telecom architecture
Architecture diagrams for 2G / 3G
Most important Network Elements
SS7 stack and interconnections
Practical attack scenarios
Mapping the SS7 network
Tracking user location
Sending spoofed SMS
Demo
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Global SS7 network
• Private and secure SS7 network ?
• Interconnects many actors
• Different views depending on
interconnection point
• Malicious entry point to SS7 network:
• Through any unsecure operator and attack other
operators from there
• From Network Element OAM interface exposed on
Internet
• Through compromised Femto Cell
• … and more …
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SS7 / SIGTRAN Stack
Protocol Layers
SIGTRAN MAP Stack
SIGTRAN
Adaptation Layer
SS7 Session Layer
Routing Layer
Application Layer
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SS7 / SIGTRAN Stack
Addressing schemes
Point Code (PC)
14 or 24 bits address.
Equivalent to MAC address.
Global Title (GT)
Length up to 15 digits.
Looks like a phone number.
Equivalent to IP address.
SubSystem Number (SSN)
Identifies application or service on
Network Elements.
Equivalent to TCP port.
In Telecom networks a multitude of addressing schemes are used to
identify Network Elements, subscribers, applications
International Mobile
Subscriber Identity (IMSI)
SIM card number
International Mobile
Equipment Identity (IMEI)
Device serial number
Mobile Subscriber ISDN
Number (MSISDN)
Phone number
SS7 Routing criteria:
PC / GT / SSN or combo
STP
NE NE
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Agenda
Overall telecom architecture
Architecture diagrams for 2G / 3G
Most important Network Elements
SS7 stack and interconnections
Practical attack scenarios
Mapping the SS7 network
Tracking user location
Sending spoofed SMS
Demo
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
• Abusing legitimate messages (SRISM, SRI, ATI, …)
• Sending from any international SS7 interconnection
• Steps:
• Discovery scan and GT mapping: SCCP + TCAP
• Advanced attacks: specific MAP messages
• Targets:
• Attacking operators infrastructure
• Attacking subscribers
Practical Attack Scenarios
Scan methodology
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Discovery phase
• Publicly available information
• International PC lists
• GT prefix / country / operator
• Subscriber MSISDN lists
• Probing from UE
• SS codes: *#61#
• Send SMS to your own SMSC
to find your current MSC
• Changing GT prefix length
• Scan around confirmed targets
Finding the first targets
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Discovery phase
TCAP scan example Scan !
HLR Found!
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
2G / 3G Network Mapping
Active Network Mapping
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Agenda
Overall telecom architecture
Architecture diagrams for 2G / 3G
Most important Network Elements
SS7 stack and interconnections
Practical attack scenarios
Mapping the SS7 network
Tracking user location
Sending spoofed SMS
Demo
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Spying on users
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Tracking user location
• Based on non filtered MAP messages
• SRISM / SRI
• PSI / PSL
• ATI …
• Targeted towards HLR or MSC / VLR
• Accuracy:
• Depending on type of message allowed
• MSC GT (Accuracy: City / Region)
• CellID (Accuracy: Street)
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Tracking user locationGet MSC / VLR / CellID from SS7 (Example with MAP ATI)
$ python src/p1ss7ng/mapgsm_cellid.py 02f8xx002c9084
Mobile Country Code (MCC) : 208 (France)
Mobile Network Code (MNC) : xx (French Operator)
Location Area Code (LAC) : 194
Cell ID : 23
VLR GT12345000123
12345000123 MSC GT
02f802002c9084 Cell ID
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Tracking user locationOpen CellID databases
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Tracking user location
Low accuracy (MSC based location)
Source: Tobias Engel (CCC)
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Agenda
Overall telecom architecture
Architecture diagrams for 2G / 3G
Most important Network Elements
SS7 stack and interconnections
Practical attack scenarios
Mapping the SS7 network
Tracking user location
Sending spoofed SMS
Demo
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Sending SMS
MO / MT ForwardSM
• MAP messages
• MO: Mobile Originating
• MT: Mobile Terminating
• SMSC: SMS Center (SMSC GT list is public)
MSCMSC SMSC
MAP MO
ForwardSM
MAP MT
ForwardSM
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Sending SMS
Prerequisite to SMS: MAP SRISM
SMSC MSC
MT
MT
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SendRoutingInfoForSM
