SlideShare a Scribd company logo
1 of 56
Download to read offline
Ch 2: Hacking the Cellular
Network
CNIT 128:
Hacking Mobile
Devices
Updated 1-14-16
Basics
GSM/CDMA
• We'll start with a standard carrier network
using
– Global System for Mobile (GSM), or
– Code Division Multiple Access (CDMA)
• With these functions
– Phone calls
– Text messages via Short Message Service (SMS)
– Multimedia Messaging Service (MMS)
– Data connectivity via IP
Basic Cellular Network
Functionality
Interoperability
• Different carriers and connection methods
can connect to one another seamlessly
• A GSM phone can text or call a CDMA
phone
Functions to Target
• All major cellular networks support
– Voice calls
– Voice mail (VM)
– Short Message Service (SMS)
– Location-based Services (LBS)
– IP Connectivity
• Most also support
– Binary configuration messages
– Multimedia messages (MMS)
– Faxing
Players
• Customer is on the left
– Known as Mobile Terminals (MTs) in GSM
• Connect to antennas
– Called Base Transceiver Stations (BTS)
– The connection from a mobile device to a BTS
is called an Um (U-channel mobile)
Players
• Each BTS connects to a base station
– A rack of equipment that takes the signals the
antenna receives and converts them to digital
packetized data
– Base station has two components
• Base Station Controller (BSC) for voice and
control
• Packet Control Unit (PCU) for forwarding IP
packets and managing mobile IP
Players
• Base Station Subsystem (BSS)
– Includes BTS, BSC, and PCU
– Can be owned by people who are not part of
a large carrier
Voice Calls
• Time Division Multiplexing (TDM)
– Tried-and-true method for dividing radio
capacity among many devices
• Time Division Multiple Access (TDMA)
– Each device gets time slots
– Very successful for slow and medium bit rates
– Devices 1, 2, and 3 might get these time slots
1 2 3 1 2 3
Control Channels
• Traffic channels
– Carry voice data
• Control channels
– Manage association, usage, handoff, and
disconnection
• Cell phone jammer
– A loud, badly tuned, transmitter
– Easy to build
– Illegal
The Broadcast Control Channel:

Learning About the Network
• When a device first turns on, it listens on
standard frequencies
• First thing it hears will be BCCH
(Broadcast Control Channel)
– Allows the device to synchronize and
understand which network it is attaching to
– Features of the network the BTS (Base
Transceiver Station) is serving
RACH (Random Access Channel)
• The mobile device then knows how to
access the RACH
– The first step in a GSM handshake
– How the mobile asks for information
– Mobile sends a channel request via the RACH
– BTS tries to service the request
Standalone Dedicated Control
Channel (SDDCH) &

