We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Red Team Village - Bypassing in Mobile Network from Red Team Points Of View

00:00

Formale Metadaten

Titel
Red Team Village - Bypassing in Mobile Network from Red Team Points Of View
Serientitel
Anzahl der Teile
374
Autor
Lizenz
CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
This talk focus on reviewing implementation of new security features in mobile networks as well as detecting techniques and bypassing methods from red team perspective . The scope of the illustration include both radio (SDR) and signalling core network attacks. - The outline of the presentation // max 500 words One of the most complicated network is mobile telecom network. There are some segments include signalling, charging, packet data, Radio etc. Still there are many security holes that allow attackers to compromise the network and however telecom companies enable security mechanisms and put some security devices. In this talk, I will cover common high-tech security solutions used by telecom operators and and all ways to detect and after that bypass it as well as security recommendations to prevent theses activities. In this talk I will start the presentation with recent telecom abuse and related hacking news in 2019. In the next section I will cover common mobile network vulnerabilities and architecture. After that illustrate security of radio access network (RAN) and bypassing scenarios and techniques: 1. Mobile Phone Registration (IMEI policies) Bypass 2. Bypassing Unrevealed Ciphering Algorithms 3. 5G, LTE/LTE Advanced Bypass The next part of the talk will be assign to Circuit Switch network (Signaling) and the technical bypass techniques are as below: 1. Home Routing Detection 2. Bypassing Home Routing 3. Signalling Firewall Detection 4. Bypassing Signalling Firewall And at the final section I will explain security solutions to defend against these malicious techniques.
RechnernetzMobiles InternetPunktSichtenkonzeptATMInformationTelekommunikationHackerSoftwaretestEindeutigkeitZahlenbereichFlächeninhaltNichtlinearer OperatorComputersicherheitProxy ServerCybersexSoftwareschwachstelleMobiles InternetPerspektiveSelbst organisierendes SystemSoftwareCoxeter-GruppeURLComputeranimation
Regulärer GraphATMBereichsschätzungRegulärer GraphProgrammfehlerDatenfeldComputersicherheitVarietät <Mathematik>Cybersex
RechnernetzMobiles InternetHackerATMHöhere ProgrammierspracheBenutzerfreundlichkeitInformationSelbst organisierendes SystemTelekommunikationHackerInzidenzalgebraCASE <Informatik>ATMComputersicherheitProtokoll <Datenverarbeitungssystem>AutorisierungSoftwareschwachstelleMessage-PassingRechter WinkelStrahlensätzeTwitter <Softwareplattform>
RechnernetzStellenringDatenmissbrauchATMSimulationSoftwareInformation RetrievalTypentheorieProfil <Aerodynamik>Kategorie <Mathematik>SoftwaretestMaschinencodeMereologieSpeicherabzugZellularer AutomatFlächeninhaltSystemaufrufCASE <Informatik>Komplexe EbenePlastikkarteImaginäre ZahlHoaxSoftwareschwachstelleURLStrahlensätzeMobiles InternetSpezialrechnerProxy ServerIdentifizierbarkeit
RechnernetzArchitektur <Informatik>Mobiles InternetATMSoftwareTypentheorieEinfach zusammenhängender RaumMereologieSpeicherabzugZellularer AutomatTurm <Mathematik>DifferenteComputeranimation
ATMRechnernetzArchitektur <Informatik>Mobiles InternetComputerarchitekturSoftwareHackerGenerator <Informatik>ComputersicherheitPunktSichtenkonzeptElement <Gruppentheorie>SoftwareschwachstelleComputeranimation
PunktMobiles InternetRechnernetzVektor <Datentyp>ATMRegistrierung <Bildverarbeitung>ComputersicherheitHöhere ProgrammierspracheAlgorithmusHardwareSoftwareRechnernetzVektorraumGruppenoperationSpeicherabzugQuick-SortInternetworkingDatenfeldComputersicherheitPunktService providerRegistrierung <Bildverarbeitung>ZweiBenutzerbeteiligungStrahlensätzeMobiles InternetMechanismus-Design-TheorieDesign by ContractMetropolitan area networkComputeranimation
ATMArchitektur <Informatik>SoftwareGenerator <Informatik>SpeicherabzugInterface <Schaltung>Twitter <Softwareplattform>Computeranimation
Mobiles InternetProxy ServerRegistrierung <Bildverarbeitung>ATMFontRechnernetzSoftwareMathematikSoftwareSoftwaretestGesetz <Physik>SystemaufrufComputersicherheitHilfesystemProxy ServerRegistrierung <Bildverarbeitung>Mobiles InternetIdentitätsverwaltung
Registrierung <Bildverarbeitung>Mobiles InternetIdentitätsverwaltungATMSoftwareTypentheorieIdentitätsverwaltungSchnittmenge
Proxy ServerRegistrierung <Bildverarbeitung>Mobiles InternetATMRechnernetzSchlüsselverwaltungSoftwareAlgorithmische ProgrammierspracheDatenbankTypentheorieSpeicherabzugZufallsgeneratorZusammenhängender GraphAuthentifikationSchlüsselverwaltungHome location register
ATMSchlüsselverwaltungVektorrechnungInformationSoftwareMAPAuthentifikationHome location registerSpeicherabzug