SS7 MAP SRISM
SCCP Dst GT == MSISDN
Destination phone number (MSISDN): 12340000001
SSN HLR
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Answer to SRISM
RoutingInfoForSM-Res ::= SEQUENCE {
imsi IMSI,
locationInfoWithLMSI[0] LocationInfoWithLMSI,
extensionContainer [4] ExtensionContainer
OPTIONAL,
...,
ip-sm-gwGuidance [5] IP-SM-GW-Guidance
OPTIONAL }
Answer comes from HLR
Get IMSI for
requested
MSISDN
Contains MSC GT
• Both IMSI and MSC GT are required to send
MAP MT Forward SM
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Answer to SRISM
SRISM answer reveals MSC GT and IMSI
MSC GT
IMSI
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SMS attacks
• Sending spam SMS
• Sending spoof SMS
• Bypassing SMS firewall
• Anti Spam protections
• MT FSM directly
targeting MSC
• Directly sent from
signalling protocol
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SMS attacks
Based on MAP MT-FSM (Mobile Terminated Forward Short Message)
Originating phone number
MAP MT FSM
SMS content
Spoof here !
12345000123
IMSI
MSC GT
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Originating Address
Try different encodings ! (Different screening rules)
12345000001
Hackito
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SMS spoofing
Spoofing police !
Also works with other special numbers:
• Emergency number
• Voice Mail number
• Operators services
• Other subscribers
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Counter measures
• SMS home routing
• SMS firewalls
• All incoming MAP MT Forward SM are routed
to SMS firewall for inspection
• Prevents against SMS attacks:
• SMS spam is detected and rejected
• SMS spoofed is detected and rejected
Protecting against SMS attacks
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SMS Home Routing
Protecting users privacy / Protecting against spam SMS
SMSC
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
MSC
MT
MT
SMS Home Routing
SMS are routed to SMS firewall for inspection
SMS
FirewallSMSC
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Counter Counter measures ?
• Can you actually bypass
SMS firewalls ?
• YES !
• How ?
• Directly sending MT Forward SM to MSC
• Route through SMS firewall is usually not enforced !
• This requires to scan and discover all available MSC prior
to send SMS
• Possible in a few hours
• MSC number: typically < 50
• Also require target IMSI (SRI / SRISM / sendIMSI)
How to bypass protections
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SMS Firewall bypassed
https://saas.p1sec.com/vulns/112
P1 Vulnerability Knowledge Base P1VID#112
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Telcomap project
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Worldwide discovery
• Discovery scan from international SS7
interconnection
• Targets: all operators / all countries
• Currently implemented testcases:
• GT/SSN discovery scan (SCCP / TCAP)
• MSISDN range scan (MAP SRI)
• More to come…
SS7map: Scanning the worldwide SS7 network
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
SS7 Map
Telecom Networks SS7 Exposure
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
GRX Map
PS, GPRS, LTE
http://sniffmap.telcomap.org/grx/
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Galaxy Map
ShodanHQ-like but for Telco
Shodan is only 10%
coverage of Telco
OAM and Signaling
But useful to “prove”
the seriousness:
anyone can get
access…
from Internet
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Sniffmap
Map of Five Eyes interception
http://sniffmap.telcomap.org/
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Attack surface
Telcomaps
Sniff Map SS7 Map
GRX Map Galaxy Map
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Going further
• MAP specification: 3GPP TS 29.002
http://www.3gpp.org/DynaReport/29002.htm
• SMS specification: 3GPP TS 23.040
http://www.3gpp.org/DynaReport/23040.htm
• SMS Home routing specification: 3GPP TS 23.840
http://www.3gpp.org/DynaReport/23840.htm
• Locating mobile phones using MSC GT (CCC)
http://events.ccc.de/congress/2008/Fahrplan/attachments/1262_25c3-locating-mobile-
phones.pdf
• Description of MAP usual callflows
http://www.netlab.tkk.fi/opetus/s383115/2007/kalvot/3115L7-9e.pdf
• P1 Security SaaS and Vulnerability Knowledge Base
https://saas.p1sec.com/
• SMS Gateways
http://www.vianett.com/
• Open Cell ID databases / API
http://opencellids.org/
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Thank you !
Questions ?
Thanks to
P1 Security team
Questions to:
po@p1sec.com
alex@p1sec.com
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Back up demo
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Back up demo
P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved
Back up demo

