Security & Vulnerability Analysis of Wireless Messaging Protocols 2004
Security & Vulnerability Analysis of Wireless Messaging Protocols 2004
Abstract
Wireless messaging is now a dynamic ingredient in the communication modes of our life.
Many applications over the Internet now use wireless messages to contact with the end-
user. This paper describes the messaging infrastructure and the related protocols used
in this scenario. It also presents many ways you can use the wireless networks to talk
with your applications. There is also a growing concern over how much these services
are secure and how they can be compromised, which are described briefly in this
presentation.
• Mobile Station
• BTS
• BSC
• MSC
• The Registers (HLR, VLR, AUC, EIR)
• STP
• SMSC
Mobile Station
This is the equipment from where the user initiates the wireless services. It can be a
mobile phone or a hardware component such as GSM modem. Nowadays, many
modern types of equipment can do the task to talk with the GSM network, ranging from
smart phones and paging devices to PDAs and communicators. All of them resemble in
the air interface and the way they receive the data from wireless network, but their
features can be a lot more different.
The Registers
Home Location Register (HLR)
Home Location Register (HLR) is a database used for the storage and management of
subscriptions. It contains permanent data about a subscriber and its profile, pointer to
current Visitor Location Register (VLR), other information and activity status like whether
the mobile is switched on or not. The data needed by MSC is provided by HLR includes
International Mobile Station Identification (IMSI), Mobile Station ISDN (MSISDN) and
current VLR address.
1 message received
Take a brief look of what we have been studying in this section. Suppose a message
from mobile station is written and destined to be sent to another mobile station that is
turned off at the moment. The message will be received from mobile equipment by BTS
and passed to BSC, MSC and the core network, until it finally reaches to SMSC. At this
moment, an acknowledgement is sent to the sender mobile equipment and ‘Message
Sent’ will be displayed over the screen of the sender. Now the message is stored in the
SMSC, it requests HLR to provide the information about the recipient status.
Unfortunately HLR responds that the recipient’s mobile phone is switched off and tells
the SMSC to wait. When the mobile phone is turned on, the HLR will notify the SMSC
and provides the correct MSC address to route the address. SMSC then delivers the
message to MSC and MSC will send the message to indicated BSC by checking out the
location of mobile equipment through local VLR. BTS will receive message from BSC
and finally delivers the message to recipient’s mobile phone.
Section 3. Wireless messaging protocols
The general format of an SMPP PDU consists of a PDU header followed by a PDU body
as outlined in the following table:
SMPP PDU
PDU HEADER (MANDATORY) PDU BODY (OPTIONAL)
COMMAND COMMAND COMMAND SEQUENCE PDU BODY
LENGTH ID STATUS NUMBER
4 OCTETS LENGTH = (COMMAND LENGTH VALUE - 4) OCTETS
PDU Header
The SMPP Header is a mandatory part of every SMPP PDU and must always be
present.
PDU Body
The SMPP PDU Body is optional and may not be included with every SMPP PDU.
Command Length
Defines the total octet length of the SMPP PDU packet, including the length field. The
Command Length field is 4 octets long.
Command ID
Identifies the particular SMPP PDU, e.g., submit_sm, query_sm, etc. The Command ID
field is 4 octets long.
Command Status
Indicates the success or failure of an SMPP request. It is relevant only in the SMPP
response PDU and it must contain a NULL value in an SMPP request PDU. The
Command Status field is 4 octets long.
Sequence Number
Contains a sequence number that allows SMPP requests and responses to be
associated for correlation purposes. The use of sequence numbers for message
correlation allows SMPP PDUs to be exchanged asynchronously. The Sequence
Number field is 4 octets long.
Mandatory Parameters
Following the header is a set of mandatory parameters, corresponding to the SMPP
PDU defined in the Command ID field.
Optional Parameters
Optional parameters corresponding to the SMPP PDU defined in the Command ID field,
and included as required.
Length
Indicates the length (in octets) of the Value field. The Length field is 2 octets long.
BIND TRANSMITTER 1
ESME SMSC
RESPONSE 1
DELIVER MSG 2
RESPONSE 2
SUBMIT MSG 3
RESPONSE 3
UNBIND 4
RESPONSE 4
The ESME first initiates a connection with SMSC in ‘transmitter’ mode (BIND
TRANSMITTER 1). If the credentials submitted are valid, the SMSC will acknowledge
the connection (RESPONSE 1). If the SMSC is free to serve the ESME, it generates the
request to handover the message (DELIVER MSG 2). Upon receiving this signal, the
ESME will acknowledge it (RESPONSE 2) and transfers the message along with
recipient’s necessary information (SUBMIT MSG 3). If the data transfer is successful, the
SMSC will generate an acknowledgement to it (RESPONSE 3). If the ESME does not
wish to send another message, it generates unbind request (UNBIND 4), which is
granted by SMSC (RESPONSE 4), and the connection is closed.
