SlideShare a Scribd company logo
1 of 24
Download to read offline
SRLabs	
  Template	
  v12	
  
Mobile	
  Network	
  A9ack	
  Evolu=on	
  
Karsten	
  Nohl	
  <nohl@srlabs.de>	
  
Security	
  research	
  is	
  successful	
  if	
  vulnerabili=es	
  get	
  removed	
  
2	
  
Industry	
  	
  
	
  
assesses	
  impact	
  
and	
  implements	
  
counter	
  measures	
  
Security	
  researchers	
  	
  
	
  
discover	
  new	
  
vulnerability	
  classes	
  
(and	
  some=mes	
  
mi=ga=ons)	
  
This	
  talk	
  focuses	
  on	
  the	
  industry	
  response	
  to	
  
mobile	
  network	
  security	
  research	
  
Agenda	
  
3	
  
§  Advanced	
  SIM	
  card	
  a<acks	
  
§  Advanced	
  GSM	
  intercept	
  
§  Keeping	
  network	
  operators	
  honest	
  
SIM	
  cards	
  are	
  fully	
  programmable	
  computer	
  systems	
  
4	
  
Applica=ons	
  on	
  modern	
  SIM	
  card	
  
Basic	
  func=ons	
  
§  Iden=fica=on	
  (IMSI)	
  
§  Authen=ca=on	
  	
  
(Ki	
  &	
  Hash	
  func=on)	
  
Simple	
  file	
  system	
  
§  Address	
  book	
  
§  SMS	
  messages	
  
§  Session	
  keys	
  
Custom	
  Java	
  apps	
  	
  
§  Roaming	
  mgmt	
  
§  Payment	
  
§  Tracking	
  
Java	
  virtual	
  machine	
  
Smartcard	
  with	
  real-­‐=me	
  opera=ng	
  system	
  
SIM	
  have	
  many	
  security	
  layers	
  from	
  smartcards	
  to	
  cryptography	
  
and	
  Java	
  process	
  separa=on	
  
5	
  
by	
  cryptographic	
  hash	
  func=on	
  
(oVen	
  Comp128	
  in	
  GSM;	
  	
  
Milenage	
  in	
  3G/4G)	
  
User	
  authen=ca=on	
  
by	
  simple	
  comparison	
  
	
  	
  	
  Secure	
  Java	
  deployment	
  
using	
  DES/3DES/AES	
  
signature	
  +	
  encryp=on	
  
SIM	
  authen=ca=on	
  
Individual	
  protec=on	
  
logic	
  for	
  banking	
  
applets,	
  iden=fica=on	
  
applets,	
  etc.	
  
…	
  
Java	
  crypto	
  API:	
  DES/3DES/AES;	
  
some=mes	
  RSA	
  
Applica=on	
  separa=on:	
  	
  
Java	
  VM	
  sand	
  boxing	
  
SIM	
  card	
  includes	
  various	
  protec=on	
  mechanisms	
  
Ki	
  
PIN/PUK	
  
numbers	
  
OTA	
  
keys	
  
through	
  proprietary	
  smartcard	
  
security	
  mechanisms	
  
Storage	
  protec=on	
  
OTA	
  security	
  level	
  is	
  chosen	
  by	
  server	
  while	
  SIM	
  
enforces	
  mandatory	
  minimum	
  level	
  
6	
  
ILLUSTRATIVE	
  
OTA	
  server	
  
ini=ates	
  
remote	
  
transac=on	
  
Binary	
  SMS	
  communica=on	
  
Response	
  protected	
  
according	
  to	
  request,	
  
but	
  not	
  below	
  minimum	
  
level	
  stored	
  on	
  card	
  
SIM	
  card	
  stores	
  mul=ple	
  	
  
key	
  sets,	
  possibly	
  with	
  	
  
different	
  protec=on	
  levels	
  
Key	
  set	
  1	
  
Key	
  set	
  2	
  
Key	
  set	
  3	
  
Encry-­‐	
  
p=on	
  
Signa-­‐	
  
ture	
  
DES	
   3DES	
   AES	
  
Man-­‐	
  
datory	
  
ü
	
  	
  
Command	
  –	
  
possibly	
  
encrypted	
  
and/or	
  
signed	
  
Used	
  
security	
  
level	
  
Reque-­‐
sted	
  
security	
  
level	
  
Target	
  app	
  /	
  key	
  set	
  #	
  
OTA	
  error	
  handling	
  is	
  underspecified,	
  possibly	
  opening	
  a9ack	
  
surface	
  
7	
  
A<acker	
  
probes	
  cards	
  
to	
  gain	
  
material	
  for	
  
DES	
  key	
  
cracking	
  	
  
SIM	
  card	
  	
  
with	
  DES	
  	
  
key	
  	
  
(prevalence	
  of	
  DES	
  
keys	
  varies	
  between	
  
operators;	
  can	
  be	
  up	
  
to	
  100%)	
  
