sitch
play

SITCH Inexpensive, coordinated GSM anomaly detection About Me - PowerPoint PPT Presentation

SITCH Inexpensive, coordinated GSM anomaly detection About Me 2000: Technology career started (I can get paid for this??) 2003: Started building with Linux Came to infosec through systems and network engineering, integration


  1. SITCH Inexpensive, coordinated GSM anomaly detection

  2. About Me • 2000: Technology career started (I can get paid for this??) • 2003: Started building with Linux • Came to infosec through systems and network engineering, integration • Security tools and integration (SIEM, HIDS, etc…) • Current: R&D

  3. About You • Background in systems and network engineering • Interested in GSM threat detection • Tinfoil hat not required… but not unwelcome!

  4. “Thoughts and opinions expressed are my own. If you take anything away from this talk and act on it, I’m not responsible if you go to jail, become a pariah, or your dog stops liking you. Know the laws you’re subject to and operate accordingly.” –Ashmastaflash

  5. What We’re Covering Today • Why Care? • Current Threat and Detection Landscape • Project Goals • SITCH: MkI • SITCH: MkII • Service Architecture • Future Plans • Prior Art • Q&A

  6. Why Care? • Invasions of privacy are bad, even when they’re unnoticed. • Industrial espionage costs money and jobs.

  7. WTF Is Under All That??

  8. Is Anybody Home?

  9. Terminology • Software Defined Radio (SDR): Using software to perform signal processing in concert with an adjustable-frequency RF receiver • ARFCN: Absolute Radio Frequency Channel Number • BTS: Base Transceiver Station • CGI: Cell Global ID (MCC + MNC + LAC + CI) • MCC: Mobile Country Code • MNC: Mobile Network Code • LAC: Location Area Code • CI: Cell ID • IMSI: International Mobile Subscriber Identity

  10. GSM Addressing

  11. Threat and Detection Landscape • Malicious Devices • Indicators of Attack • Existing Detection Methods

  12. Hacked Femtocell Trusted part of provider’s network Your phone doesn’t know it’s evil

  13. Evil BTS Handset will automatically associate, unable to assert trustworthiness

  14. Indicators of Attack • ARFCN over threshold • ARFCN outside forecast • Unrecognized CGI • Gratuitous BTS re-association • BTS detected outside of range

  15. Detection Methods • Commercial Options: • Pwnie Express • Bastille Networks • Open Source: • Fake BTS • AIMSICD • Femto Catcher

  16. Project Goals • Inexpensive (what can I get for $100?) • Small footprint, low power requirements preferred • Functional Targets: Indicators of Attack (IOA) Coverage • Centrally managed software and configuration

  17. Raspberry Pi 2

  18. Raspberry Pi 2 logarithmic antenna

  19. Raspberry Pi 2 logarithmic antenna Odroids

  20. Raspberry Pi 2 logarithmic antenna XU4 C1+ Odroids

  21. Raspberry Pi 2 logarithmic antenna galaxy of XU4 C1+ Odroids

  22. Raspberry Pi 2 logarithmic antenna RED galaxy of XU4 C1+ Odroids

  23. Raspberry Pi 2 logarithmic antenna RED galaxy of BLUE XU4 C1+ Odroids

  24. Raspberry Pi 2 logarithmic antenna GREEN RED galaxy of BLUE XU4 C1+ Odroids

  25. Raspberry Pi 2 logarithmic antenna GREEN RED galaxy of ORANGE BLUE XU4 C1+ Odroids

  26. Raspberry Pi 2 logarithmic antenna GREEN RED galaxy of ORANGE BLUE XU4 C1+ Intel NUC Odroids

  27. Raspberry Pi 2 logarithmic antenna GREEN RED Intel Edison galaxy of ORANGE BLUE XU4 C1+ Intel NUC Odroids

  28. Raspberry Pi 2 logarithmic antenna GREEN RED Intel Edison GSM Modem galaxy of ORANGE BLUE XU4 C1+ Intel NUC Odroids

  29. Raspberry Pi 2 logarithmic antenna GREEN RTL-SDR RED Intel Edison GSM Modem galaxy of ORANGE BLUE XU4 C1+ Intel NUC Odroids

  30. Raspberry Pi 2 logarithmic antenna GREEN RTL-SDR RED Intel Edison GSM Modem galaxy of ORANGE BLUE XU4 C1+ I didn’t really *need* all of this… Intel NUC Odroids

  31. SITCH Situational Information from Telemetry and Correlated Heuristics

  32. SITCH Sensor MkI

  33. SITCH Sensor MkI

  34. MkI Results Targets MkI Coverage ARFCN over threshold YES ARFCN outside of forecast YES Unrecognized CGI NO Gratuitous BTS re-association NO BTS detected outside of range NO Price ~$100

  35. Releasing MkI? No.

  36. What’s wrong with MkI?

  37. Start Demo Here! • Confirm device registration • Image download starts

  38. Deployment Pipeline

  39. Service-Side Software Tool Purpose Inbound Information Processing Logstash Alert delivery Elasticsearch Scan document retention Time-series database Carbon/Graphite Statistical analysis of time-series data Kibana Browse scans Tessera Dashboard for Graphite Graphite Beacon Alert Generation Vault Secret management Resin Software Deployment Slack Notifications

  40. SITCH Service Architecture

  41. SITCH Intelligence Feed • OpenCellID Database: • MCC, MNC, Lat, Lon, Range • Twilio: • MCC, MNC, CarrierName

  42. SITCH Sensor MkII

  43. SITCH Sensor MkII

  44. SITCH Sensor MkII

  45. SITCH Sensor MkII

  46. SITCH Sensor MkII

  47. SITCH Sensor MkII

  48. Return to Demo! • Slack alerts • Tessera graphs • Kibana scan search • Resin logs

  49. MkI, MkII Summary Targets MkI Coverage MkII Coverage ARFCN over threshold YES YES ARFCN outside of forecast YES YES Unrecognized CGI NO YES Gratuitous BTS re- NO YES association BTS detected outside of NO YES range Price ~$100 ~$150

  50. Going Forward • Automatic device detection • Device and service heartbeats • Gnuradio = pure SDR: • GR-GSM • ADS-B • FPV drone • Dedicated radios: • Ubertooth One • YARD Stick One

  51. Prior Art • DIY Cellular IDS (Davidoff, Fretheim, Harrison, & Price, Defcon 21) • Traffic Interception and Remote Mobile Phone Cloning with a Compromised Femtocell (DePerry, Ritter, & Rahimi, Defcon 21) • Introduction to SDR and the Wireless Village (DaKahuna & Satanklawz, Defcon 23) • http://fakebts.com - Fake BTS Project (Cabrera, 2014) • How to Build Your Own Rogue GSM BTS for Fun and Profit (Simone Margaritelli) • Gnuradio (many) • Gr-gsm (Krysik, et al.) • Kalibrate (thre.at)

  52. THANKS! • John Menerick • Gillis Jones • Christian Wright • Dave Doolin • Silent Contributors…

  53. Q&A

  54. #OMW2 Scan Your GSM

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend