SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
Securitate mobila –
 Atacuri prin SMS
       Prezentator:
     Bogdan ALECU
     http://m-sec.net
    Twitter: @msecnet
Informatii generale despre SMS
Amenintari
WAP
Interceptare trafic de date
Demo
Informatii generale
SMS - Short Message Service reprezinta un
mod de comunicare prin mesaje text intre
telefoanele mobile / fixe, utilizand un protocol
standardizat. Este un mod de comunicare
eficace; utilizatorul scrie un text, apasa SEND si
mesajul e livrat aproape instant catre destinatar.
Folosit pentru mai multe scopuri: MMS –
Multimedia Messaging Service, OTA – Over The
Air – configurarea telefonului, notificari pentru
mesageria vocala, email, fax, microplati – plata
unor sume mici pentru diferite servicii =>
SECURITATE!
Informatii generale
“Un dispozitiv mobil activ trebuie sa fie
capabil de a primi un mesaj scurt de
tipul TPDU - Transfer protocol data unit
- (SMS-DELIVER) in orice moment,
indiferent daca exista un apel sau trafic
de date in derulare. Un raport va fi
trimis intotdeauna catre SC (Serviciul
de mesaje); confirmand fie ca tel a
primit mesajul sau ca mesajul nu a fost
livrat, incluzind si motivul refuzului.”
ETSI TS 100 901 V7.5.0 (2001-12), pag
13
Amenintari - SMS
SMS SPAM
SMS spoofing
Notificari SMS
Alte tipuri
Amenintari - SMS
  SMS SPAM
Companiile ofera servicii de publicitate
  prin SMS
Mesaje cu castiguri false
Inginerie sociala – “Suna-ma urgent pe nr
  asta: 0900323421! Mama”
Amenintari - SMS
  SMS Spoofing
Servicii online ce permit modificarea
  expeditorului (numeric / alfanumeric)
Greu de oprit, mai ales daca tinem cont de
  roaming
Eficienta mai mare in atacurile de tip
  inginerie sociala
Amenintari - SMS
  Notificari SMS
Voicemail
Fax
E-mail
Video
Utilizatorul nu poate scoate icon-ul de
  notificare asupra primirii unui astfel de
  mesaj
Amenintari - SMS
Notificari SMS
(voicemail)
Amenintari - SMS
Notificari SMS
(email)
Amenintari - SMS
  Alte tipuri
Flash SMS (Class 0) – utilizatorul vede
  mesajul direct, fara a intra in Inbox
Silent SMS – DCS 0xC0 = Message Waiting
  Indication Group: Discard Message
Amenintari - SMS
  Alte tipuri
Flash SMS
Amenintari - SMS
  Alte tipuri
Silent SMS
WAP
Wireless Application Protocol
Arhitectura de retea specifica
Set de reguli
Limbaj specific: Wireless Markup Language
(WML)
Pagini HTML ajustate pentru dimensiunea
ecranului telefonului
WAP
WAP Push
Permite trimiterea de continut WAP cu o
interventie minima din partea utilizatorului
2 tipuri: Service Indication / Service Load
WAP Push
Service Indication (SI) permite trimiterea
de notificari utilizatorului intr-un mod
asincron
WAP Push
Service Indication (SI)
WAP Push
Service Load (SL) determina “aplicatia” de
pe telefon sa incarce si execute un
serviciu
WAP Push
Service Load (SL)
WAP Push - securitate
   Teoria: Doar un anumit numar este autorizat pentru
   trimitere; Practica: daca nu e configurat bine, un telefon
   accepta de la orice numar astfel de mesaje
   Pe Windows Mobile trebuiesc verificate setarile din
   HKLMSecurityPoliciesPolicies
; SL Message Policy ; (default: SECROLE_PPG_TRUSTED)
   [HKEY_LOCAL_MACHINESecurityPoliciesPolicies]
   "0000100c"=dword:800 ; SI Message Policy ; (default:
   SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED)
   [HKEY_LOCAL_MACHINESecurityPoliciesPolicies]
   "0000100d"=dword:c00
WAP Push - securitate
SECROLE_PPG_TRUSTED: Trusted Push Proxy
Gateway. Messages assigned this role indicate
that the content sent by the Push Initiator is
trusted by the Push Proxy Gateway. This role
implies that the device trusts the Push Proxy
Gateway (SECROLE_TRUSTED_PPG).
SECROLE_PPG_AUTH: Push Initiator
Authenticated. Messages assigned this role
indicate that the Push Initiator is authenticated by
the Push Proxy Gateway. This role implies that
the device trusts the Push Proxy Gateway
(SECROLE_TRUSTED_PPG).
WAP Push - securitate
WAP
Configurarea telefonului pentru acces la Internet
/ date poate fi facuta manual
Pentru o configurare mai usoara, rapida si
pentru eventualele schimbari, a fost creat un
standard ce permite configurarea de la distanta
Programarea Over The Air (OTA) foloseste
standardul OMA – Open Mobile Alliance
Programarea se face prin SMS-uri special
concepute
WAP - provisioning
Foloseste protocolul WAP
WBXML (WAP Binary XML) prin Wireless
Application Environment
Wireless Session Protocol
Wireless Datagram Protocol
SMS
WAP - provisioning
Configurarea se scrie in XML (conform
specificatiilor de la
http://www.openmobilealliance.org)

