140 likes | 224 Views
Chapter 17. Telecom abuses. Attacks on Metering. 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from Coin entry signaled by pulses Clip on fraud Stealing cordless phone signal Social engineering Premium phone rate scam.
E N D
Chapter 17 Telecom abuses
Attacks on Metering • 50’s operator listened for coins to hit metal plate • Operator had to ask for number you were calling from • Coin entry signaled by pulses • Clip on fraud • Stealing cordless phone signal • Social engineering • Premium phone rate scam
Attacks on signaling • Phone Phreaking • Computer attacks • Social Engineering • Insecure end systems • Message on answering machine including tones • Computer viruses • PBX • Caller ID spoofing • VoIP LINUX based Asterick (see Lucky225)
Feature Interaction • Page 351, insert message into Spanish message. • Call back from pay phone get’s charged back to pay phone owner • Call forward someone you don’t like to expensive line • Conference calls to violate parole checks
Mobile phones • Mobile Phone Cloning • Tumblers • Demand for serials numbers created own attacks • Protection • RF finger printing • Call patterns
Digital Technology • GSM system Architecture • Used most everywhere other than US, Canada, Japan and Israel • Phones are commodity items, smart cards “bind” to specifics • CDMA (leader), TDMA, PCS, iDEN in US • http://kropla.com/mobilephones.htm • GSM growing • 3g next generation • UMTS voice
Today’s issues • Viruses • PhoneCams • Privacy • Cheating
Corporate Fraud • Cramming • Slamming • Premium rate numbers as international calls
Articles • Phone Phreaking counter culture • Caller ID spoofing Asterisk • GSM A5/2 weakening
Past Articles • here is some information on A5/1 and A5/2 GSM encryption • http://en.wikipedia.org/wiki/A5/1 • Caller id spoofing hack: • http://www.nata2.org/2006/02/14/caller-id-spoofing-with-php-and-asterisk/ • Caller id spoofing through the web: • http://www.theregister.co.uk/2004/07/07/hackers_gut_voip/
Past Articles • Wireless attacks • http://www.windowsecurity.com/articles/Wireless_Attacks_Primer.html • Active cookies protection • http://www.scmagazine.com/uk/news/article/544464/researcher-develops-active-cookies-bite-cyber-crooks/ • Homeland Security Secure PC • http://baltimore.bizjournals.com/baltimore/stories/2006/03/06/daily25.html?t=printable • Data Gathering • http://www.foxnews.com/story/0,2933,186756,00.html
List of Resources • Phone Phreaking: • http://en.wikipedia.org/wiki/Phreaking • http://www.wired.com/news/business/0,1367,36309,00.html • Caller ID spoofing • http://www.securityfocus.com/news/9822 • http://www.schneier.com/blog/archives/2006/03/caller_id_spoof.html • http://www.usatoday.com/money/industries/telecom/2004-09-01-spoof_x.htm • http://www.spooftel.com/index.htm
List of resources • Using Asterick • http://www.rootsecure.net/?p=reports/callerid_spoofing • http://www.asterisk.org/ • Mobile Phone cloning • http://www.tech-faq.com/cell-phone-cloning.shtml • http://infotech.indiatimes.com/articleshow/1113824.cms • http://www.technicalinfo.net/opinions/opinion003.html
List of resources • GSM cloning • http://www.securityfocus.com/news/399 • http://www.isaac.cs.berkeley.edu/isaac/gsm.html • Phone virus • http://news.com.com/Cabir%20mobile%20virus%20found%20in%20U.S./2100-7349_3-5582302.html • http://www.f-secure.com/v-descs/blankfont_a.shtml