Mobile Self - Defense: Karsten Nohl
Mobile Self - Defense: Karsten Nohl
self-‐defense
§ 3G security
2
SS7
network
enables
exchange
of
SMS
and
cryptographic
keys
MSC
Please
send
new
Roaming
encrypFon
key
user
3
A
Tracking
over
SS7
has
become
commonplace
AnytimeInterrogation
4
A
Tracking
can
happen
using
many
more
signaling
messages
§ AnytimeInterrogation
§ AnytimeModification
5
SS7
enables
mobile
abuse
on
five
fronFers
Focus
of
this
presentaFon
A0acker objecAve
6
1
2G
+
3G
transacFons
can
be
decrypted
with
help
of
SS7
MSC MSC
I
II
Intercept
radio
Ask
for
current
transmission
decrypFon
key
7
2
SS7
enables
3G
IMSI
Catcher
8
3
RerouFng
agacks
over
SS7
allow
for
remote
intercept
9
B
Not
all
SS7
agacks
can
simply
be
blocked
10
SS7
Phone
SRI-‐SM
MSC,
PSI
LocaFon Key
queries
number
IMSI
SI
PSI
(Cell
ID)
Radio
Decoded
TMSI
Record
SMS/call
capture
3G
traffic
11
Agenda
§ 3G security
12
Remember?
IntercepFng
GSM
A5/1
calls
and
SMS
is
cheap
+
13
IntercepFng
3G
is
also
surprisingly
cheap,
thanks
to
SS7
+
14
Some
networks
are
so
poorly
configured
that
SS7
is
not
even
needed
to
intercept
their
3G
transacFons
AuthenAcates
Protects
Network
Encrypts
calls
/
SMS
integrity
-‐ ✗ ✗ ✔
-‐ ✗ ✗ ✔
-‐ ✗ ✗ ✔
-‐ ✗ ✗ ✔
-‐ ✗ ✗ ✔
15
ProtecFon
status
of
3G
networks
is
tracked
in
online
tool
IniAal
3G
metric:
TMSI
update
German
networks
encrypt
3G,
[10%]
but
do
not
all
change
TMSIs
+
3G
encryp-‐
Fon
[90%]
16
Networks
without
USIMs
are
vulnerable
to
brute-‐force
agacks
NSA
apparently
broke
64-‐bit
A5/3
NSA–vulnerable
EncrypAon
SIM
USIM
Not
brute-‐forceable
17
Source
–
The
intercept:
wolframite-‐encrypFon-‐agack.pdf
Agenda
§ 3G security
18
Many
mobile
network
abuse
scenarios
can
be
detected
A0ack
scenario
DetecAon
heurisAc
19
New
tool
detects
common
abuse
scenarios
Tool
SnoopSnitch
name
20
IMSI
catcher
detecFon
analyzes
a
cell’s
configuraFon
and
behavior
21
SnoopSnitch
collects
data
in
the
background
and
on
request
Directed
agacks
are
constantly
analyzed
in
a
background
process
Network
tests
are
uploaded
only
on
demand
Alerts
can
be
shared
for
further
analysis
22
It’s
now
on
you
to
contribute
data
and
progress
the
toolbox
of
self-‐defense
apps
Mobile
self-‐defense
strategy
23
Thank
you!
QuesFons?
24