XML-ul se va codifica in WAP Binary XML
WBXML se va encapsula intr-o data de tip
Wireless Session Protocol
Datele se vor codifica intr-un mesaj Push, definit
in Wireless Session Protocol
WAP - provisioning
Mesajul Push contine diferiti parametri,
unul fiind parametrul “SEC” pentru
autentificare pe baza de “cheie” comuna
USERPIN: string ASCII codificat in
zecimale
NETWPIN: cheia este specifica retelei si
cunoscuta (teoretic) doar de catre operator
USERNETWPIN: combinatie a celor 2
WAP - provisioning
NETWPIN: IMSI = MCC+MNC+MSIN
(Mobile Subscription Identification
Number)
Pret: 2-5 euro-centi
In general limitat pentru companii, se cere
un volum mare de interogari
WAP - provisioning
<wap-provisioningdoc>
<characteristic type="NAPDEF">
<parm name="NAME" value="NewAPN"/>
<parm name="NAPID" value="NewAPN_NAPID_ME"/>
<parm name="BEARER" value="GSM-GPRS"/>
<parm name="NAP-ADDRESS" value="apn.operator.ro"/>
<parm name="NAP-ADDRTYPE" value="APN"/>
</characteristic>
<characteristic type=“APPLICATION">
<parm name="NAME" value="NewAPN"/>
<parm name="APPID" value="w2"/>
<parm name="TO-NAPID" value="NewAPN_NAPID_ME"/>
</characteristic>
<wap-provisioningdoc>
WAP - provisioning
<wap-provisioningdoc> - contine toata informatia
  transmisa
<characteristic …> - grupeaza informatia in unitati
  logice
<… value="NAPDEF"/> - configuram un nou
  network access point
<parm name="APPID" value="w2"/> -
 mapeaza configuratia la activitatile de
 browsing

