{"id":476,"date":"2024-07-09T08:12:10","date_gmt":"2024-07-09T05:12:10","guid":{"rendered":"https:\/\/sms-txt.net\/?p=476"},"modified":"2024-09-05T12:47:44","modified_gmt":"2024-09-05T09:47:44","slug":"lancienne-technologie-ss7-maintenant-les-vulnerabilites-modernes","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/fr\/ss7-sms\/lancienne-technologie-ss7-maintenant-les-vulnerabilites-modernes\/","title":{"rendered":"L'ancienne technologie SS7 et les vuln\u00e9rabilit\u00e9s modernes"},"content":{"rendered":"<h1>Introduction :<\/h1>\n<p>Comme nous pouvons facilement le constater, de nombreux op\u00e9rateurs de t\u00e9l\u00e9phonie mobile prot\u00e8gent leur marge SS7 en reconfigurant les instruments du r\u00e9seau et en mettant en \u0153uvre des solutions de routage des m\u00e9nages SMS.<\/p>\n<p>C'est peut-\u00eatre le moyen d'arriver \u00e0 des attaques SS7 en chef, mais ce n'est plus suffisant pour prot\u00e9ger votre r\u00e9seau. Notre exercice de recherche et de plan de protection d\u00e9montre qu'il existe des possibilit\u00e9s de contr\u00f4ler les attaques SS7 qui ignorent un tel m\u00e9canisme de s\u00e9curit\u00e9. De plus, les attaques ont tendance \u00e0 devenir laborieuses, ce qui est suppl\u00e9mentaire et difficile \u00e0 trouver \u00e0 un jeune \u00e2ge. C'est la raison pour laquelle nous pensons que les op\u00e9rateurs de t\u00e9l\u00e9phonie mobile doivent participer au suivi de la protection des connexions SS7 ext\u00e9rieures encourag\u00e9es par une base d'exposition. Dans cette discussion, j'expliquerai les nombreux aspects int\u00e9ressants de la protection des connexions SS7.<\/p>\n<h1>L'ancienne technologie SS7 et les vuln\u00e9rabilit\u00e9s modernes<\/h1>\n<p>L'ing\u00e9nierie SS7 d\u00e9pass\u00e9e aujourd'hui les vuln\u00e9rabilit\u00e9s contemporaines<\/p>\n<p>En acc\u00e9dant au SS7 et au t\u00e9l\u00e9phone d'une victime, un pirate peut \u00e9couter un dialogue, localiser une personne et intercepter des messages pour acc\u00e9der \u00e0 des solutions bancaires mobiles et envoyer une commande USSD (Unstructured Supplementary Service Data) \u00e0 une vari\u00e9t\u00e9 de t\u00e9l\u00e9phone, ainsi que d'autres attaques diverses. Il est essentiel de noter qu'il est impossible de p\u00e9n\u00e9trer directement dans le r\u00e9seau - il faut y acc\u00e9der en utilisant une passerelle SS7. Cependant, il est facile d'acc\u00e9der \u00e0 une passerelle SS7. Un pirate peut obtenir le permis de l'op\u00e9rateur dans certains endroits ou obtenir l'acc\u00e8s par l'interm\u00e9diaire de l'\u00e9conomie d'un repr\u00e9sentant pour obtenir quelques millions de dollars. Lorsqu'il y a un ing\u00e9nieur dans une cat\u00e9gorie d'utilisateurs, il va bient\u00f4t pouvoir mener une s\u00e9rie d'attaques en utilisant des commandes ou en combinant avec leurs programmes dans SS7. Il existe diff\u00e9rentes proc\u00e9dures pour p\u00e9n\u00e9trer dans un quartier r\u00e9sidentiel \u00e0 l'aide d'un \u00e9quipement de transport cir\u00e9, d'un GGSN (Gateway GPRS (General Packet services Radio) Service Node), ou m\u00eame d'une femtocellule.<\/p>\n<p>&nbsp;<\/p>\n<p>Les attaques SS7 peuvent \u00eatre men\u00e9es de n'importe o\u00f9 et l'attaquant n'a pas besoin d'\u00eatre \u00e0 proximit\u00e9 de l'abonn\u00e9, de sorte qu'il est impossible de le localiser. Le pirate n'a plus int\u00e9r\u00eat \u00e0 \u00eatre un expert. Il existe des fins de SS7 autour du web, et les op\u00e9rateurs de t\u00e9l\u00e9phonie mobile ne seront plus comp\u00e9tents pour endiguer les commandes en raison de ce redoutable poss\u00e9der un impact avec la violation des fondamentaux qui d\u00e9rivent et cela pourrait se produire sur un fournisseur.<\/p>\n<p>&nbsp;<\/p>\n<p>Les possibilit\u00e9s de signalisation ouvrent la voie \u00e0 plusieurs attaques. Par exemple, les contr\u00f4les MAP (Mobile Application Part) de SS7 permettent \u00e0 un t\u00e9l\u00e9phone portable d'\u00eatre obstru\u00e9 hors de l'espace. Les probl\u00e8mes li\u00e9s \u00e0 la s\u00e9curit\u00e9 du SS7 mettent en danger non seulement les abonn\u00e9s \u00e0 la t\u00e9l\u00e9phonie cellulaire, mais aussi un \u00e9cosyst\u00e8me croissant d'appareils industriels et IoT (World Wide Web of Matters) - des distributeurs automatiques de billets (ATM) aux dispositifs de contr\u00f4le de la pression de l'essence GSM (Global System for Mobile communications) - qui sont \u00e9galement vus, les abonn\u00e9s au voisinage local cellulaire.<\/p>\n<p>&nbsp;<\/p>\n<p>Par cons\u00e9quent, la protection du SS7 est l'une des priorit\u00e9s dans le cadre de la mise en place d'une d\u00e9fense internationale. La protection de ce SS7 de taille moyenne contre les attaques est devenue une tendance plus s\u00e9curitaire chez les op\u00e9rateurs t\u00e9l\u00e9phoniques au cours des derni\u00e8res ann\u00e9es. Un grand nombre d'op\u00e9rateurs reconfigurent les programmes de r\u00e9seau en utilisant une protection de base et mettent en place pour influencer les options de routage de la maison SMS, quelques-uns d'entre eux ajoutent des pare-feux SS7 de force. Voici les moyens de r\u00e9sister aux attaques SS7 de base, mais ce n'est pas suffisant pour se prot\u00e9ger.