Section 5. Current wireless messaging applications
Success stories
In general, wireless messaging applications can be categorized into three kinds of
services; Information Services, Location-Based Services (LBS), Communication and
Entertainment Services. These cover the major market share in real world today. Some
of the most successful messaging services are described below:
• SMSC-Kernel.
• Connection between ESME and SMSC.
• Air interface of GSM.
• Network Equipments of GSM.
• Operating System of mobile phone.
Each category posses its own risk level and payload of the attack can devastate the
whole of network. Until now, no such severe attacks were launched on the wireless
messaging systems, but it is only a matter of time. Below is the discussion of most likely
attacks that will occur in the future of wireless messaging systems.
Snooping
Snooping or Sniffing, it can capture packets from the network through any kind of sniffer.
The captured packets are decoded and they can give most valuable information. Many
advanced sinffers like Ethereal, can capture SMPP packets along with the capability of
tracing the handshakes during the whole session. This can give the idea what is going
on between the ESME and the SMSC.
Spoofing
SMS packets can be created and injected in the network by using any ordinary packet
creation utility, like Nessus that creates packets for TCP/IP network. Spoofing
obfuscates the identity of the sender, and pretends that the message was originated
form some other source. Just like there is no check in the current SMTP messages, a
hacker can create a malicious control message under the disguise of trusted user and
can compromise the network.
Radio Frequency Jamming
It is truly a non-Internet based attack that is related to the wireless interface of the
communication system. Its sole purpose is to deny the service from being used by the
subscribers in a particular area. The jamming equipment can be a noise-generating
source that emits arbitrary signals in the frequency spectrum of GSM (normally 900 and
1800 MHz). It not only disrupts the SMS messages but voice calls can also be affected.
OSS Penetration
The most important part of a GSM network is actually not the Network Equipments
themselves but the Operation and Support System (OSS) itself. It is a network of
devices that manage important functions like billing system environment and those
functions are very critical to the security of the GSM. Most interesting part of OSS is that
this infrastructure is accessible via IP, so all the vulnerabilities in the network are
inherited directly into OSS.
SMS Spam
Unwanted emails are havoc to any online organization. Similarly unsolicited electronic
messages become a nuisance for users of wireless devices. If a wireless provider gets a
block of several thousand subscribers, it can send bulk messages of all the recipients,
causing unnecessary traffic load and disturbance to the recipients. Legal steps have
been taken by some governments for spam protection over wireless, and investment has
been done to develop anti-spam systems.
Mobile Virus
It is actually a bug in the mobile equipment software that can allow unauthorized access
to programs or execution of instructions. Most SMS viruses ever noted can cause
shutdown and crash of system software. Examples of other viruses are:
Palm.Phage.A:
A Malware affecting PalmOS can range from traditional viruses that infect executables to
malicious code embedded in shared executables. Successful exploitations can range
from device lockup to a low-level device wipe.
Cabir:
This worm spreads through a Bluetooth vector on supported platforms, and displays a
warning about the unsigned code upon execution.
Dust:
This Malware demonstrates the potential for keystroke logging, remote device control,
process hiding, and covert File Transport Protocol (FTP) server deployment in Windows
CE Operating System.
Brador Trojan:
During the first week of August 2004, the first known Pocket PC virus/trojan utilizing
some of the characteristics described in Dust was found in the wild. Two independent
antivirus companies detected and analyzed samples of a backdoor process that can give
an attacker complete control over a Pocket PC mobile device.
SMS Crash
Many text patterns are discovered that can be used to crash the recipient mobile
equipment. The flaw lies not in the SMS packet format, but the operating system of the
recipient mobile phone. News from BBC reported several hundreds of specific model
equipment of a mobile phone crashed in Scandinavia upon receiving a unique pattern of
SMS text message.
Section 8. Securing the message
Proprietary Encryption
Proprietary encryption should be applied for intra-network communication and among
network equipment. This kind of state of the art cryptographic technique is also
necessary to keep the data transfer secure to and from ESME and SMSC.
Firewalls
SMSC and OSS should be behind well-configured firewalls and their network structure
must be kept hidden from public network as far as it is possible. Modern IDS must be
coupled with the network component to keep them safe from DOS Attacks and Network
Scanning.
[9] Toni Janveski. Traffic Analysis and Design of Wireless IP Networks. Artech House