Informatii la http://www.openmobilealliance.org
WAP - provisioning
<wap-provisioningdoc>
<characteristic type="BOOTSTRAP">
<parm name="NAME" value=“Operator NET"/>
<parm name="PROXY-ID"
  value="OpNET_Proxy"/>
</characteristic>
<characteristic type="NAPDEF">
<parm name="NAME" value="OpNET"/>
<parm name="NAPID" value="OpNET_NAPID"/>
<parm name="BEARER" value="GSM-GPRS"/>
<parm name="NAP-ADDRESS" value="net"/>
<parm name="NAP-ADDRTYPE" value="APN"/>
</characteristic>
WAP - provisioning
<characteristic type="PXLOGICAL">
<parm name="NAME" value="OpNET"/>
<parm name="PROXY-ID" value="OpNET_Proxy"/>
<characteristic type="PXPHYSICAL">
<parm name="PHYSICAL-PROXY-ID"
   value="OpNET_PhProxy"/>
<parm name="PXADDR" value=“192.168.1.1"/>
<parm name="PXADDRTYPE" value="IPV4"/>
<parm name="TO-NAPID" value="OpNET_NAPID"/>
<characteristic type="PORT">
<parm name="PORTNBR" value="8080"/>
</characteristic>
</characteristic>
</characteristic>
WAP - provisioning
<characteristic type="APPLICATION">
<parm name="APPID" value="w2"/>
<parm name="NAME" value="OpNET"/>
<parm name="TO-PROXY"
  value="OpNET_Proxy"/>
<characteristic type="RESOURCE">
<parm name="NAME" value="OpNET"/>
<parm name="URI"
  value="http://www.google.com"/>
<parm name="STARTPAGE"/>
</characteristic>
</characteristic>
</wap-provisioningdoc>
WAP - provisioning
Teoretic aceasta configurare poate fi facuta
doar de catre operator, de la un numar
predefinit
Putem analiza SMS-ul prin WireShark
Putem adauga un alt numar
WAP - provisioning
<?xml version="1.0"?>
<!DOCTYPE wap-provisioningdoc PUBLIC "-//WAPFORUM//DTD PROV 1.0//EN"
              wap-                         "-
     "http://www.wapforum.org/DTD/prov.dtd">
     "http://www.wapforum.org/DTD/prov.dtd">
<wap-provisioningdoc version="1.1">
 wap-
<characteristic type="BOOTSTRAP">
<parm name="NAME" value=“Nume"/>
                       value=“ Nume"/>
</characteristic>
<characteristic type="PXLOGICAL">
<parm name="NAME" value=“Nume"/>
                       value=“ Nume"/>
<parm name="PROXY-ID" value="Trusted_Proxy"/>
       name="PROXY-        value="Trusted_Proxy"/>
<parm name="NAME" value="Trusted Proxy"/>
<characteristic type="PXPHYSICAL">
<parm name="PHYSICAL-PROXY-ID" value="Trusted_PhProxy"/>
       name="PHYSICAL- PROXY-          value="Trusted_PhProxy"/>
<parm name="PXADDR" value="40711111111"/>
<parm name="PXADDRTYPE" value="E164"/>
<parm name="TO-NAPID" value="Trusted_NAPID"/>
       name="TO-           value="Trusted_NAPID"/>
<parm name="PUSHENABLED" value="1"/>
<parm name="PULLENABLED" value="1"/>
</characteristic>
</characteristic>
<characteristic type="NAPDEF">
<parm name="NAME" value="Op"/>
<parm name="NAPID" value="Trusted_NAPID"/>
                       value="Trusted_NAPID"/>
<parm name="BEARER" value="GSM-SMS"/>
                          value="GSM-
<parm name="NAME" value="Trusted Proxy"/>
<parm name="NAP-ADDRESS" value=" 40711111111 "/>
       name="NAP-
<parm name="NAP-ADDRTYPE" value="E164"/>
       name="NAP-
</characteristic>
WAP - provisioning
<wap-provisioningdoc>
 <characteristic type="NetworkPolicy">
  <characteristic type="WiFi">
   <characteristic type="Settings">
     <parm name="Disabled" value="1"/>
   </characteristic>
  </characteristic>
 </characteristic>
</wap-provisioningdoc>
Interceptare trafic
Traficul trece prin proxy-ul nostru
Varianta 1 – Burp Proxy
Interceptare trafic
Traficul trece prin proxy-ul nostru
Varianta 2 – sslstrip
http://www.thoughtcrime.org/software/sslstrip/
Interceptare trafic
DEMO
Protectie
Operatorul poate filtra aceste tipuri de
mesaje
Producatorii de telefoane trebuie sa se
concentreze mai mult pe securitate
Verificati constant (la fel cum faceti cu
factura / creditul disponibil) setarile de
Internet
Intrebari?

