{"id":360,"date":"2023-12-07T03:12:42","date_gmt":"2023-12-07T00:12:42","guid":{"rendered":"https:\/\/sms-txt.net\/?p=360"},"modified":"2024-09-05T12:44:42","modified_gmt":"2024-09-05T09:44:42","slug":"interception-des-appels-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/fr\/interception-des-appels\/interception-des-appels-ss7\/","title":{"rendered":"Interception des appels SS7"},"content":{"rendered":"<p>Le centre de commutation mobile MSC d\u00e9tient normalement les cl\u00e9s de cryptage utilis\u00e9es par chaque abonn\u00e9 pour pouvoir \u00e9tablir l'appel. Lorsque l'abonn\u00e9 se d\u00e9place, un processus de transfert facilite la transition en douceur de l'abonn\u00e9 entre les diff\u00e9rentes cellules radio tout en maintenant la progression de l'appel.<\/p>\n<p>Dans certains cas, l'abonn\u00e9 passe d'une cellule \u00e0 une autre qui est g\u00e9r\u00e9e par un VLR diff\u00e9rent. Dans ce cas, le nouveau VLR ne dispose pas initialement des informations d'authentification qui permettraient de pr\u00e9server l'appel, d'o\u00f9 la n\u00e9cessit\u00e9 d'un processus de transfert entre MSC pour transf\u00e9rer les cl\u00e9s au nouveau MSC.<\/p>\n<p>Cette op\u00e9ration s'effectue au moyen d'un message MAP appel\u00e9 sendIdentification. Le nouveau VLR envoie un message sendIdentification \u00e0 l'ancien VLR, qui r\u00e9pond \u00e0 son tour avec les cl\u00e9s n\u00e9cessaires pour maintenir l'appel en cours.  Parmi ces cl\u00e9s figure la cl\u00e9 utilis\u00e9e pour crypter le trafic a\u00e9rien. Dans le sc\u00e9nario d'attaque, l'attaquant capture le trafic de la cible via l'interface a\u00e9rienne (ce qui n\u00e9cessite la proximit\u00e9 physique de la cible).<\/p>\n<p>Avec l'acc\u00e8s au SS7, il peut alors utiliser le message sendIdentification pour r\u00e9cup\u00e9rer les cl\u00e9s de d\u00e9cryptage de la cible et les utiliser pour d\u00e9crypter le trafic. Le message sendIdentification n'est n\u00e9cessaire qu'\u00e0 l'int\u00e9rieur du r\u00e9seau interne pendant la dur\u00e9e de la transmission.<br \/>\nles transferts. Il ne doit pas avoir d'utilisation l\u00e9gitime de l'ext\u00e9rieur et doit donc \u00eatre filtr\u00e9 \u00e0 la fronti\u00e8re.<\/p>\n<h2>Interception des appels sortants<\/h2>\n<p>La fonction de contr\u00f4le du service GSM (gsmSCF) est une entit\u00e9 fonctionnelle qui contient la logique du service CAMEL qui d\u00e9cide avec certitude, pour un certain ensemble d'\u00e9v\u00e9nements, si l'action souhait\u00e9e peut continuer \u00e0 \u00eatre modifi\u00e9e, non modifi\u00e9e ou interrompue. Elle peut par exemple \u00eatre utilis\u00e9e pour modifier les num\u00e9ros sortants afin d'ajouter l'indicatif r\u00e9gional ou le format international.<\/p>\n<p>Un pirate ayant acc\u00e8s \u00e0 SS7 peut utiliser un message insertSubscriberData pour changer l'adresse gsmSCF de l'abonn\u00e9 en une adresse qu'il contr\u00f4le. L'attaquant est alors en mesure de r\u00e9\u00e9crire les num\u00e9ros compos\u00e9s sortants pour les remplacer par un num\u00e9ro qu'il contr\u00f4le. Dans ce cas, l'attaquant recevra l'appel sortant, l'enregistrera avant de transf\u00e9rer le trafic vers la destination finale.<\/p>\n<h2>Interception - Trafic entrant - Renvoi d'appel<\/h2>\n<p>Le message registerSS est utilis\u00e9 pour enregistrer des services suppl\u00e9mentaires aupr\u00e8s d'un abonn\u00e9. L'un de ces services est le service de renvoi d'appel. Un pirate peut utiliser le message registerSS pour activer le renvoi d'appel vers un num\u00e9ro qu'il contr\u00f4le. Lorsqu'il re\u00e7oit l'appel, il utilise le message eraseSS pour supprimer le renvoi d'appel et renvoyer l'appel \u00e0 l'abonn\u00e9. De cette mani\u00e8re, il peut intercepter et enregistrer l'appel.<\/p>","protected":false},"excerpt":{"rendered":"<p>Le centre de commutation mobile MSC d\u00e9tient normalement les cl\u00e9s de cryptage utilis\u00e9es par chaque abonn\u00e9 pour pouvoir \u00e9tablir l'appel. Lorsque l'abonn\u00e9 se d\u00e9place, un processus de transfert facilite la transition en douceur de l'abonn\u00e9 entre les diff\u00e9rentes cellules radio tout en maintenant la progression de l'appel. Dans certains cas, l'abonn\u00e9 se d\u00e9place de...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68],"tags":[],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-call-interception"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Call Interception<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/fr\/interception-des-appels\/interception-des-appels-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Call Interception\" \/>\n<meta property=\"og:description\" content=\"The mobile switching center MSC normally holds the encryption keys used by each subscriber to be able to establish the call. When the subscriber is on the move, a handover process facilitates the smooth transition of the subscriber between the different radio cells while maintain the call progress. In some cases the subscriber moves from...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/fr\/interception-des-appels\/interception-des-appels-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-07T00:12:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:42+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Call Interception\",\"datePublished\":\"2023-12-07T00:12:42+00:00\",\"dateModified\":\"2024-09-05T09:44:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"Call Interception\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\",\"url\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\",\"name\":\"SS7 Call Interception\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-07T00:12:42+00:00\",\"dateModified\":\"2024-09-05T09:44:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Call Interception\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Interception des appels SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/fr\/interception-des-appels\/interception-des-appels-ss7\/","og_locale":"fr_FR","og_type":"article","og_title":"SS7 Call Interception","og_description":"The mobile switching center MSC normally holds the encryption keys used by each subscriber to be able to establish the call. When the subscriber is on the move, a handover process facilitates the smooth transition of the subscriber between the different radio cells while maintain the call progress. In some cases the subscriber moves from...","og_url":"https:\/\/sms-txt.net\/fr\/interception-des-appels\/interception-des-appels-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-07T00:12:42+00:00","article_modified_time":"2024-09-05T09:44:42+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Call Interception","datePublished":"2023-12-07T00:12:42+00:00","dateModified":"2024-09-05T09:44:42+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/"},"wordCount":422,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["Call Interception"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/","url":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/","name":"Interception des appels SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-07T00:12:42+00:00","dateModified":"2024-09-05T09:44:42+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/call-interception\/ss7-call-interception\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Call Interception"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Piratage du SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/360\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/media?parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/categories?post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/tags?post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}