Access Granted Channel (AGCH)
• If the BTS has slots available, it assigns a control
channel, called the Standalone Dedicated
Control Channel (SDDCH) to the mobile device
• The BTS tells the mobile about this assignment
via the Access Granted Channel (AGCH)
• Once the mobile has received a SDCCH, it's a
member of the network and can request a
location update
Location Update
• Mobile device is telling the GSM network
what area it's in
• Requires authentication with the network
• Informs the Home Location Register (HLR)
– Database of subscriber information
• Of the mobile's geographic area
– Hence, which Mobile Switching Center (MSC) a
device is located within
Sleep
• Once a mobile device has performed a
location update
• The BSC tells the mobile to go to sleep
– By deallocating the SDCCH
• This maximizes reuse and capacity in
dense cells
Authentication and A5/1, CAVE, and
AKA
• A5/* ciphers are used in GSM networks
– Crackable – see link Ch 2a
• CAVE and AKA are used in CDMA
Voicemail
• Trivial hack: default password
– Enough to make a world of trouble for Rupert
Murdoch
• Many carriers use IP-based voicemail
– Using IMAP servers (originally designed for
email)
Short Message Service (SMS)
• Sent via control channel
• An SMS flood could DoS voice service for a
whole city from a single attacking device
– Link Ch 2b2
SMS Channels
• SMS messages are delivered over either
– SDCCH when a user is not on a call
– or the Slow Associated Control Channel
(SACCH) if the user is talking at the time
• Reasonably achievable SMS floods wouldn't
stop voice calls in practice
SMS Service Center (SMSC)
• SMSCs carry most of the SMS messages
when SMS message storm happens
• It's the hardest working piece of
equipment in modern cellular provider
networks
Other Uses for SMS Messages
• Java implemented per-application
messaging using
• Java Mobile Information Device Profile
(MIDP) and Connected Limited Device
Configuration (CLDC), which use a
• User Data Header (UDH) specifying a port
to send the message to
– Ports are not UDP or TCP ports, but similar
Other SMS Messages
• SMS is used not just between users
• But between network elements, like
configuration servers
• For peer-to-peer Java apps
• UDH features
SMS Lacks Security Controls
• SMS messages have
– No authentication
– No integrity checking
– No confidentiality
• So apps shouldn't trust what they get too
much
SMS Origin Spoofing
• iOS displays the number in the "reply-to"
field in the SMS header as the origin of an
SMS message
– Instead of the actual origin number
• So it's easy to send SMS messages that
appear to come from someone else
– Link Ch 2c
Fake SMS Messages
• On Android, a malicious app can fool your
device into displaying a fake SMS message
– Link Ch 2d
Attacks and Countermeasures
Hacking Mobile Voicemail
• MNOs often configure voicemail accounts
insecurely
– No authentication required if the user's own
phone is used to fetch the messages
• With a PBX sever like Asterisk, anyone can
easily spoof any caller ID value
• All they need is your phone number
Internet Spoofing Services
• Link Ch 2f
Countermeasures for Mobile Voicemail
Hacks
• Set a voicemail password
• Configure access so that entering the
password is required from all phones,
including yours
Rogue Mobile Devices
• An evil phone could attack the mobile
network (theoretical attack only)
• Phone OS is not hard to understand,
basically
– iOS is BSD
– Android is Linux
• A modified phone could jam or modify
broadcast signals from a BTS
– But it would only affect a small area
Rogue Mobile Device Countermeasures
• The cellular network is carved up into
many small parts
• Radio earshot is only a few hundred yards
in a city, or a few miles on flat terrain
• Just a normal radio jammer would be
more effective
Early Rogue Station Attacks
• Until recently, carriers assumed that
attackers lacked the skill to build a base
station, so
• Network required authentication from the
phone, but
• Phone didn't require authentication from
the network
• So it was simple to emulate a cellular
network
Attacking in the 1990s
Base Station Hardware
• A normal cell phone could act as a base
station with only a software change
• A phone in "engineering mode" could sniff
radio traffic on all bands at the same time
• Packets can be logged via RS232
• You get voice and SMS traffic
• Flash phone via USB cable
Legal Warning
• This was all fantastically illegal, of course
• Wiretapping laws are scary
• We won't do illegal projects in this class
• I don't plan to do any rogue base station
projects this semester
Hacking in 2002
• Rhode & Schwartz sold test gear for SMS
networks, including BTS emulation
• Cost was six 

figures
Rogue Base Station Countermeasures
• It's up to the carriers to authenticate their
networks
• There's nothing an end-user can do
Femtocell
• A device you can
purchase
• Gives a stronger
cell phone signal
in your building
• Connects to your
broadband
Internet
• Link Ch 2i
Rogue Femtocell Attacks
• OpenBTS: free software that can be used
to make a fake base station for about
$1500 in 2009
• Femtocells are even simpler
Femtocell
• A tiny box with connectors for antenna,
power, and Ethernet
• Generic Linux distribution running several
specialized apps
• Loads a couple of drivers
• Includes some simple radios
Femtocell Functions
• Control signaling
– Call setup and teardown and SMS messaging
• Converting normal voice calls into real-
time protocol streams
• Associated SIP setup
• Backhaul link uses IPsec connections to
special security gateways on the mobile
network operator side
Information Disclosure
• Femtocells receive raw secrets used to
authenticate devices from carriers
• They are encrypted in transit with IPsec,
but they are present in the femtocell's
software and hardware
– Hacking AT&T Femtocell (link Ch 2g)
– Hacking a Vodaphone Femtocell (link Ch 2h)
Femtocell Membership
• Carriers could limit membership to a few
cell phones for a single femtocell
• But why not let everyone in? That
expands their coverage for free!
• But it also means customers are using
untrustworthy devices and they have no
way to know that
Countermeasures for Rogue Femtocells
• Femtocells should be more limited in
function
• Networks need to authenticate
themselves to the handsets reliably
• SIP and IPsec allow for strong
authentication
• We just need new standards that use
them
The Brave New World of IP
IMS (IP Multimedia Subsystem)
• Carriers are moving to an IP-only system
• No more
– Packetized voice
– Loss of data service while on a phone call
– Low-speed data links
• Everything will use a baseband that
connects to a high-speed IP network
Changes to Services
IMS Architecture
Long-Term Evolution (LTE)
• Devices connect via IP networks to
services, protected by gateways
• As networks move from GSM or CDMA to
LTE, these changes occur:
– Unified bearer protocol—IP
– IMS network can service any IP client,
including PC, laptop, tablet, smartphone
– All these devices could interoperate and
replace one another, someday