Binary	
  SMS	
  communica=on	
  
Command	
  with	
  
wrong	
  signature	
  
Use:	
  DES	
  
signature	
  
Request:	
  DES	
  
signature	
  
Response	
  to	
  mal-­‐signed	
  request	
  differs	
  by	
  card	
  type	
  
c. (25%*)	
  
b. (50%*)	
  
a. (25%*	
  	
  
of	
  cards)	
   (No	
  response)	
  
Error	
  message	
  
DES	
  
signature	
  
Error	
  message	
  
Some=mes	
  
with	
  all-­‐zeros	
  
signatures	
  
Data	
  useable	
  for	
  key	
  cracking	
  
	
  *	
  Es=mated	
  from	
  a	
  geographically	
  skewed	
  measurement	
  set	
  
OTA	
  DES	
  do	
  not	
  withstand	
  key	
  cracking	
  
8	
  
Challenge:	
  Derive	
  56	
  bit	
  DES	
  key	
  from	
  OTA	
  response	
  signature	
  
Cracking	
  strategies	
   Investment	
   Cracking	
  =me	
  
Be	
  pa=ent	
  
Brute	
  force	
  on	
  GPU	
  
EUR	
  1.000	
   6	
  months	
  
Throw	
  money	
  at	
  it	
  
Brute	
  force	
  on	
  FPGA	
  cluster	
  
EUR	
  50.000	
   1	
  day	
  
Ride	
  the	
  rainbow	
  
Time-­‐memory	
  trade-­‐off	
  
using	
  large	
  hard	
  disks	
  &	
  GPU	
  
EUR	
  1.500	
  +	
  	
  
1	
  year	
  pre-­‐computa=on	
  
1	
  minute	
  	
  
(but	
  <100%	
  success	
  rate)	
  
Only	
  possible	
  when	
  OTA	
  
response	
  is	
  fully	
  predictable	
  
For	
  some	
  cards,	
  even	
  3DES	
  keys	
  are	
  crackable	
  
9	
  
Downgrade	
  a<ack	
  flow	
  
Some	
  SIM	
  	
  
cards	
  with	
  	
  
3DES	
  key	
  	
  
use	
  lower	
  signature	
  
schemes	
  when	
  
requested	
  (in	
  viola=on	
  
of	
  the	
  standard)	
  
	
  *	
  Must	
  be	
  brute-­‐forced;	
  Rainbow	
  table	
  a9ack	
  no	
  longer	
  possible	
  
A<acker	
  
Command	
  
Request	
  DES-­‐signed	
  
response	
  (KID	
  =	
  1)	
  
	
  	
  Error	
   DES-­‐signed	
  
Command	
  
Request	
  2-­‐key	
  3DES	
  
response	
  	
  (KID	
  =	
  5)	
  
	
  	
  Error	
   2-­‐key	
  3DES-­‐signed	
  
Command	
  
Request	
  3-­‐key	
  3DES	
  
response	
  	
  (KID	
  =	
  9)	
  
	
  	
  Error	
   3-­‐key	
  3DES-­‐signed	
  
56	
  
bit	
  
56	
  
bit	
  
56	
  
bit	
  
Crack	
  first	
  
third	
  of	
  key	
  
Crack	
  
second	
  
third*	
  
Crack	
  	
  
final	
  
third*	
  
3-­‐key	
  3DES	
  
2-­‐key	
  3DES	
  
DES	
  
Java	
  virus	
  does	
  not	
  automa=cally	
  have	
  access	
  to	
  all	
  SIM	
  assets	
  
10	
  
Java	
  sand	
  box	
  
should	
  protect	
  
cri=cal	
  data	
  on	
  
SIM	
  OTA-­‐deployed	
  SIM	
  virus	
  can	
  access	
  SIM	
  Toolkit	
  API	
  
Standard	
  STK	
  
func=on	
   Abuse	
  poten=al	
  
Send	
  SMS	
  
§  Premium	
  SMS	
  fraud	
  
Dial	
  phone	
  
numbers,	
  send	
  
DTMF	
  tones	
  
§  Circumvent	
  caller-­‐ID	
  checks	
  
§  Mess	
  with	
  voice	
  mail	
  
Send	
  USSD	
  
numbers	
  
§  Redirect	
  incoming	
  calls;	
  
