SCTPscan - Finding entry points to SS7 Networks & Telecommunications Backbones by Philippe Langlois.pdf

(17552 KB) Pobierz
SCTPscan - Finding entry
points to SS7 Networks &
Telecommunication
Backbones
Philippe Langlois
Telecom Security Task Force
Philippe.Langlois@tstf.net
1
Agenda
History of telecommunications security
Review of digital telephony concepts
Discovering the backbone
SIGTRAN: From SS7 to TCP/IP
Attacking SIGTRAN
Q&A
2
The origins
Phreaking
is a slang term for the action of
making a telephone system do something
that it normally should not allow.
Telecommunications security problems
started in the 1960’s when the hackers of
the time started to discover ways to abuse
the telephone company.
3
But… what is it?
Discovery and exploration of features of
telecommunications systems
Controlling Network Elements (NE) in a way
that was not planned by its designers
Abusing weaknesses of protocols, systems
and applications in telephone networks
4
The Blue Box
Steve Jobs and Steve Wozniak in 1975 with a bluebox
CCITT#5 in-band signalling sends control messages over
the speech channel, allowing trunks to be controlled
Seize trunk (2600) / KP1 or KP2 / destination / ST
Started in mid-60’s, became popular after Esquire 1971
Sounds produced by whistles, electronics dialers,
computer programs, recorded tones
5
Zgłoś jeśli naruszono regulamin