More Related Content

What's hot

First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
Muhammad Uzair Rasheed
 

What's hot (20)

Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
 
IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 
2 g vs-3g drive
2 g vs-3g drive2 g vs-3g drive
2 g vs-3g drive
 
Ims, Ip Multimedia System
Ims, Ip Multimedia SystemIms, Ip Multimedia System
Ims, Ip Multimedia System
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
Gsm training
Gsm trainingGsm training
Gsm training
 
Gsm air interface
Gsm air interface Gsm air interface
Gsm air interface
 
Gsm
GsmGsm
Gsm
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
BASIC GSM
BASIC GSMBASIC GSM
BASIC GSM
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
First generation network
First generation networkFirst generation network
First generation network
 
FDMA
FDMAFDMA
FDMA
 

Viewers also liked

Linen fabrics are soft and gentle
Linen fabrics are soft and gentleLinen fabrics are soft and gentle
Linen fabrics are soft and gentle
lisamartin102
 
Perfil descriptivo de clase matematicas I
Perfil descriptivo de clase matematicas IPerfil descriptivo de clase matematicas I
Perfil descriptivo de clase matematicas I
rubenleur
 

Viewers also liked (20)

CNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystemCNIT 128 Ch 1: The mobile risk ecosystem
CNIT 128 Ch 1: The mobile risk ecosystem
 
Is Your Mobile App Secure?
Is Your Mobile App Secure?Is Your Mobile App Secure?
Is Your Mobile App Secure?
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Ericsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of thingsEricsson ConsumerLab: Wearable technology and the internet of things
Ericsson ConsumerLab: Wearable technology and the internet of things
 
Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016Flashpoint hacking forisis_april2016
Flashpoint hacking forisis_april2016
 
Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle Focus on cyber threats in hacking cycle
Focus on cyber threats in hacking cycle
 
Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
 
7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost7 Pillars of Growth Hacking - Chris Out from RockBoost
7 Pillars of Growth Hacking - Chris Out from RockBoost
 
13 florida dot 2013 libro verde
13 florida dot 2013 libro verde13 florida dot 2013 libro verde
13 florida dot 2013 libro verde
 
Linen fabrics are soft and gentle
Linen fabrics are soft and gentleLinen fabrics are soft and gentle
Linen fabrics are soft and gentle
 
Perfil descriptivo de clase matematicas I
Perfil descriptivo de clase matematicas IPerfil descriptivo de clase matematicas I
Perfil descriptivo de clase matematicas I
 
Plantilla monte chullo_2011 corregido (1)
Plantilla monte chullo_2011 corregido (1)Plantilla monte chullo_2011 corregido (1)
Plantilla monte chullo_2011 corregido (1)
 
PORFOLIO PROYECTOS ESTUDIO DECORACION MONICAMUGUET
PORFOLIO PROYECTOS ESTUDIO DECORACION MONICAMUGUETPORFOLIO PROYECTOS ESTUDIO DECORACION MONICAMUGUET
PORFOLIO PROYECTOS ESTUDIO DECORACION MONICAMUGUET
 
El verdadero secreto
El verdadero secretoEl verdadero secreto
El verdadero secreto
 
Vsm Voc Brownbag Webinar 0610009
Vsm Voc Brownbag Webinar 0610009Vsm Voc Brownbag Webinar 0610009
Vsm Voc Brownbag Webinar 0610009
 