some=mes	
  also	
  SMS	
  
§  Abuse	
  USSD-­‐based	
  payment	
  
schemes	
  
Query	
  phone	
  
loca=on	
  and	
  
seUngs	
  
§  Track	
  vic=m	
  
Open	
  URL	
  in	
  
phone	
  
browser	
  
§  Phishing	
  
§  Malware	
  deployment	
  to	
  phone	
  
§  Any	
  other	
  browser-­‐based	
  a9ack	
  
Data	
  access	
  on	
  SIM	
  would	
  enable	
  further	
  abuse	
  
Protected	
  
func=on	
  
Read	
  Ki	
  
Read	
  OTA	
  
keys	
  
Read	
  Java	
  
processes	
  
Write	
  to	
  Flash	
  	
  
or	
  EEPROM	
  
Abuse	
  poten=al	
  
§  SIM	
  cloning	
  
§  Decrypt	
  all	
  2G/3G/4G	
  traffic	
  
§  Lateral	
  a9acks	
  
§  Clone	
  NFC	
  payment	
  takers	
  
and	
  other	
  future	
  SIM	
  
applica=ons	
  
§  Alter	
  OS	
  to	
  prevent	
  
vulnerability	
  patching	
  
Read	
  hash	
  
func=on	
  
§  Reverse-­‐engineer	
  proprietary	
  
authen=ca=on	
  func=ons;	
  
perhaps	
  find	
  weaknesses	
  
Possible	
  on	
  some	
  
SIMs	
  due	
  to	
  bug	
  in	
  
their	
  Java	
  VM	
  
SIM	
  security	
  research	
  mo=vated	
  some	
  technology	
  upgrades	
  
11	
  
Security	
  researchers	
  published	
  
several	
  SIM	
  card	
  a<acks	
  
Industry	
  reacted	
  swiVly	
  but	
  
not	
  thoroughly	
  
Finding	
  
Anybody	
  can	
  send	
  management	
  SMS	
  
to	
  SIM	
  cards	
  
1	
  
Many	
  networks	
  started	
  filtering	
  the	
  most	
  
obvious	
  a9ack	
  messages	
  
The	
  OTA	
  app	
  mgmt	
  interface	
  is	
  not	
  
always	
  protected	
  with	
  good	
  crypto	
  
2	
  
Some	
  operators	
  phased	
  out	
  DES	
  keys	
  in	
  
favor	
  of	
  3DES	
  
SIM	
  applica=ons	
  can	
  break	
  out	
  of	
  
their	
  JavaCard	
  sandbox	
  
3	
  
The	
  vulnerability	
  has	
  not	
  been	
  addressed	
  
yet	
  in	
  affected	
  cards	
  
Response	
  
12	
  
1	
  
Best	
  
prac=ce	
  
filters	
  
Imple-­‐	
  
mented	
  
filters	
  
Several	
  message	
  
types	
  may	
  go	
  to	
  
the	
  SIM	
  
Some	
  phones	
  
also	
  forward	
  
other	
  types	
  
Many	
  networks	
  
only	
  filter	
  one	
  
type	
  
Binary	
  SMS	
  can	
  take	
  many	
  forms	
  to	
  circumvent	
  filters	
  
SMS	
  field	
  
PID	
   DCS	
   UDHI	
   User	
  data	
  
127	
   *	
   *	
   *	
  
*	
   246	
  or	
  22	
   *	
   *	
  
*	
   *	
   1	
   027000…	
  
127	
   *	
   *	
   *	
  
*	
   *	
   0	
   027000…	
  
vs.	
  
Misconfigura=ons	
  in	
  SIMs	
  go	
  well	
  beyond	
  DES	
  keys	
  
13	
  
ILLUSTRATIVE	
  2	
  
2.	
  Verify	
  that	
  all	
  SIM	
  applica=ons	
  enforce	
  cryptography	
  
1.	
  Verify	
  
that	
  all	
  
keys	
  are	
  
3DES	
  or	
  
AES	
  
Applica=on	
  (TAR)	
  
Keyset	
  
1: 	
  3DES	
  
	
  
2: 	
  3DES	
  
…	
  
16: 	
  DES	
  
Sign	
  +	
  encrypt	
  
	
  
Sign	
  +	
  encrypt	
  
	
  
Sign	
  
000000	
  
Unprotected	
  
(MSL=0)	
  
Sign	
  
	
  
Sign	
  
000001	
   FFFFFF	
  
…	
  
	
  
…	
  
	
  
…	
  
…	
  
SIM	
  configura=ons	
  
need	
  to	
  be	
  assessed	
  
in	
  two	
  dimensions	
  
A9ack	
  example–	
  Persistent	
  infec=on	
  of	
  modern	
  SIM	
  card	
  
14	
  
Target	
  —	
  
New	
  nano-­‐SIM	
  
(October	
  2013)	
  
in	
  iPhone	
  5s	
  
from	
  major	
  
European	
  carrier	
  
A<ack	
  steps	
  
A	
  
B	
  
D	
  
C	
  
Lure	
  the	
  phone	
  onto	
  fake	
  base	
  sta=on	
  to	
  circumvent	
  
network	
  filters	
  
Scan	
  the	
  SIM	
  remotely	
  for	
  configura=on	
  issues	
  	
  
(on	
  the	
  SIM	
  in	
  this	
  demo:	
  discover	
  TAR	
  with	
  MSL=0)	
  
