SlideShare a Scribd company logo
1 of 24
Download to read offline
SRLabs Template v12
Mobile network hacking – All-over-IP edition
BlackHat EU, Dec 4 2019, London
Luca Melette <luca@srlabs.de>
Sina Yazdanmehr <sina@srlabs.de>
Mobile networks are evolving, and research is hardly keeping up
2
Research
question
After several
decades of
intercept attacks
(A5/1, SS7, IMSI
catchers),
will RCS finally
protect text
messages?
Agenda
3
1. Mobile attack recap
2. Attacks on new technologies
3. Mitigations
Known mobile network attacks can be categorized into 5 classes
4
Intercept
calls and texts
Impersonate
user identity
Track users
Conduct fraud
DoS users or
network
Local
Local
Local
No charge
Subscriber
Remote
Remote
Remote
Charge others
Network
I
II
III
IV
V
Attack impact Attack scope
▪ Passively sniff and crack weak encryption (A5/1, A5/2), run IMSI catcher
▪ Grab TMSIs over-the-air, spoof originating call or SMS via radio interface
▪ Collect IMSIs from the radio interface, verify user presence with silent SMS
▪ Disable call barrings and prepaid data limits via SS7
▪ Make users unreachable via detach message (radio) or cancel location (SS7)
▪ Reroute voice flows enabling call forwarding via SS7
▪ Send SMS or USSD code on behalf of another user via SS7
▪ Globally locate mobile subscribers by requesting serving tower via SS7
▪ Spoof calls and SMS to premium numbers, steal bank OTP codes in SMS
▪ Exhaust MSC/HLR resources via SS7 requests (RESET, PRN, ATI, PSI)
Attack details
Only some parts of a telco networks have been publicly dissected by security researchers
5
2G
3G
4G
PSTN
Voice core
Packet core
IMS, RCS
Cell
tower
Mobile operator
HLR
User
database
SS7
IPX
WiFi
Internet
Access
point ePDG
Mobile
users
SIM
SIM
Femto
cell
A
B
C
D
E
Several vulnerabilities have
been identified in these
telco components:
A. Malicious applications
can be remotely
installed in SIM cards
B. Weak radio encryption
allow call/SMS and data
to be intercepted
C. Devices in user hands
can provide privileged
access to core nodes
D. Hackers can remotely
intercept calls/SMS and
track users because of
missing authentication
E. Like point D, but for
data connections
IMS partially
covered:
most of the
publications
show
configuration
mistakes
Legacy standards are being replaced by new technologies: IMS (VoLTE, VoWiFi) and RCS
6
Data
Voice
Data
Voice VoIP
Dedicated voice
channels
(CSFB)
Basic VoIP
(IMS)
The mobile uses legacy networks to
transmit voice, the fast 4G link is only
used for internet traffic
IMS makes the fast LTE interface usable
for both internet and voice traffic
Advanced VoIP
(IMS+RCS)
RCS is supported by an increasing number of networks
3G
4G/5G
4G/5G
Voice calls are moving from dedicated channels to voice-over-IP (VoIP)
RCS messaging is similar to WhatsApp, iMessage
RCS is already implemented by at least 100 mobile operators
7
[1] config.rcs.mncYYY.mccXXX.pub.3gppnetwork.org, where XXX and YYY are valid MCC and MNC values
300 LTE 200
VoLTE
IMS 100 RCS
150
VoWiFi
900
mobile
operators
Lower-bound estimate for deployment status of
‘next-generation’ mobile network technologies
▪ Functional RCS
deployments were
identified through DNS
and HTTP queries towards
RCS-related domains [1]
▪ European telco groups
constitute a large part of
the current RCS
deployments:
- Orange (17 countries)
- Vodafone (16 countries)
- T-Mobile (9 countries)
Active RCS deployments span 67 countries, while a few others are conducting trials
8
At least one network
implements RCS
RCS in trial
Agenda
9
1. Mobile network attack recap
2. Attacks on new technologies
3. Mitigations
What attacks are possible in RCS?
10
These hacks should
work against many
RCS deployments as
they do not require
secret information
about the victim;
they do rely on
configuration issues
in the network
Requires victim’s
config file or DNS
MITM capabilities
Track users Get IP address of victim / verify if user is online
A
Conduct fraud Inject traffic / hijack session if victim is behind the same NAT
C
Impersonate users Caller-ID spoofing in calls / messages
B
Website DDoS Send file attachment forcing auto-preview on victim
D
Intercept texts Connect to RCS with user credentials or hijack user session
E
Example hacking goal Example method using RCS Attack scope
11
Mobile operator A
Mobile operator B
001
003
User presence and coarse location can be disclosed by replies to SIP OPTIONS requests
A
IMS
RCS
IMS
RCS
SIP OPTIONS +4917xxx001
SIP OPTIONS +4917xxx002
SIP OPTIONS +4917xxx003
SIP reply: user not found
SIP reply: user available
Attacker
Once connected to RCS, a malicious user can collect
information about other users by sending the
SIP OPTIONS request to sequential mobile numbers
In addition to presence, the response message
