{"id":360,"date":"2023-12-07T03:12:42","date_gmt":"2023-12-07T00:12:42","guid":{"rendered":"https:\/\/sms-txt.net\/?p=360"},"modified":"2024-09-05T12:44:42","modified_gmt":"2024-09-05T09:44:42","slug":"ss7-interceptacion-de-llamadas","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/es\/interceptacion-de-llamadas\/ss7-interceptacion-de-llamadas\/","title":{"rendered":"Interceptaci\u00f3n de llamadas SS7"},"content":{"rendered":"<p>El centro de conmutaci\u00f3n m\u00f3vil MSC normalmente posee las claves de cifrado utilizadas por cada abonado para poder establecer la llamada. Cuando el abonado se desplaza, un proceso de traspaso facilita la transici\u00f3n fluida del abonado entre las distintas c\u00e9lulas de radio al tiempo que se mantiene el progreso de la llamada.<\/p>\n<p>En algunos casos, el abonado se desplaza de una c\u00e9lula a otra gestionada por un VLR diferente. En este caso, el nuevo VLR no dispone inicialmente de la informaci\u00f3n de autenticaci\u00f3n que facilitar\u00eda la preservaci\u00f3n de la llamada, por lo que es necesario un proceso de traspaso entre MSC para transferir las claves al nuevo MSC.<\/p>\n<p>Esto se hace a trav\u00e9s de un mensaje MAP llamado sendIdentification. El nuevo VLR env\u00eda un mensaje sendIdentification al antiguo VLR, que a su vez responde con las claves necesarias para mantener la llamada en curso.  Entre estas claves se encuentra la utilizada para cifrar el tr\u00e1fico a\u00e9reo. En el escenario de ataque, el atacante captura el tr\u00e1fico del objetivo a trav\u00e9s de la interfaz a\u00e9rea (lo que requiere proximidad f\u00edsica del objetivo).<\/p>\n<p>Con acceso a SS7, puede utilizar el mensaje sendIdentification para recuperar las claves de descifrado del objetivo y utilizarlas para descifrar el tr\u00e1fico. El sendIdentification s\u00f3lo es necesario dentro de la red interna durante<br \/>\ntraspasos. No debe tener un uso leg\u00edtimo desde el exterior y, por tanto, debe filtrarse en la frontera.<\/p>\n<h2>Interceptaci\u00f3n de llamadas salientes<\/h2>\n<p>La funci\u00f3n de control de servicio GSM (gsmSCF) es una entidad funcional que contiene la l\u00f3gica de servicio CAMEL que decide con certeza para un determinado conjunto de eventos si la acci\u00f3n deseada puede continuar modificada, sin modificar o abortada. Puede utilizarse, por ejemplo, para modificar los n\u00fameros salientes para a\u00f1adir el prefijo o el formato internacional.<\/p>\n<p>Un atacante con acceso a SS7 puede utilizar un mensaje insertSubscriberData para cambiar la direcci\u00f3n gsmSCF del abonado a una direcci\u00f3n bajo su control. El atacante es entonces capaz de reescribir los n\u00fameros marcados salientes a un n\u00famero bajo su control. En este caso, el atacante recibir\u00e1 la llamada saliente, grabar\u00e1 la llamada antes de reenviar el tr\u00e1fico al destino final.<\/p>\n<h2>Interceptaci\u00f3n - Tr\u00e1fico entrante - Desv\u00edo de llamadas<\/h2>\n<p>El mensaje registerSS se utiliza para dar de alta servicios complementarios a un abonado. Uno de estos servicios es el desv\u00edo de llamadas. Un atacante puede utilizar el mensaje registerSS para activar el desv\u00edo de llamadas a un n\u00famero bajo su control. Al recibir la llamada, el atacante utiliza el mensaje eraseSS para eliminar el desv\u00edo de llamada y reenviarla de nuevo al abonado. De este modo, el atacante puede interceptar y grabar la llamada.<\/p>","protected":false},"excerpt":{"rendered":"<p>El centro de conmutaci\u00f3n m\u00f3vil MSC normalmente posee las claves de cifrado utilizadas por cada abonado para poder establecer la llamada. Cuando el abonado se desplaza, un proceso de traspaso facilita la transici\u00f3n fluida del abonado entre las distintas c\u00e9lulas de radio manteniendo el progreso de la llamada. En algunos casos, el abonado se desplaza de...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68],"tags":[],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-call-interception"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Call Interception<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/es\/interceptacion-de-llamadas\/ss7-interceptacion-de-llamadas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Call Interception\" \/>\n<meta property=\"og:description\" content=\"The mobile switching center MSC normally holds the encryption keys used by each subscriber to be able to establish the call. When the subscriber is on the move, a handover process facilitates the smooth transition of the subscriber between the different radio cells while maintain the call progress. In some cases the subscriber moves from...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/es\/interceptacion-de-llamadas\/ss7-interceptacion-de-llamadas\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-07T00:12:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:42+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Call Interception\",\"datePublished\":\"2023-12-07T00:12:42+00:00\",\"dateModified\":\"2024-09-05T09:44:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"Call Interception\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\",\"url\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\",\"name\":\"SS7 Call Interception\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-07T00:12:42+00:00\",\"dateModified\":\"2024-09-05T09:44:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Call Interception\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Interceptaci\u00f3n de llamadas SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/es\/interceptacion-de-llamadas\/ss7-interceptacion-de-llamadas\/","og_locale":"es_ES","og_type":"article","og_title":"SS7 Call Interception","og_description":"The mobile switching center MSC normally holds the encryption keys used by each subscriber to be able to establish the call. When the subscriber is on the move, a handover process facilitates the smooth transition of the subscriber between the different radio cells while maintain the call progress. In some cases the subscriber moves from...","og_url":"https:\/\/sms-txt.net\/es\/interceptacion-de-llamadas\/ss7-interceptacion-de-llamadas\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-07T00:12:42+00:00","article_modified_time":"2024-09-05T09:44:42+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Call Interception","datePublished":"2023-12-07T00:12:42+00:00","dateModified":"2024-09-05T09:44:42+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/"},"wordCount":422,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["Call Interception"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/","url":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/","name":"Interceptaci\u00f3n de llamadas SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-07T00:12:42+00:00","dateModified":"2024-09-05T09:44:42+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Call Interception"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hackeo SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/posts\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/posts\/360\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/media?parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/categories?post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/es\/wp-json\/wp\/v2\/tags?post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}