12 de febrero 2014
12 de febrero 201412 de febrero 2014
12 de febrero 2014
 
Summtgart imkereibroschüre
Summtgart imkereibroschüreSummtgart imkereibroschüre
Summtgart imkereibroschüre
 
ALMERICH at I Saloni Moscow 2014
ALMERICH at I Saloni Moscow 2014ALMERICH at I Saloni Moscow 2014
ALMERICH at I Saloni Moscow 2014
 

Similar to CNIT 128 Ch 2: Hacking the cellular network

694 cellular network
694 cellular network694 cellular network
694 cellular network
Anubha Rai
 
Mobile wireles-computing
Mobile wireles-computingMobile wireles-computing
Mobile wireles-computing
Luthfi Prayoga
 

Similar to CNIT 128 Ch 2: Hacking the cellular network (20)

128-ch2.pptx
128-ch2.pptx128-ch2.pptx
128-ch2.pptx
 
694_CELLULAR_NETWORK.ppt
694_CELLULAR_NETWORK.ppt694_CELLULAR_NETWORK.ppt
694_CELLULAR_NETWORK.ppt
 
Mobile Handset Cellular Network
Mobile Handset Cellular NetworkMobile Handset Cellular Network
Mobile Handset Cellular Network
 
5432_CELLULAR_NETWORK.ppt
5432_CELLULAR_NETWORK.ppt5432_CELLULAR_NETWORK.ppt
5432_CELLULAR_NETWORK.ppt
 
Cellular network
Cellular networkCellular network
Cellular network
 
2G_3G_4G_Tutorial.ppt
2G_3G_4G_Tutorial.ppt2G_3G_4G_Tutorial.ppt
2G_3G_4G_Tutorial.ppt
 
1cellulñar network
1cellulñar network1cellulñar network
1cellulñar network
 
5432 cellular network
5432 cellular network5432 cellular network
5432 cellular network
 
5432 cellular network
5432 cellular network5432 cellular network
5432 cellular network
 
2 g 3g_4g_tutorial
2 g 3g_4g_tutorial2 g 3g_4g_tutorial
2 g 3g_4g_tutorial
 
Telecom journey tutorial
Telecom journey tutorialTelecom journey tutorial
Telecom journey tutorial
 
cellular networks
 cellular networks cellular networks
cellular networks
 
694 cellular network
694 cellular network694 cellular network
694 cellular network
 
mkkk
mkkkmkkk
mkkk
 
Cellular network
Cellular networkCellular network
Cellular network
 
MK by Mobile Communication
MK by Mobile Communication MK by Mobile Communication
MK by Mobile Communication
 
Lectures on 2 g,3g,3.5g,4g
Lectures on 2 g,3g,3.5g,4gLectures on 2 g,3g,3.5g,4g
Lectures on 2 g,3g,3.5g,4g
 
Lectures on 2 g,3g,3.5g,4g By Professor Dr Arshad Abbas Khan
Lectures on 2 g,3g,3.5g,4g By Professor Dr Arshad Abbas KhanLectures on 2 g,3g,3.5g,4g By Professor Dr Arshad Abbas Khan
Lectures on 2 g,3g,3.5g,4g By Professor Dr Arshad Abbas Khan
 
Mobile wireles-computing
Mobile wireles-computingMobile wireles-computing
Mobile wireles-computing
 