discloses the local IP of the victim, potentially
revealing its location
SIP/2.0 200 OK
CSeq: 1 OPTIONS
Contact:
<sip:+49xxx01@111.22.33.44:5060;
transport=tls>
Thanks to number portability and commercial
agreements between operators, users in other
networks can be also paged and later attacked
SIP reply: user available
1
2
3
Missing verification of user supplied heat SBC allows caller-ID spoofing
12
B
Attacker
Attacker registers with
their own identity
Bob
Alice
Bob receives a call
from Alice’s
spoofed identity
REGISTER sip:mno.net SIP/2.0
From: <sip:+4917...@mno.net>;tag=291412310
To: <sip:+4917...@mno.net>
......
SIP REGISTER
1
INVITE sip:bob@mno.net;phone-context=mno.net SIP/2.0
To: <sip:bob@mno.net;phone-context=mno.net>
From: <sip:1337@mno.net>;tag=291412310
P-Preferred-Identity: <sip:1337@mno.net>
......
SIP INVITE
2
1
Then spoofs another user’s
identity to make a call
2
IMS
RCS
Traffic injection is possible if victim and attacker share the same public IP address
13
WiFi
NAT
X
Internet
User
VPN
Attacker
RCS core
User IP PCSCF
user-1 [Ext IP] pcscf 2
User
Attacker
Attack
scenario 1
User and attacker connect behind the
same NAT and share an external IP
Attacker identifies
the correct PCSCF
by trying all options
In some implementations,
attackers can inject
messages into the RCS core
because users are solely
identified by their mobile
number and public IP
Attacker controls Internet uplink of victim
PCSCF
1
PCSCF
2
The attacker
and victim
are behind
the same
NAT
Attack
scenario 2
The attacker
manipulates
user traffic
using a
rogue AP
1a
1b
2
3
C
-Demo-
Automatic media preview of malicious links enables DDoS and sensitive info leaks
14
D
File
transfer
server
3- SIP/MSRP message including media transfer
Bob Alice
The Message Session Relay Protocol is
used to share files (images, videos,
audio) between RCS users. This protocol
is similar to SIP and HTTP, and carries
content metadata in XML format.
RCS can send media content
Scenario 1 - Leverage RCS clients to DDoS a website
1. Attacker identifies a large file on a target website
2. Attacker crafts an XML message where the thumbnail URL
(indicated as a small file) points to target large file
3. Attacker sends the crafted XML message as a SIP/MSRP
message to many thousands of subscribers
4. Each RCS client automatically attempts to download the file
overloading the target website
Scenario 2 - User tracking
1. The attacker starts a web
server on a public IP
2. The attacker sends an RCS
message including
preview-able contents
hosted on that server
3. The victim attempts to
download the content
disclosing their IP address
Scenario 3 - Account takeover
1. The attacker conducts the
attack as in scenario 2, and
collects headers sent by
the victim
2. If an RCS session token is
included, the attacker can
impersonate the victim
sending messages and
starting calls
Intercept can be achieved abusing RCS signaling in multiple ways
15
E
Set call
forwardings
abusing the XCAP
interface
Steal the config
file so you can
provision on
behalf of the
victim
Implementation issues (vendor dependent)
We found some buggy XCAP implementation that does not properly validate the
identity when interacting with the server, thus enabling XCAP settings manipulation
Configuration issues (network dependent)
If the XCAP server uses password authentication instead of the secure SIM-based
authentication, the password could be brute-forced
Malicious apps
Mobile hotspot sharing
Malicious open WiFi with captive portal
Brute force identity/OTP via web
Attack scenario 1
Attack scenario 2 1
2
3
4
Details in the next slides
SIP MITM via DNS
spoofing
Attack scenario 3
Redirect SIP traffic to a rogue P-CSCF
5
Malicious app or rogue hotspot can get in the middle of RCS provisioning
16
User Config server SMSC
1
2a
2b
3
4
HTTP request including user’s IMSI
Config server generates an OTP
and delivers it to the user via SMS
Binary SMS carrying the OTP
HTTP reply with session ID as cookie
HTTPS request including IMSI,
OTP and session ID
XML config file
Server responds
with 200 OK
HTTP status code,
and includes a
valid session ID
as cookie in case
the IMSI is valid Server returns the XML config file if
all received information is correct
TLS connection
▪ The app is installed on victim’s device
▪ The app uses victim’s LTE connection to fetch config file
▪ If the app has SMS_READ permission, it can retrieve
even OTP code, for networks that require it
▪ Attacker uses victim’s LTE connection via
hotspot sharing
▪ Attacker can request config file through
victim’s connection, and retrieve it
Attack scenario Malicious app Attack scenario Mobile hotspot sharing
E
1 2
1+2
17
User
LTE
Rogue AP Attacker’s
server
RCS config
server
Internet
1
2
3
4
1. Victim tries to access a website