Install	
  Java	
  virus	
  through	
  vulnerable	
  TAR	
  
Let	
  phone	
  connect	
  back	
  to	
  normal	
  network,	
  maintain	
  
persistent	
  access	
  through	
  SMS-­‐C&C	
  
Self-­‐assessment	
  tool:	
  Find	
  bugs	
  in	
  your	
  SIM	
  card’s	
  configura=on	
  
15	
  
§  Find	
  cryptographic	
  a9ack	
  surface:	
  
–  Signature	
  disclosure	
  
–  3DES	
  downgrade	
  
§  Enumerate	
  logical	
  a9ack	
  surface:	
  Detect	
  hidden	
  applica=on	
  TARs	
  
and	
  test	
  their	
  security	
  level	
  
§  Upload	
  traces	
  to	
  gsmmap.org	
  for	
  further	
  analysis	
  (Thank	
  you.)	
  
Tool	
  name	
  
Purpose	
  
Requirements	
  
Source	
  
SIMtester	
  
PC/SC	
  smartcard	
  reader	
  –or–	
  Osmocom	
  phone	
  
opensource.srlabs.de	
  
Agenda	
  
16	
  
§  Advanced	
  SIM	
  card	
  a9acks	
  
§  Advanced	
  GSM	
  intercept	
  
§  Keeping	
  network	
  operators	
  honest	
  
GSM	
  intercept	
  a9acks	
  are	
  s=ll	
  under	
  addressed	
  	
  
17	
  
To	
  protect	
  customers,	
  mobile	
  networks	
  must	
  support	
  and	
  harden	
  
	
  two	
  encryp=on	
  standards	
  
The	
  majority	
  of	
  mobile	
  phone	
  calls	
  worldwide	
  s=ll	
  uses	
  2G	
  GSM	
  frequencies	
  
Older	
  phones	
  only	
  support	
  	
  
A5/1	
  encryp=on	
  
Protec=on	
  status:	
  Available	
  
strengthening	
  measures	
  are	
  
rarely	
  seen	
  
1	
  
A5/3	
  protects	
  much	
  be9er	
  
Protec=on	
  status:	
  S=ll	
  only	
  
a	
  minority	
  of	
  networks	
  
support	
  A5/3	
  
2	
  
 	
  	
  	
  	
  A5/1	
  decryp=on	
  can	
  mostly	
  be	
  prevented	
  through	
  
randomiza=on	
  
! ! Features!to!decrease!cryptographic!attack!surface!
Example!call!setup!trace! Unprotected!! Padding!randomization! +!SI5!randomization!
Ciphering)Mode)Cmd) ) ) )
TMSI)Reallocation)Cmd) ) ) )
Null)Frame) ) ) )
System)Information)5) ) ) )
Call)Proceeding) ) ) )
System)Information)6) ) ) )
Null)Frame) ) ) )
Fragment) ) ) )
Assignment)Command) ) ) )
System)Information)5ter) ) ) )
)
Predictability,
, High,
, Medium,
, None,(secure),
, Not,ciphered,
,
18	
  
1	
  
 	
  	
  	
  	
  A5/3	
  makes	
  intercept	
  much	
  harder,	
  but	
  decryp=on	
  is	
  s=ll	
  
possible	
  for	
  well-­‐funded	
  spy	
  agencies	
  
19	
  
Speed	
  
Success	
  Rate	
   Cost	
  
A5/1.	
  One	
  
computer	
  with	
  
2TB	
  storage	
  
decrypts	
  short	
  
transac=ons	
  
(SMS)	
  with	
  95%	
  
success	
  in	
  1s	
  
(aggregated)	
  
A5/3.	
  400	
  
computers	
  
break	
  one	
  	
  
1-­‐minute	
  
call	
  per	
  
minute	
  with	
  
50%	
  success	
  
Challenge:	
  A5/3	
  decryp=on	
  is	
  
computa=onally	
  two	
  million	
  
=mes	
  more	
  difficult	
  
2	
  
Agenda	
  
20	
  
§  Advanced	
  SIM	
  card	
  a9acks	
  
§  Advanced	
  GSM	
  intercept	
  
§  Keeping	
  network	
  operators	
  honest	
  
You	
  can	
  help:	
  
Measuring	
  mobile	
  network	
  security	
  from	
  Android	
  or	
  Linux	
  
21	
  
Tool	
  name	
   GSMmap.apk	
   xgoldscanner	
   OsmocomBB	
  
Purpose	
  
Collect	
  network	
  
traces	
  on	
  Android	
  
phone	
  and	
  upload	
  for	
  
analysis	
  to	
  
gsmmap.org	
  
Record	
  network	
  
traces	
  for	
  analysis	
  in	
  
Linux	
  
Update	
  to	
  Sylvain’s	
  
burst_ind	
  setup	
  to	
  
capture	
  network	
  
traces	
  for	
  analysis	
  in	
  
Linux	
  
Requirements	
  
Rooted	
  Samsung	
  
Galaxy	
  S2/S3	
  
An	
  older	
  Motorola	
  
phone	
  (C123,	
  …)	
  