NP-hartes ProblemATMSpeicherabzugTeilbarkeitComputersicherheitRadiusDatenmissbrauchSpannungsmessung <Mechanik>Mechanismus-Design-Theorie
ATMUnrundheitDigitaltechnikSoftwareComputersicherheitComputeranimation
ATMHöhere ProgrammierspracheDigitaltechnikSoftwareComputersicherheitFirewallProxy ServerZweiComputeranimation
Proxy ServerMessage sequence chartZufallszahlenExogene VariableInstant MessagingInformationSpeicherabzugATMRoutingInformationPerspektiveZahlenbereichReelle ZahlExogene VariableRouterProxy ServerHome location register
MAPMessage-PassingExogene VariableDifferenteMessage sequence chartATMInformationMathematikSoftwaretestReelle ZahlExogene VariableCASE <Informatik>RouterMultiplikationsoperatorMessage-PassingHome location register
TypentheorieMessage sequence chartRoutingProxy ServerInstant MessagingHome location registerATMInformationSoftwareTelekommunikationValiditätTypentheorieMaschinencodeZahlenbereichRandomisierungNetzadresseMobiles InternetNichtlinearer OperatorFlussdiagramm
Message-PassingATMNichtlinearer OperatorFirewallMailing-ListeMobiles InternetSchreiben <Datenverarbeitung>
Protokoll <Datenverarbeitungssystem>ATMDatenbankInformationOrdnung <Mathematik>SoftwareInformation RetrievalArithmetisches MittelEinfach zusammenhängender RaumIntelligentes NetzNichtlinearer OperatorRPCPunktProtokoll <Datenverarbeitungssystem>Framework <Informatik>Dienst <Informatik>Office-PaketInterface <Schaltung>
Message-PassingFirewallATMDialektDelisches ProblemExogene VariableNichtlinearer OperatorAusnahmebehandlungZusammenhängender GraphKugelkappeKartesische KoordinatenProxy ServerKontextbezogenes SystemMessage-PassingBefehlscodeComputeranimation
Kontextbezogenes SystemGarbentheorieMessage-PassingMAPAdressraumFirewallATMMAPAlgorithmische ProgrammierspracheGarbentheorieMereologieKartesische KoordinatenKontextbezogenes SystemMessage-PassingApp <Programm>Proxy Server
Message-PassingMAPFirewallBefehlscodeATMTypentheorieDelisches ProblemZahlenbereichNichtlinearer OperatorFirewallp-BlockProxy ServerMessage-PassingZweiBefehlscodeComputeranimation
GruppoidMessage-PassingAdressraumBefehlscodeFirewallMAPATMInformationSoftwareMAPMaschinencodeSpeicherabzugZahlenbereichReelle ZahlNichtlinearer OperatorZusammenhängender GraphPunktFirewallRetimingMessage-PassingBefehlscodeHome location register
RechnernetzComputersicherheitMobiles InternetProxy ServerAnalysisStetige FunktionATMAnalysisSoftwareTelekommunikationAnalytische FortsetzungNichtlinearer OperatorComputersicherheitService providerDatenmissbrauchProxy ServerMobiles InternetMechanismus-Design-TheorieGrenzschichtablösung
ATMMaschinenschreibenComputeranimation
Transkript: Englisch(automatisch erzeugt)
hope you're doing great and safe. First of all, before starting my presentation, I would thank the organizer, sponsors, Omar Santos, and yet another security community, Yas, for their support. This is my honor to speak at DevCon
writing village and I'm really excited about this. So, this talk, I think, is really interesting because we are going to take a look at the mobile network, which is used by mobile operators and many other entities all around the
world. This area of test contains many, many valuable information like user location, user unique information, and phone number related data. The important thing in this talk is that we're going to review all possible bypassing methods
because I think you may hear much about telecom and SS7 vulnerabilities and hacking. So, the purposes of this talk are to address all those bypassing techniques from a Red Teamer perspective. If you're ready, let's get
started. So, first, I want to introduce myself. I'm Ali Abdoulahi, a cyber security enthusiast with over eight years of experience in a variety of fields, trying to make the world a safer place. I'm an instructor at
Hacking9 and an active researcher and bug hunter. I'm a regular speaker and trainer at famous cyber security and hacking global conferences like Cocone, TyphoonCon, Texas Cyber Summit, OS AppSec Days, Confidence, and
this year proudly announced that except Red Team Village, I'm a speaker and trainer at Aerospace and AppSec villages. As you can see, there are many security incidents and news about vulnerabilities and hacking mobile
infrastructure, including protocols, communications, and interconnections. In the top left corner, there is a news regarding attacking financial organizations and the ATM infection by exploiting SS7 protocol. In this case,
hackers tried to intercept authorized payment phone, SMS, to exploit them. So, because one of the most usable attacks in SMS interception and spoofing,
in the lower left corner, you can see a news about using telecom protocol to target UK Metro Bank in 2019. In this scenario, hackers tracked and intercepted text messages to gain unauthorized access to banking accounts.