through a rogue AP
2. The rogue AP retrieves the content of
the website requested by the victim
and forwards it back injecting
malicious JavaScript. Immediately after,
the AP pushes back the victim to LTE,
terminating the WiFi access
3. The malicious JavaScript code retrieves
the RCS config file via LTE connection
4. The malicious JavaScript code uploads
the retrieved XML config file to the
attacker’s server on the internet
Rogue WiFi can steal victim’s config file injecting JavaScript code
E 3
-Demo-
Attack sequence
1
2
3
4
1. Enumerate valid IMSIs
1. Enumerate valid IMSIs
Some networks requiring OTP verification are prone to user account brute force
18
E
RCS auto
config server
Attacker
Get cookie (invalid IMSI)
HTTP 40X
Get cookie (valid IMSI)
HTTP 200 + Cookie
4
Enumerate IMSIs.
Perform GET over
HTTP supplying a
random IMSI until
a 200 is returned
Valid IMSIs found
Brute force OTP.
Quickly perform
GET over HTTPS
trying all possible
OTP values (up to
6 digits)
RCS auto
config server
Attacker
Get config (IMSI, cookie, OTP1)
HTTP 40X
Get config (IMSI, cookie, OTP2)
HTTP 200 + XML config
Correct OTP found
1
2
Intercept first step: Login using victim’s RCS account, activate SMS-over-IP in HSS
19
E
User
Attacker
eNB
EPC
P-CSCF
Internet
S-CSCF
HSS/HLR
User SMSoverCS SMSoverIP
12345678 Yes Yes
Attacker registers to the RCS, announcing the
SMS over IP capability in the SIP ‘Contact’
header
User attaches to the LTE network
User Capabilities Connection
12345678 [+g.3gpp.smsip] tcp:1.1.1.1:5060
MME
IMS
Steal victim’s RCS config file (using any of the 4
methods described in the previous slides)
1
2
3
1-4
Intercept second step: Wait for SMS delivery
20
E
Sender
wants to
authenticate
user
through OTP
SMSC
HSS/
HLR
MSC
User
submitSM forwardSM
S-CSCF P-CSCF
Attacker
As SMS-over-IP is activated,
the HLR returns the GT of
the IP-SM-GW for delivery
The IP-SM-GW forwards
the message first via IP.
If the delivery fails, the
message is delivered as
SMS-using-CS fallback
eNB
MME
OTP is sent as second factor;
Both the victim and the attacker
receive the OTP SMS
Internet
IP-SM-
GW
4
5
6
-Demo-
1-4
Local DNS spoofing enables MITM attacks against default Android RCS implementation
21
E
Fake
P-CSCF
1
2
3a
3b
DNS: SRV pcscf.operator.com?
DNS: 5060, pcscf.attacker.io
TLS hello
TLS hello (valid cert)
4 SIP REGISTER
Victim
Rogue WiFi
access point
Legitimate
P-CSCF
1. Victim’s RCS client tries to resolve the
IP address of the P-CSCF
2. The rogue AP replies with a fake
response that points to a fake P-CSCF
controlled by the attacker
3. Victim’s RCS client successfully
establishes a TLS connection with the
fake P-CSCF (valid certificate)
4. The fake P-CSCF transparently forwards
all RCS traffic between the victim user
and the legitimate P-CSCF
Attack sequence
1
2
3
4
Trusted TLS connection to the attacker TLS connection
to legitimate
P-CSCF
The lack of strict domain matching between initial RCS config parameters and actual
TLS certificates allows hackers to fully hijack RCS sessions with any valid SSL certificate
Attacker uses a valid cert
for pcscf.attacker.io
-Demo-
5
Agenda
22
1. Mobile network attack recap
2. Attacks on new technologies
3. Mitigations
▪ Not all RCS
deployments are
vulnerable to all
attacks discussed
in this
presentation
▪ We found some
networks
vulnerable to each
of the attacks
▪ To mitigate
attacks, seven
countermeasures
can improve RCS
deployments
MNOs and RCS vendors can mitigate these issues by applying 7 best practices
23
Avoid information leakage
Best practice Affected components
Validate client identity
Filter uploaded contents
SBC/P-CSCF
SBC/P-CSCF, RCS client
SBC/P-CSCF, FT server
Area
Client
provisioning
RCS services
Use strong OTP
verification codes
Apply rate limiting
RCS configuration
server
RCS configuration
server, SBC/P-CSCF
OTP should be at least 8
alphanumeric characters
Limit OTP validity to 5 minutes
and 3 HTTP request attempts
Strip sensitive information
from SIP requests
Implementation details
Validate SIP session using state
(e.g. source IP, cookie, …)
Check/restrict content-type
and size provided by clients
Authenticate using
SIM / secure element
RCS configuration
server
User authentication should be
GBA/BSF based
o
r
Enforce chain of trust RCS client, DNS
Connect only to trusted
domains, validate certificates
RCS client
Take aways
24
Questions?
Luca Melette <luca@srlabs.de>, Sina Yazdanmehr <sina@srlabs.de>
1 Telcos and mobile vendors are moving all
communications to IP protocols
2 New technologies are often poorly
implemented and vulnerable to old attacks
3 Weak user authentication can expose RCS
clients to intercept and impersonation risks
4 Security best practices should be applied and
verified to new telco technologies

