Scary stuff from 31C3 #3: Mapping vulnerability of the - TopicsExpress



          

Scary stuff from 31C3 #3: Mapping vulnerability of the international mobile roaming infrastructure [31c3] by Laurent Ghigonis and Alexandre De Oliveira https://youtube/watch?v=SfPC9IHCW-U SS7 has been shown repeatedly as an insecure protocol: spoofing, faking, crash through fuzzing, fraud. The main question of our study is to determine how this insecurity is mitigated by network operator’s action to prevent compromise on both network exposure of infrastructure and privacy compromise of subscribers. The goal of SS7map is to provide a global overview by building the first SS7 signaling network world map revealing how vulnerable and exposed are telecom operators and their subscribers. We explain how it is possible for each mapped network to abuse legitimate signalling messages and call flows to discover and fingerprint equipment, intercept SMS messages, and perform massive location tracking of subscribers. More than pure analysis of vulnerability, this map rates and ranks the vulnerability of countries and operators showing discrepancies in the level and type of protection: SCCP screening, SS7 policing, MAP filtering, rate limiting, Network Element security configurations. We then conclude on the direction of signaling security and its current trend and development in the LTE world that shares many similar design insecurities with SS7.
Posted on: Mon, 29 Dec 2014 14:09:03 +0000

Trending Topics



Recently Viewed Topics




© 2015