Más contenido relacionado

Similar a Securitatea mobila - Atacuri prin SMS

Microservice Come in Systems
Microservice Come in SystemsMicroservice Come in Systems
Microservice Come in SystemsMarkus Eisele
 
Interoperable Web Services with JAX-WS and WSIT
Interoperable Web Services with JAX-WS and WSITInteroperable Web Services with JAX-WS and WSIT
Interoperable Web Services with JAX-WS and WSITCarol McDonald
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocolgit tech
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining Tail-f Systems
 
How lagom helps to build real world microservice systems
How lagom helps to build real world microservice systemsHow lagom helps to build real world microservice systems
How lagom helps to build real world microservice systemsMarkus Eisele
 
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...OpenCredo
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml scriptishmecse13
 
Camara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdfCamara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdfDimitrisLogothetis10
 
Wireless iSeries Performance Monitoring
Wireless iSeries Performance MonitoringWireless iSeries Performance Monitoring
Wireless iSeries Performance Monitoringmboadway
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
SOA with C, C++, PHP and more
SOA with C, C++, PHP and moreSOA with C, C++, PHP and more
SOA with C, C++, PHP and moreWSO2
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Balázs Antók
 
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...WSO2
 
Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch PresentationRam Dutt Shukla
 
dist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfdist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfNohaNagy5
 
introduction to Windows Comunication Foundation
introduction to Windows Comunication Foundationintroduction to Windows Comunication Foundation
introduction to Windows Comunication Foundationredaxe12
 

Similar a Securitatea mobila - Atacuri prin SMS (20)

Microservice Come in Systems
Microservice Come in SystemsMicroservice Come in Systems
Microservice Come in Systems
 
Interoperable Web Services with JAX-WS and WSIT
Interoperable Web Services with JAX-WS and WSITInteroperable Web Services with JAX-WS and WSIT
Interoperable Web Services with JAX-WS and WSIT
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocol
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining
 
How lagom helps to build real world microservice systems
How lagom helps to build real world microservice systemsHow lagom helps to build real world microservice systems
How lagom helps to build real world microservice systems
 
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
Microservices Manchester: How Lagom Helps to Build Real World Microservice Sy...
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml script
 
Camara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdfCamara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdf
 
Wireless iSeries Performance Monitoring
Wireless iSeries Performance MonitoringWireless iSeries Performance Monitoring
Wireless iSeries Performance Monitoring
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
SOA with C, C++, PHP and more
SOA with C, C++, PHP and moreSOA with C, C++, PHP and more
SOA with C, C++, PHP and more
 
Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702Sns en-sn160 w-datasheet-201702
Sns en-sn160 w-datasheet-201702
 
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
[WSO2 Integration Summit Nairobi 2019] Ballerina - Cloud Native Programming L...
 
Wap Security Arch Presentation
Wap Security Arch PresentationWap Security Arch Presentation
Wap Security Arch Presentation
 
WAP
WAPWAP
WAP
 
dist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdfdist-access. access control in distributed systemspdf
dist-access. access control in distributed systemspdf
 
introduction to Windows Comunication Foundation
introduction to Windows Comunication Foundationintroduction to Windows Comunication Foundation
introduction to Windows Comunication Foundation
 
Web Services
Web ServicesWeb Services
Web Services
 
Web Services
Web ServicesWeb Services
Web Services
 

Más de DefCamp

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDefCamp
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)DefCamp
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFADefCamp
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationDefCamp
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money downDefCamp
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...DefCamp
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochDefCamp
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareDefCamp
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?DefCamp
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured DefCamp
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.DefCamp
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber SecurityDefCamp
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering holeDefCamp
 