More Related Content

Similar to eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf

AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...Alexander Decker
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocolkshitijmehta23
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolutionTech and Law Center
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchIJMER
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptxMelvinShaji12
 
Session Initiation Protocol: Security Issues Overview
Session Initiation Protocol: Security Issues OverviewSession Initiation Protocol: Security Issues Overview
Session Initiation Protocol: Security Issues OverviewCSCJournals
 
Contextualized IMS Services using Service Delivery Platform
Contextualized IMS Services using Service Delivery PlatformContextualized IMS Services using Service Delivery Platform
Contextualized IMS Services using Service Delivery PlatformRehman Adil
 
From MSS to TelScale - Mobicents Summit 2011
From MSS to TelScale - Mobicents Summit 2011From MSS to TelScale - Mobicents Summit 2011
From MSS to TelScale - Mobicents Summit 2011telestax
 
Небезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтраНебезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтраPositive Hack Days
 

Similar to eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf (20)

AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...1, prevalent network threats and telecommunication security challenges and co...
1, prevalent network threats and telecommunication security challenges and co...
 
Sip summary
Sip summarySip summary
Sip summary
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocol
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Sip Paper
Sip PaperSip Paper
Sip Paper
 
Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, English
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Session Initiation Protocol: Security Issues Overview
Session Initiation Protocol: Security Issues OverviewSession Initiation Protocol: Security Issues Overview
Session Initiation Protocol: Security Issues Overview
 
Contextualized IMS Services using Service Delivery Platform
Contextualized IMS Services using Service Delivery PlatformContextualized IMS Services using Service Delivery Platform
Contextualized IMS Services using Service Delivery Platform
 
From MSS to TelScale - Mobicents Summit 2011
From MSS to TelScale - Mobicents Summit 2011From MSS to TelScale - Mobicents Summit 2011
From MSS to TelScale - Mobicents Summit 2011
 
Небезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтраНебезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтра
 

More from AliAlwesabi

pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...AliAlwesabi
 
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...AliAlwesabi
 
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...AliAlwesabi
 
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...AliAlwesabi
 
lte-design-and-deployment-strategies-zeljko-savic.pdf
lte-design-and-deployment-strategies-zeljko-savic.pdflte-design-and-deployment-strategies-zeljko-savic.pdf
lte-design-and-deployment-strategies-zeljko-savic.pdfAliAlwesabi
 
Securing the LTE Core the Road to NFV 2014.pdf
Securing the LTE Core the Road to NFV 2014.pdfSecuring the LTE Core the Road to NFV 2014.pdf
Securing the LTE Core the Road to NFV 2014.pdfAliAlwesabi
 
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...AliAlwesabi
 
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdfCCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdfAliAlwesabi
 
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdfD1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdfAliAlwesabi
 
