GPRS/EDGE/UMTS/HSPA mobile data communications David Perez Jose - - PowerPoint PPT Presentation

gprs edge umts hspa
SMART_READER_LITE
LIVE PREVIEW

GPRS/EDGE/UMTS/HSPA mobile data communications David Perez Jose - - PowerPoint PPT Presentation

www.taddong.com A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications David Perez Jose Pico Introduction It has been proved that GSM is vulnerable to multiple attacks (rogue base station, cryptographic, SMS, OTA,


slide-1
SLIDE 1

www.taddong.com

A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications

David Perez Jose Pico

slide-2
SLIDE 2

Introduction

  • It has been proved that GSM is vulnerable

to multiple attacks (rogue base station, cryptographic, SMS, OTA, etc.)

  • Rogue Base Station attacks have been

demonstrated before against GSM, e.g.:

– PRACTICAL CELLPHONE SPYING. Chris

  • Paget. DEF CON 18 (July 2010)

http://www.defcon.org/html/defcon-18/dc-18- speakers.html

slide-3
SLIDE 3

Introduction

  • Is it possible to extend these attacks to

GPRS/EDGE, i.e., to mobile data transmissions?

  • If YES, what is the impact of such attack?
slide-4
SLIDE 4

Introduction

  • In this presentations we will show that

GPRS/EDGE is also vulnerable to rogue base station attacks, just like GSM

  • We will describe:

– The vulnerabilities that make this attack possible – The tools that can be used to perform the attack – How to perform the attack – How to extend this attack to UMTS – What an attacker can gain from it

Objectives

slide-5
SLIDE 5

GPRS/EDGE ARQUITECTURE

slide-6
SLIDE 6

The vulnerabilities

  • Lack of mutual authentication
  • GEA0 support
  • UMTSGPRS/EDGE fallback

Just like GSM

slide-7
SLIDE 7

The threats

  • How many people, organizations, or, in

general, entities, might be interested in eavesdropping and/or manipulating the mobile data communications of other entities, like competitors, nation enemies, etc?

  • And how many of those potential attacking

entities could dedicate a budget of $10,000 to this purpose?

slide-8
SLIDE 8

The tools

slide-9
SLIDE 9

The tools

We run all our tests inside a faraday cage, to avoid emissions into the public air interface (Um)

A real attacker won’t need this, but...

slide-10
SLIDE 10

The tools

  • Commercial BTS
  • GSM/GPRS/EDGE capable
  • Manufactured by ip.acccess

(www.ipaccess.com)

  • IP-over-Ethernet Abis

interface

ip.access nanoBTS

slide-11
SLIDE 11

The tools

  • GNU/Linux OS
  • Uplink to the Internet
  • Small netbook is enough

PC

slide-12
SLIDE 12

The tools

  • Awesome work from Harald Welte, Dieter

Spaar, Andreas Evesberg and Holger Freyther

  • http://openbsc.osmocom.org/trac/

OpenBSC

“[OpenBSC] is a project aiming to create a Free Software, GPL-licensed Abis (plus BSC/MSC/HLR) implementation for experimentation and research purpose. What this means: OpenBSC is a GSM network in a box software, implementing the minimal necessary parts to build a small, self-contained GSM network.”

slide-13
SLIDE 13

The tools

  • Included in OpenBSC
  • http://openbsc.osmocom.org/trac/wiki/osmo-sgsn

OsmoSGSN

“OsmoSGSN (also spelled osmo-sgsn when referring to the program name) is a Free Software implementation of the GPRS Serving GPRS Support Node (SGSN). As such it implements the GPRS Mobility Management (GMM) and SM (Session Management). The SGSN connects via the Gb-Interface to the BSS (e.g. the ip.access nanoBTS), and it connects via the GTP protocol to a Gateway GPRS Support Node (GGSN) like OpenGGSN”

slide-14
SLIDE 14

The tools

  • Started by: Jens Jakobsen
  • Currently maintained by: Harald Welte
  • http://sourceforge.net/projects/ggsn/

OpenGGSN

“OpenGGSN is a Gateway GPRS Support Node (GGSN). It is used by mobile operators as the interface between the Internet and the rest of the mobile network infrastructure.”

slide-15
SLIDE 15

The tools

  • Capable of jamming the frequency

bands assigned to UMTS/HSPA in a particular location, while leaving the GSM/GPRS/EDGE bands undisturbed Cell-phone jammer

“A mobile phone jammer is an instrument used to prevent cellular phones from from receiving signals from base stations. When used, the jammer effectively disables cellular phones.” [Source: Wikipedia]

Please note: even owning a jammer is illegal in some countries

slide-16
SLIDE 16

The attack: initial setup

slide-17
SLIDE 17

The attack: step 1

1 Cell characterization

slide-18
SLIDE 18

The attack: step 2

2 Attacker starts emitting

slide-19
SLIDE 19

The attack: step 3

3 Victim camps to rogue cell

slide-20
SLIDE 20

The attack: step 4

Attacker gets full MitM control of victim’s data communications 4

slide-21
SLIDE 21

The attack in action

iPhone falls in the rogue base station trap

slide-22
SLIDE 22

What happened?

slide-23
SLIDE 23

Extending the attack to UMTS

How can we extend this attack to UMTS devices?

slide-24
SLIDE 24

Extending the attack to UMTS: Simply add step 0

Jam UMTS band

slide-25
SLIDE 25

The impact

Let us see what an attacker could gain from the attack...

slide-26
SLIDE 26

Leveraging the attack: example 1

Attacker sniffs a google search from an iPhone

slide-27
SLIDE 27

What happened?

slide-28
SLIDE 28

Leveraging the attack: example 2

Phising attack against an iPad (http version)

slide-29
SLIDE 29

What happened?

slide-30
SLIDE 30

Leveraging the attack: example 3

Phising attack against an iPad (https version)

slide-31
SLIDE 31

What happened?

slide-32
SLIDE 32

Leveraging the attack: example 4

Attacker takes over a Windows PC via GPRS/EDGE

slide-33
SLIDE 33

What happened?

remote desktop user / password

slide-34
SLIDE 34

Leveraging the attack: example 5

Attacking a 3G Router in order to control the IP traffic of all devices behind it

slide-35
SLIDE 35

What happened?

slide-36
SLIDE 36

Leveraging the attack: example 6

Attacking other GPRS/EDGE devices

slide-37
SLIDE 37

What happened?

FTP

slide-38
SLIDE 38

Defending ourselves

So, what can we do to protect our mobile data communications?

slide-39
SLIDE 39

Countermeasures

  • Configure our mobile devices to only

accept 3G service, rejecting GPRS/EDGE

  • Encrypt our data communications at

higher layers (https, ssh, IPsec, etc.)

  • Install and configure firewall software in
  • ur mobile devices
slide-40
SLIDE 40

Summing up (I)

A rogue base station attack against GPRS/EDGE devices is totally feasible, just as it is against GSM devices

slide-41
SLIDE 41

Summing up (II)

This kind of attack gives an attacker a privileged position to launch IP-based attacks against a GPRS/EDGE device... ...or even to attack the GPRS/EDGE stack itself

slide-42
SLIDE 42

Summing up (III)

The attack can be extended to UMTS by simply using a jammer Effective against any 3G device configured to fall back to GPRS/EDGE when UMTS is not available

slide-43
SLIDE 43

Conclusion

We must protect our GPRS/EDGE mobile data communications:

  • Know the vulnerabilities
  • Evaluate the risks
  • Take appropriate countermeasures
slide-44
SLIDE 44

Thank you!

Jose Pico jose@taddong.com David Perez david@taddong.com