Más de DefCamp (20)

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Securitatea mobila - Atacuri prin SMS

  • 1. Securitate mobila – Atacuri prin SMS Prezentator: Bogdan ALECU http://m-sec.net Twitter: @msecnet
  • 2. Informatii generale despre SMS Amenintari WAP Interceptare trafic de date Demo
  • 3. Informatii generale SMS - Short Message Service reprezinta un mod de comunicare prin mesaje text intre telefoanele mobile / fixe, utilizand un protocol standardizat. Este un mod de comunicare eficace; utilizatorul scrie un text, apasa SEND si mesajul e livrat aproape instant catre destinatar. Folosit pentru mai multe scopuri: MMS – Multimedia Messaging Service, OTA – Over The Air – configurarea telefonului, notificari pentru mesageria vocala, email, fax, microplati – plata unor sume mici pentru diferite servicii => SECURITATE!
  • 4. Informatii generale “Un dispozitiv mobil activ trebuie sa fie capabil de a primi un mesaj scurt de tipul TPDU - Transfer protocol data unit - (SMS-DELIVER) in orice moment, indiferent daca exista un apel sau trafic de date in derulare. Un raport va fi trimis intotdeauna catre SC (Serviciul de mesaje); confirmand fie ca tel a primit mesajul sau ca mesajul nu a fost livrat, incluzind si motivul refuzului.” ETSI TS 100 901 V7.5.0 (2001-12), pag 13
  • 5. Amenintari - SMS SMS SPAM SMS spoofing Notificari SMS Alte tipuri
  • 6. Amenintari - SMS SMS SPAM Companiile ofera servicii de publicitate prin SMS Mesaje cu castiguri false Inginerie sociala – “Suna-ma urgent pe nr asta: 0900323421! Mama”
  • 7. Amenintari - SMS SMS Spoofing Servicii online ce permit modificarea expeditorului (numeric / alfanumeric) Greu de oprit, mai ales daca tinem cont de roaming Eficienta mai mare in atacurile de tip inginerie sociala
  • 8. Amenintari - SMS Notificari SMS Voicemail Fax E-mail Video Utilizatorul nu poate scoate icon-ul de notificare asupra primirii unui astfel de mesaj
  • 9. Amenintari - SMS Notificari SMS (voicemail)
  • 11. Amenintari - SMS Alte tipuri Flash SMS (Class 0) – utilizatorul vede mesajul direct, fara a intra in Inbox Silent SMS – DCS 0xC0 = Message Waiting Indication Group: Discard Message
  • 12. Amenintari - SMS Alte tipuri Flash SMS
  • 13. Amenintari - SMS Alte tipuri Silent SMS
  • 14. WAP Wireless Application Protocol Arhitectura de retea specifica Set de reguli Limbaj specific: Wireless Markup Language (WML) Pagini HTML ajustate pentru dimensiunea ecranului telefonului
  • 15. WAP
  • 16. WAP Push Permite trimiterea de continut WAP cu o interventie minima din partea utilizatorului 2 tipuri: Service Indication / Service Load
  • 17. WAP Push Service Indication (SI) permite trimiterea de notificari utilizatorului intr-un mod asincron
  • 19. WAP Push Service Load (SL) determina “aplicatia” de pe telefon sa incarce si execute un serviciu
  • 21. WAP Push - securitate Teoria: Doar un anumit numar este autorizat pentru trimitere; Practica: daca nu e configurat bine, un telefon accepta de la orice numar astfel de mesaje Pe Windows Mobile trebuiesc verificate setarile din HKLMSecurityPoliciesPolicies ; SL Message Policy ; (default: SECROLE_PPG_TRUSTED) [HKEY_LOCAL_MACHINESecurityPoliciesPolicies] "0000100c"=dword:800 ; SI Message Policy ; (default: SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED) [HKEY_LOCAL_MACHINESecurityPoliciesPolicies] "0000100d"=dword:c00