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdfD2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdfAliAlwesabi
 
CISSP -Access Control Domain knowlege.pdf
CISSP -Access Control Domain knowlege.pdfCISSP -Access Control Domain knowlege.pdf
CISSP -Access Control Domain knowlege.pdfAliAlwesabi
 
VPN Guide to Network Defense and countermeasures
VPN Guide to Network Defense and countermeasuresVPN Guide to Network Defense and countermeasures
VPN Guide to Network Defense and countermeasuresAliAlwesabi
 
zero trust - how to build zero trust.pdf
zero trust - how to build zero trust.pdfzero trust - how to build zero trust.pdf
zero trust - how to build zero trust.pdfAliAlwesabi
 
Foot printing as phase of Hacking in cybersecurity
Foot printing as phase of Hacking in cybersecurityFoot printing as phase of Hacking in cybersecurity
Foot printing as phase of Hacking in cybersecurityAliAlwesabi
 
Guide to Network Defense Router Security
Guide to Network Defense Router SecurityGuide to Network Defense Router Security
Guide to Network Defense Router SecurityAliAlwesabi
 
DNS Security Issues NES 554 for DNS Security
DNS Security Issues  NES 554 for DNS SecurityDNS Security Issues  NES 554 for DNS Security
DNS Security Issues NES 554 for DNS SecurityAliAlwesabi
 
Intrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdfIntrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdfAliAlwesabi
 
ISP Network Design workshops how to design networks
ISP Network Design workshops  how to design networksISP Network Design workshops  how to design networks
ISP Network Design workshops how to design networksAliAlwesabi
 

More from AliAlwesabi (18)

pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
 
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
 
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
 
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
 
lte-design-and-deployment-strategies-zeljko-savic.pdf
lte-design-and-deployment-strategies-zeljko-savic.pdflte-design-and-deployment-strategies-zeljko-savic.pdf
lte-design-and-deployment-strategies-zeljko-savic.pdf
 
Securing the LTE Core the Road to NFV 2014.pdf
Securing the LTE Core the Road to NFV 2014.pdfSecuring the LTE Core the Road to NFV 2014.pdf
Securing the LTE Core the Road to NFV 2014.pdf
 
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
 
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdfCCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
 
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdfD1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
 
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdfD2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
 
CISSP -Access Control Domain knowlege.pdf
CISSP -Access Control Domain knowlege.pdfCISSP -Access Control Domain knowlege.pdf
CISSP -Access Control Domain knowlege.pdf
 
VPN Guide to Network Defense and countermeasures
VPN Guide to Network Defense and countermeasuresVPN Guide to Network Defense and countermeasures
VPN Guide to Network Defense and countermeasures
 
zero trust - how to build zero trust.pdf
zero trust - how to build zero trust.pdfzero trust - how to build zero trust.pdf
zero trust - how to build zero trust.pdf
 
Foot printing as phase of Hacking in cybersecurity
Foot printing as phase of Hacking in cybersecurityFoot printing as phase of Hacking in cybersecurity
Foot printing as phase of Hacking in cybersecurity
 
Guide to Network Defense Router Security
Guide to Network Defense Router SecurityGuide to Network Defense Router Security
Guide to Network Defense Router Security
 
DNS Security Issues NES 554 for DNS Security
DNS Security Issues  NES 554 for DNS SecurityDNS Security Issues  NES 554 for DNS Security
DNS Security Issues NES 554 for DNS Security
 
Intrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdfIntrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdf
 
ISP Network Design workshops how to design networks
ISP Network Design workshops  how to design networksISP Network Design workshops  how to design networks
ISP Network Design workshops how to design networks
 