Samsung	
  Galaxy	
  S2,	
  
S3,	
  	
  Note	
  2,	
  or	
  Nexus	
  
Source	
   opensource.srlabs.de	
  
OsmocomBB	
  git:	
  
gsmmap	
  branch	
  
Google	
  Play:	
  	
  
GSMmap	
  
Live	
  ISO	
  puts	
  mobile	
  security	
  tools	
  on	
  ready-­‐to-­‐use	
  USB	
  s=ck	
  
22	
  
GSM	
  map	
  live	
  ISO	
  bundles	
  mobile	
  security	
  tools	
  
Network	
  
measurement	
  
with	
  Galaxy	
  S2/S3	
  
Network	
  measurement	
  &	
  
IMSI	
  catcher	
  detec=on	
  with	
  
Osmocom	
  BB	
  phone	
  
SIM	
  card	
  assessment	
  
with	
  PC/SC	
  reader	
  or	
  
Osmocom	
  BB	
  phone	
  
Download	
  and	
  How-­‐Tos	
   	
  	
  opensource.srlabs.de	
  
gsmmap.org	
  –	
  Tracking	
  mobile	
  network	
  evolu=on	
  online	
  	
  
23	
  
Thank	
  you!	
  
Ques=ons?	
  
24	
  
Karsten	
  Nohl	
  <nohl@srlabs.de>	
  
Many	
  thanks	
  to	
  Lukas	
  Kuzmiak,	
  Luca	
  
Mele<e,	
  and	
  	
  Linus	
  Neumann	
  for	
  crea=ng	
  
and	
  suppor=ng	
  our	
  research	
  tools!	
  
Research	
  supported	
  by

More Related Content

What's hot

RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptxSou Jana
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing PresentationKaliel Williamson
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking   chapter 8 - Windows Vulnerabilities - Eric VanderburgEthical hacking   chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric VanderburgEric Vanderburg
 
CNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream CiphersCNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream CiphersSam Bowne
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
Key management.ppt
Key management.pptKey management.ppt
Key management.pptSou Jana
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacksHaltdos
 
Introduction to Windows Dictionary Attacks
Introduction to Windows Dictionary AttacksIntroduction to Windows Dictionary Attacks
Introduction to Windows Dictionary AttacksScott Sutherland
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communicationUc Man
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital SignatureSou Jana
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfslametarrokhim1
 
Ransomware
RansomwareRansomware
RansomwareG Prachi
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 

What's hot (20)

RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing Presentation
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking   chapter 8 - Windows Vulnerabilities - Eric VanderburgEthical hacking   chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
 
CNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream CiphersCNIT 141: 5. Stream Ciphers
CNIT 141: 5. Stream Ciphers
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Key management.ppt
Key management.pptKey management.ppt
Key management.ppt
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
Introduction to Windows Dictionary Attacks
Introduction to Windows Dictionary AttacksIntroduction to Windows Dictionary Attacks
Introduction to Windows Dictionary Attacks
 
Password based cryptography
Password based cryptographyPassword based cryptography
Password based cryptography
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Information security
Information securityInformation security
Information security
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Elgamal Digital Signature
Elgamal Digital SignatureElgamal Digital Signature
Elgamal Digital Signature
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Ransomware
RansomwareRansomware
Ransomware
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 

Similar to Mobile Network Attack Evolution

eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitiesYiannis Hatzopoulos
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java CardJulien SIMON
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and CloudPriyanka Aash
 
Argent EthCC 2019 - Frictionless DApp experience
Argent EthCC 2019 - Frictionless DApp experienceArgent EthCC 2019 - Frictionless DApp experience
Argent EthCC 2019 - Frictionless DApp experienceItamar Lesuisse
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
SecurityGen-Article-Cloning-SimCard.pdf
SecurityGen-Article-Cloning-SimCard.pdfSecurityGen-Article-Cloning-SimCard.pdf
SecurityGen-Article-Cloning-SimCard.pdfSecurity Gen
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdfDEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdfWlamir Molinari
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionmalvvv
 
PlaySIM Project Java One 2009
PlaySIM Project Java One 2009PlaySIM Project Java One 2009
PlaySIM Project Java One 2009Sebastian Hans
 
Secure shell(ssh) AND telnet AND CONSOLE
Secure shell(ssh)  AND telnet AND CONSOLESecure shell(ssh)  AND telnet AND CONSOLE
Secure shell(ssh) AND telnet AND CONSOLEAmiraMohamedGalal
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEntel
 

Similar to Mobile Network Attack Evolution (20)

eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalities
 
Security applications with Java Card
Security applications with Java CardSecurity applications with Java Card
Security applications with Java Card
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
 