<\/p>\n<p>&nbsp;<\/p>\n<p>La communaut\u00e9 dans son ensemble. Les \u00e9valuations de base de la s\u00e9curit\u00e9 et nos recherches montrent qu'il est possible de servir les attaques SS7 en utilisant ce type de m\u00e9canisme de s\u00e9curit\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<p>Une attaque r\u00e9elle a tendance \u00e0 \u00eatre plus silencieuse et plus furtive, il est donc difficile de la rep\u00e9rer. C'est la raison pour laquelle nous souhaitons que les op\u00e9rateurs cellulaires disposent d'une observation de la s\u00e9curit\u00e9 des discussions sur les connexions SS7 ext\u00e9rieures encourag\u00e9es par une base d'exposition.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction : Comme nous pouvons facilement le constater, de nombreux op\u00e9rateurs de t\u00e9l\u00e9phonie mobile prot\u00e8gent leur marge SS7 en reconfigurant les instruments du r\u00e9seau et en mettant en \u0153uvre des solutions de routage des m\u00e9nages par SMS. Cela pourrait \u00eatre le moyen de faire face aux principales attaques SS7, mais ce n'est plus suffisant pour prot\u00e9ger votre r\u00e9seau. Nos recherches et nos plans de protection d\u00e9montrent qu'il existe des opportunit\u00e9s...<\/p>","protected":false},"author":1,"featured_media":1735,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68,70,69,1],"tags":[],"class_list":["post-476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-call-interception","category-location-tracking","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Old SS7 technology now the modern Vulnerabilities<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/fr\/ss7-sms\/lancienne-technologie-ss7-maintenant-les-vulnerabilites-modernes\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Old SS7 technology now the modern Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Introduction: Since we can easily see, many mobile operators shield their SS7 margin via re-configuring network instruments and Implementing SMS household Routing remedies. This could be the means to come up with chief SS7 attacks, but it&#8217;s not any longer sufficient to safeguard your network. Our search and protection plan exercise demonstrate there are opportunities...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/fr\/ss7-sms\/lancienne-technologie-ss7-maintenant-les-vulnerabilites-modernes\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-09T05:12:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Old SS7 technology now the modern Vulnerabilities\",\"datePublished\":\"2024-07-09T05:12:10+00:00\",\"dateModified\":\"2024-09-05T09:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\",\"articleSection\":[\"Call Interception\",\"Location Tracking\",\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\",\"url\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\",\"name\":\"Old SS7 technology now the modern Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\",\"datePublished\":\"2024-07-09T05:12:10+00:00\",\"dateModified\":\"2024-09-05T09:47:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\",\"width\":900,\"height\":507},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Old SS7 technology now the modern Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"L'ancienne technologie SS7 et les vuln\u00e9rabilit\u00e9s modernes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/fr\/ss7-sms\/lancienne-technologie-ss7-maintenant-les-vulnerabilites-modernes\/","og_locale":"fr_FR","og_type":"article","og_title":"Old SS7 technology now the modern Vulnerabilities","og_description":"Introduction: Since we can easily see, many mobile operators shield their SS7 margin via re-configuring network instruments and Implementing SMS household Routing remedies. This could be the means to come up with chief SS7 attacks, but it&#8217;s not any longer sufficient to safeguard your network. Our search and protection plan exercise demonstrate there are opportunities...","og_url":"https:\/\/sms-txt.net\/fr\/ss7-sms\/lancienne-technologie-ss7-maintenant-les-vulnerabilites-modernes\/","og_site_name":"SS7 Hacking","article_published_time":"2024-07-09T05:12:10+00:00","article_modified_time":"2024-09-05T09:47:44+00:00","og_image":[{"width":900,"height":507,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Old SS7 technology now the modern Vulnerabilities","datePublished":"2024-07-09T05:12:10+00:00","dateModified":"2024-09-05T09:47:44+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/"},"wordCount":635,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","articleSection":["Call Interception","Location Tracking","SMS Intercept","SS7"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/","url":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/","name":"L'ancienne technologie SS7 et les vuln\u00e9rabilit\u00e9s modernes","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","datePublished":"2024-07-09T05:12:10+00:00","dateModified":"2024-09-05T09:47:44+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","width":900,"height":507},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Old SS7 technology now the modern Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Piratage du SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/comments?post=476"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/476\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/media\/1735"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/media?parent=476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/categories?post=476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/tags?post=476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}