Recently uploaded

IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 

Recently uploaded (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 

eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf

  • 1. SRLabs Template v12 Mobile network hacking – All-over-IP edition BlackHat EU, Dec 4 2019, London Luca Melette <luca@srlabs.de> Sina Yazdanmehr <sina@srlabs.de>
  • 2. Mobile networks are evolving, and research is hardly keeping up 2 Research question After several decades of intercept attacks (A5/1, SS7, IMSI catchers), will RCS finally protect text messages?
  • 3. Agenda 3 1. Mobile attack recap 2. Attacks on new technologies 3. Mitigations
  • 4. Known mobile network attacks can be categorized into 5 classes 4 Intercept calls and texts Impersonate user identity Track users Conduct fraud DoS users or network Local Local Local No charge Subscriber Remote Remote Remote Charge others Network I II III IV V Attack impact Attack scope ▪ Passively sniff and crack weak encryption (A5/1, A5/2), run IMSI catcher ▪ Grab TMSIs over-the-air, spoof originating call or SMS via radio interface ▪ Collect IMSIs from the radio interface, verify user presence with silent SMS ▪ Disable call barrings and prepaid data limits via SS7 ▪ Make users unreachable via detach message (radio) or cancel location (SS7) ▪ Reroute voice flows enabling call forwarding via SS7 ▪ Send SMS or USSD code on behalf of another user via SS7 ▪ Globally locate mobile subscribers by requesting serving tower via SS7 ▪ Spoof calls and SMS to premium numbers, steal bank OTP codes in SMS ▪ Exhaust MSC/HLR resources via SS7 requests (RESET, PRN, ATI, PSI) Attack details
  • 5. Only some parts of a telco networks have been publicly dissected by security researchers 5 2G 3G 4G PSTN Voice core Packet core IMS, RCS Cell tower Mobile operator HLR User database SS7 IPX WiFi Internet Access point ePDG Mobile users SIM SIM Femto cell A B C D E Several vulnerabilities have been identified in these telco components: A. Malicious applications can be remotely installed in SIM cards B. Weak radio encryption allow call/SMS and data to be intercepted C. Devices in user hands can provide privileged access to core nodes D. Hackers can remotely intercept calls/SMS and track users because of missing authentication E. Like point D, but for data connections IMS partially covered: most of the publications show configuration mistakes
  • 6. Legacy standards are being replaced by new technologies: IMS (VoLTE, VoWiFi) and RCS 6 Data Voice Data Voice VoIP Dedicated voice channels (CSFB) Basic VoIP (IMS) The mobile uses legacy networks to transmit voice, the fast 4G link is only used for internet traffic IMS makes the fast LTE interface usable for both internet and voice traffic Advanced VoIP (IMS+RCS) RCS is supported by an increasing number of networks 3G 4G/5G 4G/5G Voice calls are moving from dedicated channels to voice-over-IP (VoIP) RCS messaging is similar to WhatsApp, iMessage
  • 7. RCS is already implemented by at least 100 mobile operators 7 [1] config.rcs.mncYYY.mccXXX.pub.3gppnetwork.org, where XXX and YYY are valid MCC and MNC values 300 LTE 200 VoLTE IMS 100 RCS 150 VoWiFi 900 mobile operators Lower-bound estimate for deployment status of ‘next-generation’ mobile network technologies ▪ Functional RCS deployments were identified through DNS and HTTP queries towards RCS-related domains [1] ▪ European telco groups constitute a large part of the current RCS deployments: - Orange (17 countries) - Vodafone (16 countries) - T-Mobile (9 countries)
  • 8. Active RCS deployments span 67 countries, while a few others are conducting trials 8 At least one network implements RCS RCS in trial
  • 9. Agenda 9 1. Mobile network attack recap 2. Attacks on new technologies 3. Mitigations
  • 10. What attacks are possible in RCS? 10 These hacks should work against many RCS deployments as they do not require secret information about the victim; they do rely on configuration issues in the network Requires victim’s config file or DNS MITM capabilities Track users Get IP address of victim / verify if user is online A Conduct fraud Inject traffic / hijack session if victim is behind the same NAT C Impersonate users Caller-ID spoofing in calls / messages B Website DDoS Send file attachment forcing auto-preview on victim D Intercept texts Connect to RCS with user credentials or hijack user session E Example hacking goal Example method using RCS Attack scope