Argent EthCC 2019 - Frictionless DApp experience
Argent EthCC 2019 - Frictionless DApp experienceArgent EthCC 2019 - Frictionless DApp experience
Argent EthCC 2019 - Frictionless DApp experience
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Unit 5 m commerce
Unit 5 m commerceUnit 5 m commerce
Unit 5 m commerce
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
SecurityGen-Article-Cloning-SimCard.pdf
SecurityGen-Article-Cloning-SimCard.pdfSecurityGen-Article-Cloning-SimCard.pdf
SecurityGen-Article-Cloning-SimCard.pdf
 
ATM
ATMATM
ATM
 
Application Security
Application SecurityApplication Security
Application Security
 
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdfDEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 
PlaySIM Project Java One 2009
PlaySIM Project Java One 2009PlaySIM Project Java One 2009
PlaySIM Project Java One 2009
 
Seguridad en laptops
Seguridad en laptopsSeguridad en laptops
Seguridad en laptops
 
Online Authentication
Online AuthenticationOnline Authentication
Online Authentication
 
Secure shell(ssh) AND telnet AND CONSOLE
Secure shell(ssh)  AND telnet AND CONSOLESecure shell(ssh)  AND telnet AND CONSOLE
Secure shell(ssh) AND telnet AND CONSOLE
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 

More from Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

More from Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Mobile Network Attack Evolution

