{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"attaques-du-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/fr\/ss7-sms\/attaques-du-ss7\/","title":{"rendered":"Attaques SS7"},"content":{"rendered":"<h1>Attaques SS7<\/h1>\n<p>Comme de nombreux protocoles h\u00e9rit\u00e9s, le SS7 a \u00e9t\u00e9 con\u00e7u avec peu de s\u00e9curit\u00e9 \u00e0 l'esprit. Des concepts tels que l'authentification et l'autorisation \u00e9taient \u00e0 peine pr\u00e9sents ou discut\u00e9s. La s\u00e9curit\u00e9 du SS7 reposait uniquement sur la confiance. Les \u00e9l\u00e9ments centraux du r\u00e9seau ont \u00e9t\u00e9 construits en cons\u00e9quence, avec peu ou pas de d\u00e9fenses contre l'utilisation abusive des fonctionnalit\u00e9s du SS7. Le SS7 \u00e9tant consid\u00e9r\u00e9 comme un r\u00e9seau ferm\u00e9, tr\u00e8s peu de recherches sur la s\u00e9curit\u00e9 ont \u00e9t\u00e9 effectu\u00e9es pour \u00e9valuer la s\u00e9curit\u00e9 du SS7. Les chercheurs en s\u00e9curit\u00e9 n'avaient pas acc\u00e8s aux r\u00e9seaux SS7 et les fournisseurs de services n'avaient que peu d'int\u00e9r\u00eat \u00e0 se pencher sur le sujet.<\/p>\n<p>Mais le r\u00e9seau SS7 n'est plus ferm\u00e9. Les fournisseurs de r\u00e9seaux ouvrent leurs r\u00e9seaux SS7 \u00e0 des tiers dans le cadre de leurs offres commerciales. Les \u00e9l\u00e9ments de r\u00e9seau tels que les femtocellules quittent les fronti\u00e8res ferm\u00e9es des op\u00e9rateurs et sont bas\u00e9s dans des lieux non fiables ; les pirates informatiques peuvent se frayer un chemin dans les r\u00e9seaux des op\u00e9rateurs mobiles, et il est inutile de mentionner que certains op\u00e9rateurs peuvent \u00eatre sous le contr\u00f4le d'\u00c9tats-nations ayant des intentions malveillantes d'abuser de ces r\u00e9seaux non s\u00e9curis\u00e9s.<\/p>\n<p>L'utilisation abusive des ins\u00e9curit\u00e9s du SS7 peut avoir des cons\u00e9quences graves ; la nature du protocole permet d'acc\u00e9der \u00e0 des informations telles que la localisation de l'utilisateur et les d\u00e9tails de l'appel\/du SMS. Les services financiers et les syst\u00e8mes d'authentification ont \u00e9t\u00e9 construits sur la base de la confiance dans les services fournis par ces protocoles. Les attaques par d\u00e9ni de service abusant de ces ins\u00e9curit\u00e9s peuvent \u00eatre d\u00e9vastatrices pour l'infrastructure de t\u00e9l\u00e9communication des pays.<\/p>\n<p>Dans les sections suivantes, nous examinerons certaines des attaques annonc\u00e9es contre le SS7, dans l'espoir d'analyser les contr\u00f4les manquants et de proposer \u00e9ventuellement des contr\u00f4les susceptibles de limiter l'effet de ces attaques. Ces sections s'appuient largement sur les travaux r\u00e9alis\u00e9s par les chercheurs en s\u00e9curit\u00e9 Tobias Engel et Karsten Nohl dans les domaines de l'interception des appels et des SMS, de la localisation, de la fraude et du d\u00e9ni de service.<\/p>\n<h2>Interception des appels et des SMS<\/h2>\n<p>L'interception des communications a toujours \u00e9t\u00e9 la cible ultime des op\u00e9rations d'espionnage. \u00c0 l'\u00e9poque des t\u00e9l\u00e9phones filaires, l'attaquant devait se brancher physiquement sur le fil pour pouvoir \u00e9couter un appel en cours.<br \/>\n\u00c0 l'\u00e8re de la communication mobile, l'appel est transmis par radio entre les parties appelantes et les r\u00e9seaux mobiles. Normalement, le trafic est crypt\u00e9 sur l'interface radio. Le cryptage est effectu\u00e9 \u00e0 l'aide des protocoles A5\/1 ou A5\/3. R\u00e9cemment, la suite A5\/1 a \u00e9t\u00e9 bris\u00e9e et il est possible de d\u00e9crypter les appels transf\u00e9r\u00e9s sur l'interface radio en utilisant des intercepteurs radio bon march\u00e9 et des tables arc-en-ciel (Nohl, Munant, 2010). En tant que<br \/>\nEn cons\u00e9quence, les op\u00e9rateurs ont commenc\u00e9 \u00e0 d\u00e9ployer le protocole de chiffrement renforc\u00e9 A5\/3 pour lutter contre ces attaques.<\/p>\n<p>Pourtant, les vuln\u00e9rabilit\u00e9s SS7 r\u00e9cemment divulgu\u00e9es ont ouvert de multiples voies qui facilitent l'interception des appels et des SMS transmis sur le r\u00e9seau mobile.<\/p>","protected":false},"excerpt":{"rendered":"<p>Attaques SS7 Comme de nombreux protocoles h\u00e9rit\u00e9s, le SS7 a \u00e9t\u00e9 con\u00e7u avec peu de s\u00e9curit\u00e9 \u00e0 l'esprit. Des concepts tels que l'authentification et l'autorisation \u00e9taient \u00e0 peine pr\u00e9sents ou discut\u00e9s. La s\u00e9curit\u00e9 du SS7 \u00e9tait uniquement bas\u00e9e sur la confiance. Les \u00e9l\u00e9ments centraux du r\u00e9seau ont \u00e9t\u00e9 construits en cons\u00e9quence, avec peu ou pas de d\u00e9fenses contre l'utilisation abusive des fonctionnalit\u00e9s du SS7. Consid\u00e9r\u00e9 comme un r\u00e9seau ferm\u00e9...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/fr\/ss7-sms\/attaques-du-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/fr\/ss7-sms\/attaques-du-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Attaques SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/fr\/ss7-sms\/attaques-du-ss7\/","og_locale":"fr_FR","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/fr\/ss7-sms\/attaques-du-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"Attaques SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Piratage du SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}