GSM Part-20
GSM Part-20GSM Part-20
GSM Part-20
 

More from Sam Bowne

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

CNIT 128 Ch 2: Hacking the cellular network

  • 1. Ch 2: Hacking the Cellular Network CNIT 128: Hacking Mobile Devices Updated 1-14-16
  • 3. GSM/CDMA • We'll start with a standard carrier network using – Global System for Mobile (GSM), or – Code Division Multiple Access (CDMA) • With these functions – Phone calls – Text messages via Short Message Service (SMS) – Multimedia Messaging Service (MMS) – Data connectivity via IP
  • 4.
  • 6. Interoperability • Different carriers and connection methods can connect to one another seamlessly • A GSM phone can text or call a CDMA phone
  • 7. Functions to Target • All major cellular networks support – Voice calls – Voice mail (VM) – Short Message Service (SMS) – Location-based Services (LBS) – IP Connectivity • Most also support – Binary configuration messages – Multimedia messages (MMS) – Faxing
  • 8.
  • 9. Players • Customer is on the left – Known as Mobile Terminals (MTs) in GSM • Connect to antennas – Called Base Transceiver Stations (BTS) – The connection from a mobile device to a BTS is called an Um (U-channel mobile)
  • 10. Players • Each BTS connects to a base station – A rack of equipment that takes the signals the antenna receives and converts them to digital packetized data – Base station has two components • Base Station Controller (BSC) for voice and control • Packet Control Unit (PCU) for forwarding IP packets and managing mobile IP
  • 11. Players • Base Station Subsystem (BSS) – Includes BTS, BSC, and PCU – Can be owned by people who are not part of a large carrier
  • 12. Voice Calls • Time Division Multiplexing (TDM) – Tried-and-true method for dividing radio capacity among many devices • Time Division Multiple Access (TDMA) – Each device gets time slots – Very successful for slow and medium bit rates – Devices 1, 2, and 3 might get these time slots 1 2 3 1 2 3
  • 13. Control Channels • Traffic channels – Carry voice data • Control channels – Manage association, usage, handoff, and disconnection • Cell phone jammer – A loud, badly tuned, transmitter – Easy to build – Illegal
  • 14. The Broadcast Control Channel:
 Learning About the Network • When a device first turns on, it listens on standard frequencies • First thing it hears will be BCCH (Broadcast Control Channel) – Allows the device to synchronize and understand which network it is attaching to – Features of the network the BTS (Base Transceiver Station) is serving
  • 15. RACH (Random Access Channel) • The mobile device then knows how to access the RACH – The first step in a GSM handshake – How the mobile asks for information – Mobile sends a channel request via the RACH – BTS tries to service the request
  • 16. Standalone Dedicated Control Channel (SDDCH) &
 Access Granted Channel (AGCH) • If the BTS has slots available, it assigns a control channel, called the Standalone Dedicated Control Channel (SDDCH) to the mobile device • The BTS tells the mobile about this assignment via the Access Granted Channel (AGCH) • Once the mobile has received a SDCCH, it's a member of the network and can request a location update
  • 17.
  • 18. Location Update • Mobile device is telling the GSM network what area it's in • Requires authentication with the network • Informs the Home Location Register (HLR) – Database of subscriber information • Of the mobile's geographic area – Hence, which Mobile Switching Center (MSC) a device is located within
  • 19. Sleep • Once a mobile device has performed a location update • The BSC tells the mobile to go to sleep – By deallocating the SDCCH • This maximizes reuse and capacity in dense cells
  • 20. Authentication and A5/1, CAVE, and AKA • A5/* ciphers are used in GSM networks – Crackable – see link Ch 2a • CAVE and AKA are used in CDMA
  • 21. Voicemail • Trivial hack: default password – Enough to make a world of trouble for Rupert Murdoch • Many carriers use IP-based voicemail – Using IMAP servers (originally designed for email)
  • 22. Short Message Service (SMS) • Sent via control channel • An SMS flood could DoS voice service for a whole city from a single attacking device – Link Ch 2b2
  • 23. SMS Channels • SMS messages are delivered over either – SDCCH when a user is not on a call – or the Slow Associated Control Channel (SACCH) if the user is talking at the time • Reasonably achievable SMS floods wouldn't stop voice calls in practice
  • 24. SMS Service Center (SMSC) • SMSCs carry most of the SMS messages when SMS message storm happens • It's the hardest working piece of equipment in modern cellular provider networks
  • 25. Other Uses for SMS Messages • Java implemented per-application messaging using • Java Mobile Information Device Profile (MIDP) and Connected Limited Device Configuration (CLDC), which use a • User Data Header (UDH) specifying a port to send the message to – Ports are not UDP or TCP ports, but similar