More Related Content

What's hot

IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session FlowKent Loh
 
Simplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice CallSimplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice Call3G4G
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration FlowKent Loh
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityP1Security
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI Mustafa Golam
 
3GPP_Overall_Architecture_and_Specifications.pdf
3GPP_Overall_Architecture_and_Specifications.pdf3GPP_Overall_Architecture_and_Specifications.pdf
3GPP_Overall_Architecture_and_Specifications.pdfAbubakar416712
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attachaliirfan04
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)3G4G
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flowassinha
 
Yeni Nesil DDOS Saldırıları ve Korunma Yöntemleri
Yeni Nesil DDOS Saldırıları ve Korunma YöntemleriYeni Nesil DDOS Saldırıları ve Korunma Yöntemleri
Yeni Nesil DDOS Saldırıları ve Korunma YöntemleriBGA Cyber Security
 

What's hot (20)

Worldwide attacks on SS7 network
Worldwide attacks on SS7 networkWorldwide attacks on SS7 network
Worldwide attacks on SS7 network
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
GTP Overview
GTP OverviewGTP Overview
GTP Overview
 
GPRS UMTS in the Core Network
GPRS UMTS in the Core NetworkGPRS UMTS in the Core Network
GPRS UMTS in the Core Network
 
3 g call flow
3 g call flow3 g call flow
3 g call flow
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
Assaulting diameter IPX network
Assaulting diameter IPX networkAssaulting diameter IPX network
Assaulting diameter IPX network
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
Simplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice CallSimplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice Call
 
IMS ENUM & DNS Mechanism
IMS ENUM & DNS MechanismIMS ENUM & DNS Mechanism
IMS ENUM & DNS Mechanism
 
IMS Registration Flow
IMS Registration FlowIMS Registration Flow
IMS Registration Flow
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
 
SGSN- serving gprs support node - Platform - HW, SW and CLI
SGSN- serving gprs support node  - Platform - HW, SW and CLI SGSN- serving gprs support node  - Platform - HW, SW and CLI
SGSN- serving gprs support node - Platform - HW, SW and CLI
 
3GPP_Overall_Architecture_and_Specifications.pdf
3GPP_Overall_Architecture_and_Specifications.pdf3GPP_Overall_Architecture_and_Specifications.pdf
3GPP_Overall_Architecture_and_Specifications.pdf
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attach
 
Call flows
Call flowsCall flows
Call flows
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 
Yeni Nesil DDOS Saldırıları ve Korunma Yöntemleri
Yeni Nesil DDOS Saldırıları ve Korunma YöntemleriYeni Nesil DDOS Saldırıları ve Korunma Yöntemleri
Yeni Nesil DDOS Saldırıları ve Korunma Yöntemleri
 

Similar to Worldwide attacks on SS7/SIGTRAN network

festival ICT 2013: Mobile Network Security: stato dell’arte e oltre
festival ICT 2013: Mobile Network Security: stato dell’arte e oltrefestival ICT 2013: Mobile Network Security: stato dell’arte e oltre
festival ICT 2013: Mobile Network Security: stato dell’arte e oltrefestival ICT 2016
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...EC-Council
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...Siddharth Rao
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...Gerardo Pardo-Castellote
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesPositiveTechnologies
 
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
 
SMEC ICT Business Division
SMEC ICT Business DivisionSMEC ICT Business Division
SMEC ICT Business DivisionHarry Sohn
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networksPositiveTechnologies
 
Netfors - general presentation
Netfors - general presentationNetfors - general presentation
Netfors - general presentationNetfors
 
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowejPLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowejPROIDEA
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionLuca Bongiorni
 
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdfAttacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdfssuser8b461f
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...EC-Council
 
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular NetworksIntermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks3G4G
 

Similar to Worldwide attacks on SS7/SIGTRAN network (20)

festival ICT 2013: Mobile Network Security: stato dell’arte e oltre
festival ICT 2013: Mobile Network Security: stato dell’arte e oltrefestival ICT 2013: Mobile Network Security: stato dell’arte e oltre
festival ICT 2013: Mobile Network Security: stato dell’arte e oltre
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
OMG DDS Security Submission Presentation (September 2013 - 6th Revised Submis...
 
NEETU CV .
NEETU CV .NEETU CV .
NEETU CV .
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
 
SMEC ICT Business Division
SMEC ICT Business DivisionSMEC ICT Business Division
SMEC ICT Business Division
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
Netfors - general presentation
Netfors - general presentationNetfors - general presentation
Netfors - general presentation
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowejPLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdfAttacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
 
RCS Demo HackingTeam
RCS Demo HackingTeam RCS Demo HackingTeam
RCS Demo HackingTeam
 
Intermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular NetworksIntermediate: Security in Mobile Cellular Networks
Intermediate: Security in Mobile Cellular Networks
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Worldwide attacks on SS7/SIGTRAN network