  • 1. SRLabs  Template  v12   Mobile  Network  A9ack  Evolu=on   Karsten  Nohl  <nohl@srlabs.de>  
  • 2. Security  research  is  successful  if  vulnerabili=es  get  removed   2   Industry       assesses  impact   and  implements   counter  measures   Security  researchers       discover  new   vulnerability  classes   (and  some=mes   mi=ga=ons)   This  talk  focuses  on  the  industry  response  to   mobile  network  security  research  
  • 3. Agenda   3   §  Advanced  SIM  card  a<acks   §  Advanced  GSM  intercept   §  Keeping  network  operators  honest  
  • 4. SIM  cards  are  fully  programmable  computer  systems   4   Applica=ons  on  modern  SIM  card   Basic  func=ons   §  Iden=fica=on  (IMSI)   §  Authen=ca=on     (Ki  &  Hash  func=on)   Simple  file  system   §  Address  book   §  SMS  messages   §  Session  keys   Custom  Java  apps     §  Roaming  mgmt   §  Payment   §  Tracking   Java  virtual  machine   Smartcard  with  real-­‐=me  opera=ng  system  
  • 5. SIM  have  many  security  layers  from  smartcards  to  cryptography   and  Java  process  separa=on   5   by  cryptographic  hash  func=on   (oVen  Comp128  in  GSM;     Milenage  in  3G/4G)   User  authen=ca=on   by  simple  comparison        Secure  Java  deployment   using  DES/3DES/AES   signature  +  encryp=on   SIM  authen=ca=on   Individual  protec=on   logic  for  banking   applets,  iden=fica=on   applets,  etc.   …   Java  crypto  API:  DES/3DES/AES;   some=mes  RSA   Applica=on  separa=on:     Java  VM  sand  boxing   SIM  card  includes  various  protec=on  mechanisms   Ki   PIN/PUK   numbers   OTA   keys   through  proprietary  smartcard   security  mechanisms   Storage  protec=on  
  • 6. OTA  security  level  is  chosen  by  server  while  SIM   enforces  mandatory  minimum  level   6   ILLUSTRATIVE   OTA  server   ini=ates   remote   transac=on   Binary  SMS  communica=on   Response  protected   according  to  request,   but  not  below  minimum   level  stored  on  card   SIM  card  stores  mul=ple     key  sets,  possibly  with     different  protec=on  levels   Key  set  1   Key  set  2   Key  set  3   Encry-­‐   p=on   Signa-­‐   ture   DES   3DES   AES   Man-­‐   datory   ü     Command  –   possibly   encrypted   and/or   signed   Used   security   level   Reque-­‐ sted   security   level   Target  app  /  key  set  #  
  • 7. OTA  error  handling  is  underspecified,  possibly  opening  a9ack   surface   7   A<acker   probes  cards   to  gain   material  for   DES  key   cracking     SIM  card     with  DES     key     (prevalence  of  DES   keys  varies  between   operators;  can  be  up   to  100%)   Binary  SMS  communica=on   Command  with   wrong  signature   Use:  DES   signature   Request:  DES   signature   Response  to  mal-­‐signed  request  differs  by  card  type   c. (25%*)   b. (50%*)   a. (25%*     of  cards)   (No  response)   Error  message   DES   signature   Error  message   Some=mes   with  all-­‐zeros   signatures   Data  useable  for  key  cracking    *  Es=mated  from  a  geographically  skewed  measurement  set  
  • 8. OTA  DES  do  not  withstand  key  cracking   8   Challenge:  Derive  56  bit  DES  key  from  OTA  response  signature   Cracking  strategies   Investment   Cracking  =me   Be  pa=ent   Brute  force  on  GPU   EUR  1.000   6  months   Throw  money  at  it   Brute  force  on  FPGA  cluster   EUR  50.000   1  day   Ride  the  rainbow   Time-­‐memory  trade-­‐off   using  large  hard  disks  &  GPU   EUR  1.500  +     1  year  pre-­‐computa=on   1  minute     (but  <100%  success  rate)   Only  possible  when  OTA   response  is  fully  predictable  
  • 9. For  some  cards,  even  3DES  keys  are  crackable   9   Downgrade  a<ack  flow   Some  SIM     cards  with     3DES  key     use  lower  signature   schemes  when   requested  (in  viola=on   of  the  standard)    *  Must  be  brute-­‐forced;  Rainbow  table  a9ack  no  longer  possible   A<acker   Command   Request  DES-­‐signed   response  (KID  =  1)      Error   DES-­‐signed   Command   Request  2-­‐key  3DES   response    (KID  =  5)      Error   2-­‐key  3DES-­‐signed   Command   Request  3-­‐key  3DES   response    (KID  =  9)      Error   3-­‐key  3DES-­‐signed   56   bit   56   bit   56   bit   Crack  first   third  of  key   Crack   second   third*   Crack     final   third*   3-­‐key  3DES   2-­‐key  3DES   DES  
  • 10. Java  virus  does  not  automa=cally  have  access  to  all  SIM  assets   10   Java  sand  box   should  protect   cri=cal  data  on   SIM  OTA-­‐deployed  SIM  virus  can  access  SIM  Toolkit  API   Standard  STK   func=on   Abuse  poten=al   Send  SMS   §  Premium  SMS  fraud   Dial  phone   numbers,  send   DTMF  tones   §  Circumvent  caller-­‐ID  checks   §  Mess  with  voice  mail   Send  USSD   numbers   §  Redirect  incoming  calls;   some=mes  also  SMS   §  Abuse  USSD-­‐based  payment   schemes   Query  phone   loca=on  and   seUngs   §  Track  vic=m   Open  URL  in   phone   browser   §  Phishing   §  Malware  deployment  to  phone   §  Any  other  browser-­‐based  a9ack   Data  access  on  SIM  would  enable  further  abuse   Protected   func=on   Read  Ki   Read  OTA   keys   Read  Java   processes   Write  to  Flash     or  EEPROM   Abuse  poten=al   §  SIM  cloning   §  Decrypt  all  2G/3G/4G  traffic   §  Lateral  a9acks   §  Clone  NFC  payment  takers   and  other  future  SIM   applica=ons   §  Alter  OS  to  prevent   vulnerability  patching   Read  hash   func=on   §  Reverse-­‐engineer  proprietary   authen=ca=on  func=ons;   perhaps  find  weaknesses   Possible  on  some   SIMs  due  to  bug  in   their  Java  VM  