  • 26. Other SMS Messages • SMS is used not just between users • But between network elements, like configuration servers • For peer-to-peer Java apps • UDH features
  • 27. SMS Lacks Security Controls • SMS messages have – No authentication – No integrity checking – No confidentiality • So apps shouldn't trust what they get too much
  • 28. SMS Origin Spoofing • iOS displays the number in the "reply-to" field in the SMS header as the origin of an SMS message – Instead of the actual origin number • So it's easy to send SMS messages that appear to come from someone else – Link Ch 2c
  • 29. Fake SMS Messages • On Android, a malicious app can fool your device into displaying a fake SMS message – Link Ch 2d
  • 31. Hacking Mobile Voicemail • MNOs often configure voicemail accounts insecurely – No authentication required if the user's own phone is used to fetch the messages • With a PBX sever like Asterisk, anyone can easily spoof any caller ID value • All they need is your phone number
  • 33. Countermeasures for Mobile Voicemail Hacks • Set a voicemail password • Configure access so that entering the password is required from all phones, including yours
  • 34. Rogue Mobile Devices • An evil phone could attack the mobile network (theoretical attack only) • Phone OS is not hard to understand, basically – iOS is BSD – Android is Linux • A modified phone could jam or modify broadcast signals from a BTS – But it would only affect a small area
  • 35. Rogue Mobile Device Countermeasures • The cellular network is carved up into many small parts • Radio earshot is only a few hundred yards in a city, or a few miles on flat terrain • Just a normal radio jammer would be more effective
  • 36. Early Rogue Station Attacks • Until recently, carriers assumed that attackers lacked the skill to build a base station, so • Network required authentication from the phone, but • Phone didn't require authentication from the network • So it was simple to emulate a cellular network
  • 38.
  • 39. Base Station Hardware • A normal cell phone could act as a base station with only a software change • A phone in "engineering mode" could sniff radio traffic on all bands at the same time • Packets can be logged via RS232 • You get voice and SMS traffic • Flash phone via USB cable
  • 40. Legal Warning • This was all fantastically illegal, of course • Wiretapping laws are scary • We won't do illegal projects in this class • I don't plan to do any rogue base station projects this semester
  • 41. Hacking in 2002 • Rhode & Schwartz sold test gear for SMS networks, including BTS emulation • Cost was six 
 figures
  • 42. Rogue Base Station Countermeasures • It's up to the carriers to authenticate their networks • There's nothing an end-user can do
  • 43. Femtocell • A device you can purchase • Gives a stronger cell phone signal in your building • Connects to your broadband Internet • Link Ch 2i
  • 44. Rogue Femtocell Attacks • OpenBTS: free software that can be used to make a fake base station for about $1500 in 2009 • Femtocells are even simpler
  • 45.
  • 46. Femtocell • A tiny box with connectors for antenna, power, and Ethernet • Generic Linux distribution running several specialized apps • Loads a couple of drivers • Includes some simple radios
  • 47. Femtocell Functions • Control signaling – Call setup and teardown and SMS messaging • Converting normal voice calls into real- time protocol streams • Associated SIP setup • Backhaul link uses IPsec connections to special security gateways on the mobile network operator side
  • 48. Information Disclosure • Femtocells receive raw secrets used to authenticate devices from carriers • They are encrypted in transit with IPsec, but they are present in the femtocell's software and hardware – Hacking AT&T Femtocell (link Ch 2g) – Hacking a Vodaphone Femtocell (link Ch 2h)
  • 49.
  • 50. Femtocell Membership • Carriers could limit membership to a few cell phones for a single femtocell • But why not let everyone in? That expands their coverage for free! • But it also means customers are using untrustworthy devices and they have no way to know that
  • 51. Countermeasures for Rogue Femtocells • Femtocells should be more limited in function • Networks need to authenticate themselves to the handsets reliably • SIP and IPsec allow for strong authentication • We just need new standards that use them
  • 52. The Brave New World of IP
  • 53. IMS (IP Multimedia Subsystem) • Carriers are moving to an IP-only system • No more – Packetized voice – Loss of data service while on a phone call – Low-speed data links • Everything will use a baseband that connects to a high-speed IP network
  • 56. Long-Term Evolution (LTE) • Devices connect via IP networks to services, protected by gateways • As networks move from GSM or CDMA to LTE, these changes occur: – Unified bearer protocol—IP – IMS network can service any IP client, including PC, laptop, tablet, smartphone – All these devices could interoperate and replace one another, someday