  • 1. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Worldwide attacks on SS7 network P1 Security – Hackito Ergo Sum 26th April 2014 Pierre-Olivier Vauboin (po@p1sec.com) Alexandre De Oliveira (alex@p1sec.com)
  • 2. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo
  • 3. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Telecom Overview Evolution from 2G to 3G
  • 4. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Practical Attack Scenarios SS7 Attack Vectors
  • 5. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo
  • 6. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Siemens MSC MSC: 5-50 per MNO Connected to 20-50 BSC In charge of call establishment Interfaces the BSC toward the rest of the network Connects the calls of the mobile users UE is attached to one MSC MAP Protocol Generates CDR (Charging Data Record) Security impact: Key compromise, content compromise, regional DoS, location tracking, … MSC Mobile Switching Center
  • 7. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved HLR: 1-20 per MNO “Heart” of SS7 / SIGTRAN Subscriber database IMSI Authentication (AuC) : Ki Current subscriber location Supplementary services Queries from international partners (roaming) MAP Protocol Security impact: Key compromise, global DoS HLR / HSS Home Location Register Home Subscriber Server NSN HLR / HSS
  • 8. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved HLR / HSS Home Location Register Home Subscriber Server I’m Root !
  • 9. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo
  • 10. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Global SS7 network • Private and secure SS7 network ? • Interconnects many actors • Different views depending on interconnection point • Malicious entry point to SS7 network: • Through any unsecure operator and attack other operators from there • From Network Element OAM interface exposed on Internet • Through compromised Femto Cell • … and more …
  • 11. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SS7 / SIGTRAN Stack Protocol Layers SIGTRAN MAP Stack SIGTRAN Adaptation Layer SS7 Session Layer Routing Layer Application Layer
  • 12. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SS7 / SIGTRAN Stack Addressing schemes Point Code (PC) 14 or 24 bits address. Equivalent to MAC address. Global Title (GT) Length up to 15 digits. Looks like a phone number. Equivalent to IP address. SubSystem Number (SSN) Identifies application or service on Network Elements. Equivalent to TCP port. In Telecom networks a multitude of addressing schemes are used to identify Network Elements, subscribers, applications International Mobile Subscriber Identity (IMSI) SIM card number International Mobile Equipment Identity (IMEI) Device serial number Mobile Subscriber ISDN Number (MSISDN) Phone number SS7 Routing criteria: PC / GT / SSN or combo STP NE NE
  • 13. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo
  • 14. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved • Abusing legitimate messages (SRISM, SRI, ATI, …) • Sending from any international SS7 interconnection • Steps: • Discovery scan and GT mapping: SCCP + TCAP • Advanced attacks: specific MAP messages • Targets: • Attacking operators infrastructure • Attacking subscribers Practical Attack Scenarios Scan methodology
  • 15. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Discovery phase • Publicly available information • International PC lists • GT prefix / country / operator • Subscriber MSISDN lists • Probing from UE • SS codes: *#61# • Send SMS to your own SMSC to find your current MSC • Changing GT prefix length • Scan around confirmed targets Finding the first targets
  • 16. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Discovery phase TCAP scan example Scan ! HLR Found!
  • 17. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved 2G / 3G Network Mapping Active Network Mapping
  • 18. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo
  • 19. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Spying on users
  • 20. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Tracking user location • Based on non filtered MAP messages • SRISM / SRI • PSI / PSL • ATI … • Targeted towards HLR or MSC / VLR • Accuracy: • Depending on type of message allowed • MSC GT (Accuracy: City / Region) • CellID (Accuracy: Street)
  • 21. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Tracking user locationGet MSC / VLR / CellID from SS7 (Example with MAP ATI) $ python src/p1ss7ng/mapgsm_cellid.py 02f8xx002c9084 Mobile Country Code (MCC) : 208 (France) Mobile Network Code (MNC) : xx (French Operator) Location Area Code (LAC) : 194 Cell ID : 23 VLR GT12345000123 12345000123 MSC GT 02f802002c9084 Cell ID
  • 22. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Tracking user locationOpen CellID databases
  • 23. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Tracking user location Low accuracy (MSC based location) Source: Tobias Engel (CCC)
  • 24. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo
  • 25. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Sending SMS MO / MT ForwardSM • MAP messages • MO: Mobile Originating • MT: Mobile Terminating • SMSC: SMS Center (SMSC GT list is public) MSCMSC SMSC MAP MO ForwardSM MAP MT ForwardSM