  • 22. WAP Push - securitate SECROLE_PPG_TRUSTED: Trusted Push Proxy Gateway. Messages assigned this role indicate that the content sent by the Push Initiator is trusted by the Push Proxy Gateway. This role implies that the device trusts the Push Proxy Gateway (SECROLE_TRUSTED_PPG). SECROLE_PPG_AUTH: Push Initiator Authenticated. Messages assigned this role indicate that the Push Initiator is authenticated by the Push Proxy Gateway. This role implies that the device trusts the Push Proxy Gateway (SECROLE_TRUSTED_PPG).
  • 23. WAP Push - securitate
  • 24. WAP Configurarea telefonului pentru acces la Internet / date poate fi facuta manual Pentru o configurare mai usoara, rapida si pentru eventualele schimbari, a fost creat un standard ce permite configurarea de la distanta Programarea Over The Air (OTA) foloseste standardul OMA – Open Mobile Alliance Programarea se face prin SMS-uri special concepute
  • 25. WAP - provisioning Foloseste protocolul WAP WBXML (WAP Binary XML) prin Wireless Application Environment Wireless Session Protocol Wireless Datagram Protocol SMS
  • 26. WAP - provisioning Configurarea se scrie in XML (conform specificatiilor de la http://www.openmobilealliance.org) XML-ul se va codifica in WAP Binary XML WBXML se va encapsula intr-o data de tip Wireless Session Protocol Datele se vor codifica intr-un mesaj Push, definit in Wireless Session Protocol
  • 27. WAP - provisioning Mesajul Push contine diferiti parametri, unul fiind parametrul “SEC” pentru autentificare pe baza de “cheie” comuna USERPIN: string ASCII codificat in zecimale NETWPIN: cheia este specifica retelei si cunoscuta (teoretic) doar de catre operator USERNETWPIN: combinatie a celor 2
  • 28. WAP - provisioning NETWPIN: IMSI = MCC+MNC+MSIN (Mobile Subscription Identification Number) Pret: 2-5 euro-centi In general limitat pentru companii, se cere un volum mare de interogari
  • 29. WAP - provisioning <wap-provisioningdoc> <characteristic type="NAPDEF"> <parm name="NAME" value="NewAPN"/> <parm name="NAPID" value="NewAPN_NAPID_ME"/> <parm name="BEARER" value="GSM-GPRS"/> <parm name="NAP-ADDRESS" value="apn.operator.ro"/> <parm name="NAP-ADDRTYPE" value="APN"/> </characteristic> <characteristic type=“APPLICATION"> <parm name="NAME" value="NewAPN"/> <parm name="APPID" value="w2"/> <parm name="TO-NAPID" value="NewAPN_NAPID_ME"/> </characteristic> <wap-provisioningdoc>
  • 30. WAP - provisioning <wap-provisioningdoc> - contine toata informatia transmisa <characteristic …> - grupeaza informatia in unitati logice <… value="NAPDEF"/> - configuram un nou network access point <parm name="APPID" value="w2"/> - mapeaza configuratia la activitatile de browsing Informatii la http://www.openmobilealliance.org
  • 31. WAP - provisioning <wap-provisioningdoc> <characteristic type="BOOTSTRAP"> <parm name="NAME" value=“Operator NET"/> <parm name="PROXY-ID" value="OpNET_Proxy"/> </characteristic> <characteristic type="NAPDEF"> <parm name="NAME" value="OpNET"/> <parm name="NAPID" value="OpNET_NAPID"/> <parm name="BEARER" value="GSM-GPRS"/> <parm name="NAP-ADDRESS" value="net"/> <parm name="NAP-ADDRTYPE" value="APN"/> </characteristic>