  • 11. 11 Mobile operator A Mobile operator B 001 003 User presence and coarse location can be disclosed by replies to SIP OPTIONS requests A IMS RCS IMS RCS SIP OPTIONS +4917xxx001 SIP OPTIONS +4917xxx002 SIP OPTIONS +4917xxx003 SIP reply: user not found SIP reply: user available Attacker Once connected to RCS, a malicious user can collect information about other users by sending the SIP OPTIONS request to sequential mobile numbers In addition to presence, the response message discloses the local IP of the victim, potentially revealing its location SIP/2.0 200 OK CSeq: 1 OPTIONS Contact: <sip:+49xxx01@111.22.33.44:5060; transport=tls> Thanks to number portability and commercial agreements between operators, users in other networks can be also paged and later attacked SIP reply: user available 1 2 3
  • 12. Missing verification of user supplied heat SBC allows caller-ID spoofing 12 B Attacker Attacker registers with their own identity Bob Alice Bob receives a call from Alice’s spoofed identity REGISTER sip:mno.net SIP/2.0 From: <sip:+4917...@mno.net>;tag=291412310 To: <sip:+4917...@mno.net> ...... SIP REGISTER 1 INVITE sip:bob@mno.net;phone-context=mno.net SIP/2.0 To: <sip:bob@mno.net;phone-context=mno.net> From: <sip:1337@mno.net>;tag=291412310 P-Preferred-Identity: <sip:1337@mno.net> ...... SIP INVITE 2 1 Then spoofs another user’s identity to make a call 2 IMS RCS
  • 13. Traffic injection is possible if victim and attacker share the same public IP address 13 WiFi NAT X Internet User VPN Attacker RCS core User IP PCSCF user-1 [Ext IP] pcscf 2 User Attacker Attack scenario 1 User and attacker connect behind the same NAT and share an external IP Attacker identifies the correct PCSCF by trying all options In some implementations, attackers can inject messages into the RCS core because users are solely identified by their mobile number and public IP Attacker controls Internet uplink of victim PCSCF 1 PCSCF 2 The attacker and victim are behind the same NAT Attack scenario 2 The attacker manipulates user traffic using a rogue AP 1a 1b 2 3 C -Demo-
  • 14. Automatic media preview of malicious links enables DDoS and sensitive info leaks 14 D File transfer server 3- SIP/MSRP message including media transfer Bob Alice The Message Session Relay Protocol is used to share files (images, videos, audio) between RCS users. This protocol is similar to SIP and HTTP, and carries content metadata in XML format. RCS can send media content Scenario 1 - Leverage RCS clients to DDoS a website 1. Attacker identifies a large file on a target website 2. Attacker crafts an XML message where the thumbnail URL (indicated as a small file) points to target large file 3. Attacker sends the crafted XML message as a SIP/MSRP message to many thousands of subscribers 4. Each RCS client automatically attempts to download the file overloading the target website Scenario 2 - User tracking 1. The attacker starts a web server on a public IP 2. The attacker sends an RCS message including preview-able contents hosted on that server 3. The victim attempts to download the content disclosing their IP address Scenario 3 - Account takeover 1. The attacker conducts the attack as in scenario 2, and collects headers sent by the victim 2. If an RCS session token is included, the attacker can impersonate the victim sending messages and starting calls
  • 15. Intercept can be achieved abusing RCS signaling in multiple ways 15 E Set call forwardings abusing the XCAP interface Steal the config file so you can provision on behalf of the victim Implementation issues (vendor dependent) We found some buggy XCAP implementation that does not properly validate the identity when interacting with the server, thus enabling XCAP settings manipulation Configuration issues (network dependent) If the XCAP server uses password authentication instead of the secure SIM-based authentication, the password could be brute-forced Malicious apps Mobile hotspot sharing Malicious open WiFi with captive portal Brute force identity/OTP via web Attack scenario 1 Attack scenario 2 1 2 3 4 Details in the next slides SIP MITM via DNS spoofing Attack scenario 3 Redirect SIP traffic to a rogue P-CSCF 5
  • 16. Malicious app or rogue hotspot can get in the middle of RCS provisioning 16 User Config server SMSC 1 2a 2b 3 4 HTTP request including user’s IMSI Config server generates an OTP and delivers it to the user via SMS Binary SMS carrying the OTP HTTP reply with session ID as cookie HTTPS request including IMSI, OTP and session ID XML config file Server responds with 200 OK HTTP status code, and includes a valid session ID as cookie in case the IMSI is valid Server returns the XML config file if all received information is correct TLS connection ▪ The app is installed on victim’s device ▪ The app uses victim’s LTE connection to fetch config file ▪ If the app has SMS_READ permission, it can retrieve even OTP code, for networks that require it ▪ Attacker uses victim’s LTE connection via hotspot sharing ▪ Attacker can request config file through victim’s connection, and retrieve it Attack scenario Malicious app Attack scenario Mobile hotspot sharing E 1 2 1+2