  • 26. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Sending SMS Prerequisite to SMS: MAP SRISM SMSC MSC MT MT
  • 27. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SendRoutingInfoForSM SS7 MAP SRISM SCCP Dst GT == MSISDN Destination phone number (MSISDN): 12340000001 SSN HLR
  • 28. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Answer to SRISM RoutingInfoForSM-Res ::= SEQUENCE { imsi IMSI, locationInfoWithLMSI[0] LocationInfoWithLMSI, extensionContainer [4] ExtensionContainer OPTIONAL, ..., ip-sm-gwGuidance [5] IP-SM-GW-Guidance OPTIONAL } Answer comes from HLR Get IMSI for requested MSISDN Contains MSC GT • Both IMSI and MSC GT are required to send MAP MT Forward SM
  • 29. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Answer to SRISM SRISM answer reveals MSC GT and IMSI MSC GT IMSI
  • 30. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SMS attacks • Sending spam SMS • Sending spoof SMS • Bypassing SMS firewall • Anti Spam protections • MT FSM directly targeting MSC • Directly sent from signalling protocol
  • 31. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SMS attacks Based on MAP MT-FSM (Mobile Terminated Forward Short Message) Originating phone number MAP MT FSM SMS content Spoof here ! 12345000123 IMSI MSC GT
  • 32. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Originating Address Try different encodings ! (Different screening rules) 12345000001 Hackito
  • 33. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SMS spoofing Spoofing police ! Also works with other special numbers: • Emergency number • Voice Mail number • Operators services • Other subscribers
  • 34. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Counter measures • SMS home routing • SMS firewalls • All incoming MAP MT Forward SM are routed to SMS firewall for inspection • Prevents against SMS attacks: • SMS spam is detected and rejected • SMS spoofed is detected and rejected Protecting against SMS attacks
  • 35. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SMS Home Routing Protecting users privacy / Protecting against spam SMS SMSC
  • 36. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved MSC MT MT SMS Home Routing SMS are routed to SMS firewall for inspection SMS FirewallSMSC
  • 37. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Counter Counter measures ? • Can you actually bypass SMS firewalls ? • YES ! • How ? • Directly sending MT Forward SM to MSC • Route through SMS firewall is usually not enforced ! • This requires to scan and discover all available MSC prior to send SMS • Possible in a few hours • MSC number: typically < 50 • Also require target IMSI (SRI / SRISM / sendIMSI) How to bypass protections
  • 38. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SMS Firewall bypassed https://saas.p1sec.com/vulns/112 P1 Vulnerability Knowledge Base P1VID#112
  • 39. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Telcomap project
  • 40. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Worldwide discovery • Discovery scan from international SS7 interconnection • Targets: all operators / all countries • Currently implemented testcases: • GT/SSN discovery scan (SCCP / TCAP) • MSISDN range scan (MAP SRI) • More to come… SS7map: Scanning the worldwide SS7 network
  • 41. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved SS7 Map Telecom Networks SS7 Exposure
  • 42. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved GRX Map PS, GPRS, LTE http://sniffmap.telcomap.org/grx/
  • 43. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Galaxy Map ShodanHQ-like but for Telco Shodan is only 10% coverage of Telco OAM and Signaling But useful to “prove” the seriousness: anyone can get access… from Internet
  • 44. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Sniffmap Map of Five Eyes interception http://sniffmap.telcomap.org/
  • 45. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Attack surface Telcomaps Sniff Map SS7 Map GRX Map Galaxy Map
  • 46. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Going further • MAP specification: 3GPP TS 29.002 http://www.3gpp.org/DynaReport/29002.htm • SMS specification: 3GPP TS 23.040 http://www.3gpp.org/DynaReport/23040.htm • SMS Home routing specification: 3GPP TS 23.840 http://www.3gpp.org/DynaReport/23840.htm • Locating mobile phones using MSC GT (CCC) http://events.ccc.de/congress/2008/Fahrplan/attachments/1262_25c3-locating-mobile- phones.pdf • Description of MAP usual callflows http://www.netlab.tkk.fi/opetus/s383115/2007/kalvot/3115L7-9e.pdf • P1 Security SaaS and Vulnerability Knowledge Base https://saas.p1sec.com/ • SMS Gateways http://www.vianett.com/ • Open Cell ID databases / API http://opencellids.org/
  • 47. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Thank you ! Questions ? Thanks to P1 Security team Questions to: po@p1sec.com alex@p1sec.com
  • 48. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Back up demo
  • 49. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Back up demo
  • 50. P1 Security – Hackito Ergo Sum 2014 © 2014 - P1 Security, All Rights Reserved Back up demo