{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"ss7-utoky","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/cs\/ss7-sms\/ss7-utoky\/","title":{"rendered":"\u00datoky SS7"},"content":{"rendered":"<h1>\u00datoky SS7<\/h1>\n<p>Stejn\u011b jako mnoho jin\u00fdch star\u0161\u00edch protokol\u016f byl i SS7 navr\u017een s mal\u00fdm ohledem na bezpe\u010dnost. Koncepty jako autentizace a autorizace se t\u00e9m\u011b\u0159 nevyskytovaly ani se o nich nediskutovalo. Zabezpe\u010den\u00ed SS7 bylo zalo\u017eeno v\u00fdhradn\u011b na d\u016fv\u011b\u0159e. Z\u00e1kladn\u00ed s\u00ed\u0165ov\u00e9 prvky byly podle toho postaveny s malou, pokud v\u016fbec n\u011bjakou, ochranou proti zneu\u017eit\u00ed funkc\u00ed SS7. Vzhledem k tomu, \u017ee SS7 je pova\u017eov\u00e1na za uzav\u0159enou s\u00ed\u0165, bylo provedeno jen velmi m\u00e1lo bezpe\u010dnostn\u00edch v\u00fdzkum\u016f, kter\u00e9 by posoudily jej\u00ed bezpe\u010dnost. V\u00fdzkumn\u00edci v oblasti bezpe\u010dnosti nem\u011bli p\u0159\u00edstup k s\u00edt\u00edm SS7 a poskytovatel\u00e9 slu\u017eeb m\u011bli jen mal\u00fd z\u00e1jem se t\u00edmto t\u00e9matem zab\u00fdvat.<\/p>\n<p>S\u00ed\u0165 SS7 v\u0161ak ji\u017e nen\u00ed uzav\u0159en\u00e1. Poskytovatel\u00e9 s\u00edt\u00ed otev\u00edraj\u00ed sv\u00e9 s\u00edt\u011b SS7 t\u0159et\u00edm stran\u00e1m v r\u00e1mci sv\u00fdch komer\u010dn\u00edch nab\u00eddek. S\u00ed\u0165ov\u00e9 prvky, jako jsou femtobu\u0148ky, opou\u0161t\u011bj\u00ed uzav\u0159en\u00e9 hranice oper\u00e1tor\u016f a jsou um\u00edst\u011bny na ned\u016fv\u011bryhodn\u00fdch m\u00edstech; hacke\u0159i si mohou naj\u00edt cestu do s\u00edt\u00ed mobiln\u00edch oper\u00e1tor\u016f a je t\u0159eba zm\u00ednit, \u017ee n\u011bkte\u0159\u00ed oper\u00e1to\u0159i mohou b\u00fdt pod kontrolou n\u00e1rodn\u00edch st\u00e1t\u016f se zl\u00fdmi \u00famysly zneu\u017e\u00edt tyto nezabezpe\u010den\u00e9 s\u00edt\u011b.<\/p>\n<p>Zneu\u017eit\u00ed nejistoty protokolu SS7 m\u016f\u017ee m\u00edt z\u00e1va\u017en\u00e9 d\u016fsledky; povaha protokolu umo\u017e\u0148uje p\u0159\u00edstup k informac\u00edm, jako je poloha u\u017eivatele a podrobnosti o vol\u00e1n\u00ed\/SMS. Finan\u010dn\u00ed slu\u017eby a autentiza\u010dn\u00ed syst\u00e9my byly vybudov\u00e1ny na z\u00e1klad\u011b d\u016fv\u011bryhodnosti slu\u017eeb poskytovan\u00fdch t\u011bmito protokoly. \u00datoky typu Denial of Service zneu\u017e\u00edvaj\u00edc\u00ed t\u011bchto nejistot mohou m\u00edt pro telekomunika\u010dn\u00ed infrastrukturu st\u00e1t\u016f devastuj\u00edc\u00ed \u00fa\u010dinky.<\/p>\n<p>V dal\u0161\u00edch \u010d\u00e1stech se budeme zab\u00fdvat n\u011bkter\u00fdmi \u00fatoky, kter\u00e9 byly ohl\u00e1\u0161eny proti syst\u00e9mu SS7, v nad\u011bji, \u017ee analyzujeme chyb\u011bj\u00edc\u00ed kontroln\u00ed mechanismy a p\u0159\u00edpadn\u011b navrhneme n\u011bkter\u00e9 kontroln\u00ed mechanismy, kter\u00e9 mohou omezit \u00fa\u010dinek t\u011bchto \u00fatok\u016f. Tyto odd\u00edly do zna\u010dn\u00e9 m\u00edry \u010derpaj\u00ed z pr\u00e1ce bezpe\u010dnostn\u00edch v\u00fdzkumn\u00edk\u016f Tobiase Engela a Karstena Nohla v oblastech odposlechu hovor\u016f a SMS, sledov\u00e1n\u00ed polohy, podvod\u016f a odep\u0159en\u00ed slu\u017eby.