  • 32. WAP - provisioning <characteristic type="PXLOGICAL"> <parm name="NAME" value="OpNET"/> <parm name="PROXY-ID" value="OpNET_Proxy"/> <characteristic type="PXPHYSICAL"> <parm name="PHYSICAL-PROXY-ID" value="OpNET_PhProxy"/> <parm name="PXADDR" value=“192.168.1.1"/> <parm name="PXADDRTYPE" value="IPV4"/> <parm name="TO-NAPID" value="OpNET_NAPID"/> <characteristic type="PORT"> <parm name="PORTNBR" value="8080"/> </characteristic> </characteristic> </characteristic>
  • 33. WAP - provisioning <characteristic type="APPLICATION"> <parm name="APPID" value="w2"/> <parm name="NAME" value="OpNET"/> <parm name="TO-PROXY" value="OpNET_Proxy"/> <characteristic type="RESOURCE"> <parm name="NAME" value="OpNET"/> <parm name="URI" value="http://www.google.com"/> <parm name="STARTPAGE"/> </characteristic> </characteristic> </wap-provisioningdoc>
  • 34. WAP - provisioning Teoretic aceasta configurare poate fi facuta doar de catre operator, de la un numar predefinit Putem analiza SMS-ul prin WireShark Putem adauga un alt numar
  • 35. WAP - provisioning <?xml version="1.0"?> <!DOCTYPE wap-provisioningdoc PUBLIC "-//WAPFORUM//DTD PROV 1.0//EN" wap- "- "http://www.wapforum.org/DTD/prov.dtd"> "http://www.wapforum.org/DTD/prov.dtd"> <wap-provisioningdoc version="1.1"> wap- <characteristic type="BOOTSTRAP"> <parm name="NAME" value=“Nume"/> value=“ Nume"/> </characteristic> <characteristic type="PXLOGICAL"> <parm name="NAME" value=“Nume"/> value=“ Nume"/> <parm name="PROXY-ID" value="Trusted_Proxy"/> name="PROXY- value="Trusted_Proxy"/> <parm name="NAME" value="Trusted Proxy"/> <characteristic type="PXPHYSICAL"> <parm name="PHYSICAL-PROXY-ID" value="Trusted_PhProxy"/> name="PHYSICAL- PROXY- value="Trusted_PhProxy"/> <parm name="PXADDR" value="40711111111"/> <parm name="PXADDRTYPE" value="E164"/> <parm name="TO-NAPID" value="Trusted_NAPID"/> name="TO- value="Trusted_NAPID"/> <parm name="PUSHENABLED" value="1"/> <parm name="PULLENABLED" value="1"/> </characteristic> </characteristic> <characteristic type="NAPDEF"> <parm name="NAME" value="Op"/> <parm name="NAPID" value="Trusted_NAPID"/> value="Trusted_NAPID"/> <parm name="BEARER" value="GSM-SMS"/> value="GSM- <parm name="NAME" value="Trusted Proxy"/> <parm name="NAP-ADDRESS" value=" 40711111111 "/> name="NAP- <parm name="NAP-ADDRTYPE" value="E164"/> name="NAP- </characteristic>
  • 36. WAP - provisioning <wap-provisioningdoc> <characteristic type="NetworkPolicy"> <characteristic type="WiFi"> <characteristic type="Settings"> <parm name="Disabled" value="1"/> </characteristic> </characteristic> </characteristic> </wap-provisioningdoc>
  • 37. Interceptare trafic Traficul trece prin proxy-ul nostru Varianta 1 – Burp Proxy
  • 38. Interceptare trafic Traficul trece prin proxy-ul nostru Varianta 2 – sslstrip http://www.thoughtcrime.org/software/sslstrip/
  • 40. Protectie Operatorul poate filtra aceste tipuri de mesaje Producatorii de telefoane trebuie sa se concentreze mai mult pe securitate Verificati constant (la fel cum faceti cu factura / creditul disponibil) setarile de Internet