  • 17. 17 User LTE Rogue AP Attacker’s server RCS config server Internet 1 2 3 4 1. Victim tries to access a website through a rogue AP 2. The rogue AP retrieves the content of the website requested by the victim and forwards it back injecting malicious JavaScript. Immediately after, the AP pushes back the victim to LTE, terminating the WiFi access 3. The malicious JavaScript code retrieves the RCS config file via LTE connection 4. The malicious JavaScript code uploads the retrieved XML config file to the attacker’s server on the internet Rogue WiFi can steal victim’s config file injecting JavaScript code E 3 -Demo- Attack sequence 1 2 3 4
  • 18. 1. Enumerate valid IMSIs 1. Enumerate valid IMSIs Some networks requiring OTP verification are prone to user account brute force 18 E RCS auto config server Attacker Get cookie (invalid IMSI) HTTP 40X Get cookie (valid IMSI) HTTP 200 + Cookie 4 Enumerate IMSIs. Perform GET over HTTP supplying a random IMSI until a 200 is returned Valid IMSIs found Brute force OTP. Quickly perform GET over HTTPS trying all possible OTP values (up to 6 digits) RCS auto config server Attacker Get config (IMSI, cookie, OTP1) HTTP 40X Get config (IMSI, cookie, OTP2) HTTP 200 + XML config Correct OTP found 1 2
  • 19. Intercept first step: Login using victim’s RCS account, activate SMS-over-IP in HSS 19 E User Attacker eNB EPC P-CSCF Internet S-CSCF HSS/HLR User SMSoverCS SMSoverIP 12345678 Yes Yes Attacker registers to the RCS, announcing the SMS over IP capability in the SIP ‘Contact’ header User attaches to the LTE network User Capabilities Connection 12345678 [+g.3gpp.smsip] tcp:1.1.1.1:5060 MME IMS Steal victim’s RCS config file (using any of the 4 methods described in the previous slides) 1 2 3 1-4
  • 20. Intercept second step: Wait for SMS delivery 20 E Sender wants to authenticate user through OTP SMSC HSS/ HLR MSC User submitSM forwardSM S-CSCF P-CSCF Attacker As SMS-over-IP is activated, the HLR returns the GT of the IP-SM-GW for delivery The IP-SM-GW forwards the message first via IP. If the delivery fails, the message is delivered as SMS-using-CS fallback eNB MME OTP is sent as second factor; Both the victim and the attacker receive the OTP SMS Internet IP-SM- GW 4 5 6 -Demo- 1-4
  • 21. Local DNS spoofing enables MITM attacks against default Android RCS implementation 21 E Fake P-CSCF 1 2 3a 3b DNS: SRV pcscf.operator.com? DNS: 5060, pcscf.attacker.io TLS hello TLS hello (valid cert) 4 SIP REGISTER Victim Rogue WiFi access point Legitimate P-CSCF 1. Victim’s RCS client tries to resolve the IP address of the P-CSCF 2. The rogue AP replies with a fake response that points to a fake P-CSCF controlled by the attacker 3. Victim’s RCS client successfully establishes a TLS connection with the fake P-CSCF (valid certificate) 4. The fake P-CSCF transparently forwards all RCS traffic between the victim user and the legitimate P-CSCF Attack sequence 1 2 3 4 Trusted TLS connection to the attacker TLS connection to legitimate P-CSCF The lack of strict domain matching between initial RCS config parameters and actual TLS certificates allows hackers to fully hijack RCS sessions with any valid SSL certificate Attacker uses a valid cert for pcscf.attacker.io -Demo- 5
  • 22. Agenda 22 1. Mobile network attack recap 2. Attacks on new technologies 3. Mitigations
  • 23. ▪ Not all RCS deployments are vulnerable to all attacks discussed in this presentation ▪ We found some networks vulnerable to each of the attacks ▪ To mitigate attacks, seven countermeasures can improve RCS deployments MNOs and RCS vendors can mitigate these issues by applying 7 best practices 23 Avoid information leakage Best practice Affected components Validate client identity Filter uploaded contents SBC/P-CSCF SBC/P-CSCF, RCS client SBC/P-CSCF, FT server Area Client provisioning RCS services Use strong OTP verification codes Apply rate limiting RCS configuration server RCS configuration server, SBC/P-CSCF OTP should be at least 8 alphanumeric characters Limit OTP validity to 5 minutes and 3 HTTP request attempts Strip sensitive information from SIP requests Implementation details Validate SIP session using state (e.g. source IP, cookie, …) Check/restrict content-type and size provided by clients Authenticate using SIM / secure element RCS configuration server User authentication should be GBA/BSF based o r Enforce chain of trust RCS client, DNS Connect only to trusted domains, validate certificates RCS client
  • 24. Take aways 24 Questions? Luca Melette <luca@srlabs.de>, Sina Yazdanmehr <sina@srlabs.de> 1 Telcos and mobile vendors are moving all communications to IP protocols 2 New technologies are often poorly implemented and vulnerable to old attacks 3 Weak user authentication can expose RCS clients to intercept and impersonation risks 4 Security best practices should be applied and verified to new telco technologies