{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"ss7-runnakud","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/et\/ss7-sms\/ss7-runnakud\/","title":{"rendered":"SS7 r\u00fcnnakud"},"content":{"rendered":"<h1>SS7 r\u00fcnnakud<\/h1>\n<p>Nagu paljude varasemate protokollide puhul, on ka SS7 kavandamisel silmas peetud v\u00e4he turvalisust. Selliseid m\u00f5isteid nagu autentimine ja autoriseerimine ei olnud peaaegu \u00fcldse olemas ega arutatud. SS7 turvalisus p\u00f5hines \u00fcksnes usaldusel. P\u00f5hiv\u00f5rgu elemendid ehitati vastavalt sellele, kusjuures SS7 funktsioonide kuritarvitamise vastu oli v\u00e4he v\u00f5i \u00fcldse mitte. Kuna SS7-v\u00f5rku peetakse suletud v\u00f5rguks, on selle turvalisuse hindamiseks tehtud v\u00e4ga v\u00e4he uuringuid. Turvauurijatel ei olnud juurdep\u00e4\u00e4su SS7-v\u00f5rkudele ja teenusepakkujatel oli v\u00e4he huvi selle teemaga tegelemiseks.<\/p>\n<p>Kuid SS7-v\u00f5rk ei ole enam suletud. V\u00f5rgupakkujad avavad oma SS7-v\u00f5rgud kolmandatele osapooltele osana oma kaubanduslikest pakkumistest. Sellised v\u00f5rguelemendid nagu Femtocellid v\u00e4ljuvad operaatorite suletud piiridest ja asuvad usaldamatutes kohtades; h\u00e4kkerid v\u00f5ivad leida tee mobiilsideoperaatorite v\u00f5rkudesse, ja on vaja mainida, et m\u00f5ned operaatorid v\u00f5ivad olla rahvusriikide kontrolli all, kellel on pahatahtlikud kavatsused kuritarvitada selliseid ebaturvalisi v\u00f5rke.<\/p>\n<p>SS7-i ebakindluse kuritarvitamine v\u00f5ib avaldada t\u00f5sist m\u00f5ju; protokolli olemus v\u00f5imaldab juurdep\u00e4\u00e4su sellistele andmetele nagu kasutaja asukoht ja k\u00f5nede\/SMS-i \u00fcksikasjad. Finantsteenused ja autentimiss\u00fcsteemid on \u00fcles ehitatud selliste protokollide pakutavate teenuste usaldusv\u00e4\u00e4rsusele tuginedes. Neid turvaaukeid kuritarvitavad teenuset\u00f5rjer\u00fcnnakud v\u00f5ivad olla laastavad riikide telekommunikatsiooniinfrastruktuurile.<\/p>\n<p>J\u00e4rgmistes punktides uurime m\u00f5ningaid SS7 vastu v\u00e4lja kuulutatud r\u00fcnnakuid, lootuses anal\u00fc\u00fcsida puuduvaid kontrolle ja teha l\u00f5puks ettepanekuid kontrollide kohta, mis v\u00f5ivad piirata nende r\u00fcnnakute m\u00f5ju. Need l\u00f5igud tuginevad suures osas Tobias Engeli ja Karsten Nohli turvalisusuurijate t\u00f6\u00f6le k\u00f5nede ja SMSide pealtkuulamise, asukoha j\u00e4lgimise, pettuste ja teenuset\u00f5kestamise valdkonnas.<\/p>\n<h2>K\u00f5nede ja SMSide pealtkuulamine<\/h2>\n<p>Side pealtkuulamine on alati olnud igasuguste spionaa\u017eioperatsioonide l\u00f5ppeesm\u00e4rk. Vanasti, kui kasutati juhtmega telefone, pidi r\u00fcndaja k\u00e4imasoleva k\u00f5ne pealtkuulamiseks f\u00fc\u00fcsiliselt juhtme pealtkuulamist teostama.<br \/>\nMobiilside ajastul toimub k\u00f5ne edastamine raadio teel helistajate ja mobiilsidev\u00f5rkude vahel. Tavaliselt on liiklus \u00f5huliidese kaudu kr\u00fcpteeritud. Kr\u00fcpteerimine toimub kas A5\/1 v\u00f5i A5\/3 protokollide abil. Hiljuti on A5\/1 pakett murdunud ja on v\u00f5imalik de\u0161ifreerida \u00f5huliidese kaudu edastatavaid k\u00f5nesid, kasutades odavaid raadiok\u00f5rvitsere ja vikerkaareplaate (Nohl, Munant, 2010). Kuna<br \/>\nSelle tulemusena hakkasid operaatorid selliste r\u00fcnnakute vastu v\u00f5itlemiseks kasutama tugevamat salastamisprotokolli A5\/3.<\/p>\n<p>Hiljuti avalikustatud SS7 haavatavused avasid aga mitmeid v\u00f5imalusi, mis h\u00f5lbustavad mobiilsidev\u00f5rgu kaudu edastatavate k\u00f5nede ja SMSide pealtkuulamist.<\/p>","protected":false},"excerpt":{"rendered":"<p>SS7-r\u00fcnnakud Nagu paljude varasemate protokollide puhul, on ka SS7 kavandamisel v\u00e4he turvalisust silmas pidades. Selliseid m\u00f5isteid nagu autentimine ja autoriseerimine ei olnud peaaegu \u00fcldse olemas ega arutatud. SS7 turvalisus p\u00f5hines \u00fcksnes usaldusel. P\u00f5hiv\u00f5rgu elemendid ehitati vastavalt sellele, kusjuures SS7 funktsioonide kuritarvitamise vastu oli v\u00e4he v\u00f5i \u00fcldse mitte kaitset. Kuna seda peeti suletud...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/et\/ss7-sms\/ss7-runnakud\/\" \/>\n<meta property=\"og:locale\" content=\"et_EE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/et\/ss7-sms\/ss7-runnakud\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/es\\\/ss7-sms\\\/ss7-ataques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/es\\\/ss7-sms\\\/ss7-ataques\\\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/es\\\/ss7-sms\\\/ss7-ataques\\\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"et\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/es\\\/ss7-sms\\\/ss7-ataques\\\/\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/es\\\/ss7-sms\\\/ss7-ataques\\\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/es\\\/ss7-sms\\\/ss7-ataques\\\/#breadcrumb\"},\"inLanguage\":\"et\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sms-txt.net\\\/es\\\/ss7-sms\\\/ss7-ataques\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/es\\\/ss7-sms\\\/ss7-ataques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sms-txt.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sms-txt.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"et\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\",\"name\":\"SS7\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"et\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"contentUrl\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7 r\u00fcnnakud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/et\/ss7-sms\/ss7-runnakud\/","og_locale":"et_EE","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/et\/ss7-sms\/ss7-runnakud\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"et"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"SS7 r\u00fcnnakud","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"et","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 h\u00e4kkimine","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"et"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"et","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}