SCTPscan - Finding entry points to SS7 Networks & Telecommunications Backbones by Philippe Langlois.pdf
(
17552 KB
)
Pobierz
SCTPscan - Finding entry
points to SS7 Networks &
Telecommunication
Backbones
Philippe Langlois
Telecom Security Task Force
Philippe.Langlois@tstf.net
1
Agenda
History of telecommunications security
Review of digital telephony concepts
Discovering the backbone
SIGTRAN: From SS7 to TCP/IP
Attacking SIGTRAN
Q&A
2
The origins
Phreaking
is a slang term for the action of
making a telephone system do something
that it normally should not allow.
Telecommunications security problems
started in the 1960’s when the hackers of
the time started to discover ways to abuse
the telephone company.
3
But… what is it?
Discovery and exploration of features of
telecommunications systems
Controlling Network Elements (NE) in a way
that was not planned by its designers
Abusing weaknesses of protocols, systems
and applications in telephone networks
4
The Blue Box
Steve Jobs and Steve Wozniak in 1975 with a bluebox
CCITT#5 in-band signalling sends control messages over
the speech channel, allowing trunks to be controlled
Seize trunk (2600) / KP1 or KP2 / destination / ST
Started in mid-60’s, became popular after Esquire 1971
Sounds produced by whistles, electronics dialers,
computer programs, recorded tones
5
Plik z chomika:
kufel_007
Inne pliki z tego folderu:
The IoT Hacker’s A Practical Guide to Hacking the Internet of Things.pdf
(18975 KB)
security-cissp-all-in-one-exam-guide-6th-edition.pdf
(60183 KB)
ethical-hacking-a-hands-on-introduction-to-breaking-in.pdf
(8872 KB)
Mastering Reverse Engineering Re-engineer your ethical hacking skills by Reginald Wong.pdf
(14578 KB)
Black-Hat-Go_Go-Programming-For-Hackers-and-Pentesters.pdf
(23456 KB)
Inne foldery tego chomika:
assembly
C#
C++
Hakin9 hacking
ISO
Zgłoś jeśli
naruszono regulamin