In the top right corner, you can find another news regarding fixing SS7 and telecom vulnerabilities in US, which would be very helpful to secure the communications and subscribers' private info. So, the last one is news about
sending tweets via SMS, which patched by Twitter to avoid unwanted and harmful tweets and combating malicious actors. So, now, the question is that what types of attacks and vulnerabilities threaten mobile networks and subscribers,
and why they are important to retiners? So, the first possible attack category is subscriber data leakage. Actually, subscriber data leakage is a vital
part for retiners to set up their next steps and scenarios. In this part of the scenario, they will retrieve subscribers in the number and other stuff. Next one is network data leakage, which is very important for retainer to understand what's happening inside mobile core network and what
kind of devices are in place there. Finding mobile subscribers' location is one of the most critical issue. So, based on this attack, criminal can
retrieve subscribers' CGI or cell global identifier and convert it to MCC mobile country code, MNC mobile network code, and LAC or LAC location area code, and cell ID or CID to find the actual sector which the subscriber
connected to. Sniffing is the next scenario which points to voice and SMS interceptions. Spoofing is another test case, which is very interesting because if you want to take advantage of it as a retainer, you may perform
a call with fake caller ID or send an SMS via fake number. The last attack category is fraud. Retiners can perform malicious usage to requests, call redirection, SIM card profile swapping, etc., to done fraud attack categories. Now, we are starting our bypassing journey
one by one. So, first of all, we are going to talk about radio segment, which is the most accessible part of a mobile network. As you can see here, we have a big picture of a radio access network or RAN in different
technologies, BTS in 2G or GSM, Node-B in 3G or UMTS technology, and eNode-B in 4G or LTE networks. So, there is a connection between cell
towers to the core networks, and based on your traffic type, means voice or data, the data pass through to CS core or circuit switch network or packet switch network. In this picture, we have 5G architecture.
Most of elements are different, but from a retainer point of view, security flaws and opportunities in traditional technologies still available here. Please note that 5G has its own vulnerabilities and because of IP backbone
and software usage in this generation, many other doors open to hackers. Now, we are going to review all possible vectors for a retainer when facing
with a mobile network. First is mobile RAN radio access network. So, retainer needs to be in radio field and needs to have some sort of tools like hardware and software. Second is signaling network or CS.
So, to do this, retainer needs to have access to the signaling network. Retainer can buy the access from dark web even or officially from telco providers all around the world or based on the contract retrieved from the network owner. Data network is more easier because most of attacks can
perform from the internet and some of them from a signaling point. Okay. Now, we are going to review security mechanisms in radio access
network or radio security. The first one is mobile device registration using IMEI. Second is enabling ciphering algorithm to fight against interception and man in the middle. Third item is using only LTE or LTE
advanced or some other advanced mobile technologies instead of traditional mobile core networks in 2G and UMTS. So, as you can see here, this is the big picture of a radio access network and you can see it is in LTE
generation, fourth generation. Radio access network in this technology called eUTRAN or eWOLV eUTRAN and the eNodeBeads are here.
They are connected to each other using each two interfaces and connected to the core network using S1 interfaces. Okay. Why using IMEI policies?
Actually, to fight against phone smuggling, lawful and security monitoring, tracking stolen devices, and criminals are the most usage of mobile device registration or IMEI-based policies. Okay. Now, with the help of Motorola
phone C115 and 118 and OsmoCon BB software, we can set an invalid or fake or even duplicate IMEI and set up a call to test network reactions.
So, this is the bypass, the first bypass in radio access network. According to this screenshot here, network sends identity requests to my phone and the type of identity was IMEI. So, I replied to it using an invalid IMEI set to all zero.
So, the network accepted my invalid IMEI because ciphering procedure is completed.