<\/p>\n<h2>Odposlech hovor\u016f a SMS<\/h2>\n<p>Odposlech komunikace byl v\u017edy hlavn\u00edm c\u00edlem \u0161pion\u00e1\u017en\u00edch operac\u00ed. Ve star\u00fdch dob\u00e1ch dr\u00e1tov\u00fdch telefon\u016f se \u00fato\u010dn\u00edk musel fyzicky napojit na dr\u00e1t, aby mohl odposlouch\u00e1vat prob\u00edhaj\u00edc\u00ed hovor.<br \/>\nV dob\u011b mobiln\u00ed komunikace se hovor mezi volaj\u00edc\u00edmi stranami a mobiln\u00edmi s\u00edt\u011bmi p\u0159en\u00e1\u0161\u00ed r\u00e1diov\u00fdm sign\u00e1lem. Obvykle je provoz p\u0159es vzdu\u0161n\u00e9 rozhran\u00ed \u0161ifrov\u00e1n. \u0160ifrov\u00e1n\u00ed se prov\u00e1d\u00ed pomoc\u00ed protokol\u016f A5\/1 nebo A5\/3. V posledn\u00ed dob\u011b byl prolomen protokol A5\/1 a je mo\u017en\u00e9 de\u0161ifrovat hovory p\u0159en\u00e1\u0161en\u00e9 p\u0159es vzdu\u0161n\u00e9 rozhran\u00ed pomoc\u00ed levn\u00fdch r\u00e1diov\u00fdch odposlech\u016f a duhov\u00fdch tabulek (Nohl, Munant, 2010). Jako<br \/>\nV d\u016fsledku toho za\u010dali oper\u00e1to\u0159i zav\u00e1d\u011bt siln\u011bj\u0161\u00ed \u0161ifrovac\u00ed protokol A5\/3, kter\u00fd m\u00e1 t\u011bmto \u00fatok\u016fm br\u00e1nit.<\/p>\n<p>Ned\u00e1vno odhalen\u00e9 zranitelnosti SS7 v\u0161ak otev\u0159ely \u0159adu mo\u017enost\u00ed, kter\u00e9 usnad\u0148uj\u00ed odposlech hovor\u016f a SMS p\u0159en\u00e1\u0161en\u00fdch p\u0159es mobiln\u00ed s\u00ed\u0165.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00datoky na SS7 Stejn\u011b jako mnoho jin\u00fdch star\u0161\u00edch protokol\u016f byl i SS7 navr\u017een s mal\u00fdm ohledem na bezpe\u010dnost. Koncepty jako autentizace a autorizace se t\u00e9m\u011b\u0159 nevyskytovaly ani se o nich nediskutovalo. Zabezpe\u010den\u00ed SS7 bylo zalo\u017eeno v\u00fdhradn\u011b na d\u016fv\u011b\u0159e. Z\u00e1kladn\u00ed s\u00ed\u0165ov\u00e9 prvky byly podle toho postaveny s malou, pokud v\u016fbec n\u011bjakou obranou proti zneu\u017eit\u00ed funkc\u00ed SS7. Proto\u017ee byla pova\u017eov\u00e1na za uzav\u0159enou...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/cs\/ss7-sms\/ss7-utoky\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/cs\/ss7-sms\/ss7-utoky\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"cs-CZ\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"cs-CZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs-CZ\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs-CZ\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00datoky SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/cs\/ss7-sms\/ss7-utoky\/","og_locale":"cs_CZ","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/cs\/ss7-sms\/ss7-utoky\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"\u00datoky SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/cs\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}