  • 11. SIM  security  research  mo=vated  some  technology  upgrades   11   Security  researchers  published   several  SIM  card  a<acks   Industry  reacted  swiVly  but   not  thoroughly   Finding   Anybody  can  send  management  SMS   to  SIM  cards   1   Many  networks  started  filtering  the  most   obvious  a9ack  messages   The  OTA  app  mgmt  interface  is  not   always  protected  with  good  crypto   2   Some  operators  phased  out  DES  keys  in   favor  of  3DES   SIM  applica=ons  can  break  out  of   their  JavaCard  sandbox   3   The  vulnerability  has  not  been  addressed   yet  in  affected  cards   Response  
  • 12. 12   1   Best   prac=ce   filters   Imple-­‐   mented   filters   Several  message   types  may  go  to   the  SIM   Some  phones   also  forward   other  types   Many  networks   only  filter  one   type   Binary  SMS  can  take  many  forms  to  circumvent  filters   SMS  field   PID   DCS   UDHI   User  data   127   *   *   *   *   246  or  22   *   *   *   *   1   027000…   127   *   *   *   *   *   0   027000…   vs.  
  • 13. Misconfigura=ons  in  SIMs  go  well  beyond  DES  keys   13   ILLUSTRATIVE  2   2.  Verify  that  all  SIM  applica=ons  enforce  cryptography   1.  Verify   that  all   keys  are   3DES  or   AES   Applica=on  (TAR)   Keyset   1:  3DES     2:  3DES   …   16:  DES   Sign  +  encrypt     Sign  +  encrypt     Sign   000000   Unprotected   (MSL=0)   Sign     Sign   000001   FFFFFF   …     …     …   …   SIM  configura=ons   need  to  be  assessed   in  two  dimensions  
  • 14. A9ack  example–  Persistent  infec=on  of  modern  SIM  card   14   Target  —   New  nano-­‐SIM   (October  2013)   in  iPhone  5s   from  major   European  carrier   A<ack  steps   A   B   D   C   Lure  the  phone  onto  fake  base  sta=on  to  circumvent   network  filters   Scan  the  SIM  remotely  for  configura=on  issues     (on  the  SIM  in  this  demo:  discover  TAR  with  MSL=0)   Install  Java  virus  through  vulnerable  TAR   Let  phone  connect  back  to  normal  network,  maintain   persistent  access  through  SMS-­‐C&C  
  • 15. Self-­‐assessment  tool:  Find  bugs  in  your  SIM  card’s  configura=on   15   §  Find  cryptographic  a9ack  surface:   –  Signature  disclosure   –  3DES  downgrade   §  Enumerate  logical  a9ack  surface:  Detect  hidden  applica=on  TARs   and  test  their  security  level   §  Upload  traces  to  gsmmap.org  for  further  analysis  (Thank  you.)   Tool  name   Purpose   Requirements   Source   SIMtester   PC/SC  smartcard  reader  –or–  Osmocom  phone   opensource.srlabs.de  
  • 16. Agenda   16   §  Advanced  SIM  card  a9acks   §  Advanced  GSM  intercept   §  Keeping  network  operators  honest  
  • 17. GSM  intercept  a9acks  are  s=ll  under  addressed     17   To  protect  customers,  mobile  networks  must  support  and  harden    two  encryp=on  standards   The  majority  of  mobile  phone  calls  worldwide  s=ll  uses  2G  GSM  frequencies   Older  phones  only  support     A5/1  encryp=on   Protec=on  status:  Available   strengthening  measures  are   rarely  seen   1   A5/3  protects  much  be9er   Protec=on  status:  S=ll  only   a  minority  of  networks   support  A5/3   2  
  • 18.          A5/1  decryp=on  can  mostly  be  prevented  through   randomiza=on   ! ! Features!to!decrease!cryptographic!attack!surface! Example!call!setup!trace! Unprotected!! Padding!randomization! +!SI5!randomization! Ciphering)Mode)Cmd) ) ) ) TMSI)Reallocation)Cmd) ) ) ) Null)Frame) ) ) ) System)Information)5) ) ) ) Call)Proceeding) ) ) ) System)Information)6) ) ) ) Null)Frame) ) ) ) Fragment) ) ) ) Assignment)Command) ) ) ) System)Information)5ter) ) ) ) ) Predictability, , High, , Medium, , None,(secure), , Not,ciphered, , 18   1  
  • 19.          A5/3  makes  intercept  much  harder,  but  decryp=on  is  s=ll   possible  for  well-­‐funded  spy  agencies   19   Speed   Success  Rate   Cost   A5/1.  One   computer  with   2TB  storage   decrypts  short   transac=ons   (SMS)  with  95%   success  in  1s   (aggregated)   A5/3.  400   computers   break  one     1-­‐minute   call  per   minute  with   50%  success   Challenge:  A5/3  decryp=on  is   computa=onally  two  million   =mes  more  difficult   2  
  • 20. Agenda   20   §  Advanced  SIM  card  a9acks   §  Advanced  GSM  intercept   §  Keeping  network  operators  honest  
  • 21. You  can  help:   Measuring  mobile  network  security  from  Android  or  Linux   21   Tool  name   GSMmap.apk   xgoldscanner   OsmocomBB   Purpose   Collect  network   traces  on  Android   phone  and  upload  for   analysis  to   gsmmap.org   Record  network   traces  for  analysis  in   Linux   Update  to  Sylvain’s   burst_ind  setup  to   capture  network   traces  for  analysis  in   Linux   Requirements   Rooted  Samsung   Galaxy  S2/S3   An  older  Motorola   phone  (C123,  …)   Samsung  Galaxy  S2,   S3,    Note  2,  or  Nexus   Source   opensource.srlabs.de   OsmocomBB  git:   gsmmap  branch   Google  Play:     GSMmap  
  • 22. Live  ISO  puts  mobile  security  tools  on  ready-­‐to-­‐use  USB  s=ck   22   GSM  map  live  ISO  bundles  mobile  security  tools   Network   measurement   with  Galaxy  S2/S3   Network  measurement  &   IMSI  catcher  detec=on  with   Osmocom  BB  phone   SIM  card  assessment   with  PC/SC  reader  or   Osmocom  BB  phone   Download  and  How-­‐Tos      opensource.srlabs.de  
  • 23. gsmmap.org  –  Tracking  mobile  network  evolu=on  online     23  
  • 24. Thank  you!   Ques=ons?   24   Karsten  Nohl  <nohl@srlabs.de>   Many  thanks  to  Lukas  Kuzmiak,  Luca   Mele<e,  and    Linus  Neumann  for  crea=ng   and  suppor=ng  our  research  tools!   Research  supported  by