So, there are some types of ciphering keys like KC, address, and random number. In radio access network, which harden the radio network to avoid active sniffing and they always
store in HLR or HSS in core network. HLR or HSS as subscriber database has components called AUC or authentication center which responsible for ciphering and authentication
procedures. To bypass and get this information, we are going to target AUC in HLR or HSS by abusing SS7 and signaling access as a running partner. As you can see, I sent a malicious SS7
map, SAI or send authentication info to targeted core network from SS7 network to retrieve ciphering information and the network respond me via RAND, SRS, and KC values in clear text.
Another security mechanism is using advanced technologies to bring highest quality and performance, having more security and privacy in core and radio segments and other factors
like voice-over LT, VLT, flexibility, etc. Okay, so what's reviewing first-round-up
bypassing method? Totally, there is a general way and it is downgrading subscribers to traditional technologies like 3G and 2G which are vulnerable. To perform downgrading, we need to use a signal jammer. Security in circuit siege network. There are two main security
solutions in this segment of network and the first is using SMS homeroating and second one is signaling firewall. Homeroating acts as a proxy and the definition of homeroater
is to hiding subscriber MC number which is very valuable information to perform other hacking scenarios from a red teamer perspective. As you can see, a red teamer requests to
receive MC number from HLR HSS and the HSS respond with real value. However, homeroater changed the value with a fake one. So the main issue is that how we can detect if homeroating
is enabled or not. Just need to send two or more malicious SS7 messages like send routing info for SM or SRI for SM. If we receive different responses, it means that SMS
homeroating is in place. As you can see here, red teamer or our tester send two different messages or the same message two times and responses are different as you
can see. And the main issue is SMS router here because in both cases, HLR HSS respond with a real number. However, SMS router change the actual values. In telecommunications,
we have three types of GTs or global title which act as IP address. MS ISDN consist of MCC or mobile country code, NDC and SN. EMC consist of MCC, MNC or mobile network
code and MSIN. MGT consist of MCC, NDC and MSIN. As you can see, red teamer can use MGT number and a valid random EMC number to request other information regarding the
targeted mobile number and it's really easy. Signaling firewall. Mobile operators use signaling firewall to protect their signaling infrastructure. Signal packet inspection,
filtering, write and blacklisting. Bypassing signaling firewall. So, to bypass these
kind of firewalls, we need just to playing with TCAP. What is TCAP? TCAP is essentially SS7 sub-protocol and it's like TCP. TCAP enables the deployment of advanced intelligent network services by supporting non-circuit related information exchange between signaling
points using the SSCP connectionless service. TCAP provides the framework to retrieve information or invoke remote operations and offers the means for end users in the SS7 network to
query another end office and acts as the software interface between an SS7 point and database services in order to obtain data from the SS7 network. To perform bypassing,
we need to remove application context name from TCAP or sending double operation message.
The application context name or ACN is used for all supported ITU TCAP messages except abort, abort message. No attempt to retrieve the ACN is made for abort messages. All other supported messages may have a dialog portion containing dialog request, unidirectional
dialog and dialog response PDU from which the ACN is retrieved. If no dialog portion is detected, then the ACN is assumed to be none. The TCAP opcode based routing feature
attempts to find the opcode in all supported TCAP messages except abort. These messages must contain invoke or return results, stand for last or not last as the first component.
If not, the opcode is assumed to be none. So removing application context name from TCAP message. To start the procedure, we need to remove dialog request section from
our malicious SS7 message. Then there will not application context name to point to malicious SS7 map message or mobile application part message. So this is the second bypassing
method, sending double operation message. Actually, most of signaling firewall block or accept a message based on message type. So each signaling message has its own opcode
and it's a vital number. According to the picture, red teamers trying to put a legitimate
SS7 map message opcode in the first step and so it seems a legitimate one. And then put a malicious SS7 map message. So signaling firewall check just the first
operation code which is pointing to a legitimate operation. After that, the component inside the core network replied to signaling firewall or actually a red teamer here in this scenario
and trying to keep session which is legitimate and valid and ask to send the message again. So our red teamer says thanks and this is what he wants. And still the whole session
is still available and legitimate as well. So hlr, hss are all available and legitimate
signaling point inside our core network will respond with real subscriber in the number and network information. And this is what actually a red teamer wants. As I mentioned, in past several years, mobile network operator and telecom providers turn
against telecom and especially SS7 attacks and enable many security mechanisms. In this talk, I tried to explain all possible bypassing techniques in all network segments
in telecom infrastructures. We must consider that red teaming is very important because in these networks, we are dealing with millions of user private data. Be careful that it's blind hardening and buying security appliances or software because they are not
fair enough. We must have behavior analysis and continuous monitoring as complementary solutions. Thank you very much for your attention. I'm still available for any questions. I hope you enjoyed this talk and please in touch with me.