SS7: Locate. Track. Manipulate [video]

streaming.media.ccc.de

125 points by moe 11 years ago

Tobias Engel demonstrates (amongst other things):

* How to find out the phone numbers of nearby cellphones

* How to track the location of a cellphone that you only know the phone number of

* How intercept outgoing calls of nearby cellphones

moe 11 years ago

Actual talk starts at 00:16:00 into the video.

Tobias Engel demonstrates (amongst other things):

* How to find out the phone numbers of nearby cellphones

* How to track the location of any cellphone worldwide that you only know the phone number of

* How intercept outgoing calls of nearby cellphones (to record and/or re-route to a different number)

dsl 11 years ago

I've learned more about how to efficiently seat people in an auditorium than I ever needed to know.

But on a serious note, conference organizers should play close attention to how CCC does stuff and replicate it. The pre-talk on screen information is amazing and useful.

  • s3nnyy 11 years ago

    I've only attended two talks today - could you explain what you mean?

wirefloss 11 years ago

All TDM and Sigtran signaling links of world-wide SS7 network are configured manually peer-to-peer. The signaling traffic including SMS texts travels mostly unencrypted. Hence it's next to impossible to get a real SS7 Pcap log (requires an NDA), let alone access to the SS7 network, unless you work with a network operator.

  • moe 11 years ago

    it's next to impossible to get access to the SS7 network

    Tobias claims the opposite in the video. He says you can easily rent access from a Carrier (e.g. Verizon) or buy a Femtocell[1][2].

    Both approaches seem rather affordable ("hundreds of dollars").

    [1] http://en.wikipedia.org/wiki/Femtocell

    [2] http://www.thinksmallcell.com/Examples/where-can-i-buy-a-fem...

    • at-fates-hands 11 years ago

      Apparently the attack vector is pretty small considering:

      http://www.digitaltrends.com/mobile/femtocell-verizon-hack/

      Fortunately for Verizon customers, the company has since issued a patch to all affected femtocells. Sprint currently offers a femtocell that is similar to the vulnerable models from Verizon, but the company has said it plans to discontinue the device. And while AT&T also offers femtocells, it requires an extra level of authentication that makes much of the iSEC Partner’s findings irrelevant. Still, says Ritter, the femtocell vulnerability is a major problem.

      And

      Ritter suggests that all carriers that offer femtocells require owners to provide a list of approved devices that are allowed to connect to their femtocell. And also prevent customers’ cell phones from connecting to any unauthorized femtocell.

      • moe 11 years ago

        Pretty small?

        Verizon was just used as an example here, the same attack vector applies to every mobile carrier in the world.

        • wirefloss 11 years ago

          The Verizon vuln referenced above seems has nothing to do with SS7. Femtocell is rooted, and only cell phones in a close proximity are vulnerable. I thought the presentation in Hannover deals with a much broader issue. And yes, femtocell may be potentially a gateway to the remote hacking of MSC, HLR, etc. Unfortunately I have not seen the presentation, so I can't be sure what it's about.

        • wirefloss 11 years ago

          I finally found the way to watch the presentation (BTW it's good), and the author mentions femtocell hacking as "if you hack femtocells you _may_ have a chance to have access to SS7", or something like that, i.e. very uncertain. He emphasizes a different method -- getting a "global title". That's what I meant in my original comment -- you have to join the telco club, and that is not trivial.

  • tdullien 11 years ago

    The traditional way to dealing with this from a computer crime perspective is to bribe a few officials in a third-world country, buy one basestation, and become a mobile operator there.

    • wirefloss 11 years ago

      Yep. I tried to avoid mentioning this in a polite company :).

sounds 11 years ago

Should be easy to transcode using VLC and post on YouTube, anyone not on Comcast able to do that for the rest of us?

Timmmmmm 11 years ago

This is pretty shocking. Shame it is technical enough that it will probably not become mainstream news.

  • spacefight 11 years ago

    It has. 4 out of 4 network operators in Germany closed (some of) the gapping holes already.

    One brave network engineer even came forward to complete that list (2/4 -> 4/4) after the talk of Karsten Nohl.