{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"ss7-tamadasok","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/hu\/ss7-sms\/ss7-tamadasok\/","title":{"rendered":"SS7 t\u00e1mad\u00e1sok"},"content":{"rendered":"<h1>SS7 t\u00e1mad\u00e1sok<\/h1>\n<p>Mint sok r\u00e9gi protokollt, az SS7-et is \u00fagy tervezt\u00e9k, hogy kev\u00e9ss\u00e9 volt tekintettel a biztons\u00e1gra. Az olyan fogalmak, mint a hiteles\u00edt\u00e9s \u00e9s az enged\u00e9lyez\u00e9s, alig voltak jelen, illetve alig ker\u00fcltek megvitat\u00e1sra. Az SS7 biztons\u00e1ga kiz\u00e1r\u00f3lag a bizalmon alapult. Az alapvet\u0151 h\u00e1l\u00f3zati elemeket ennek megfelel\u0151en \u00e9p\u00edtett\u00e9k fel, \u00e9s az SS7 funkci\u00f3ival val\u00f3 vissza\u00e9l\u00e9ssel szemben kev\u00e9s, vagy egy\u00e1ltal\u00e1n nem volt v\u00e9delem. Mivel az SS7 z\u00e1rt h\u00e1l\u00f3zatnak min\u0151s\u00fcl, nagyon kev\u00e9s biztons\u00e1gi kutat\u00e1st v\u00e9geztek az SS7 biztons\u00e1g\u00e1nak \u00e9rt\u00e9kel\u00e9s\u00e9re. A biztons\u00e1gi kutat\u00f3k nem f\u00e9rhettek hozz\u00e1 az SS7-h\u00e1l\u00f3zatokhoz, \u00e9s a szolg\u00e1ltat\u00f3k sem voltak \u00e9rdekeltek a t\u00e9ma vizsg\u00e1lat\u00e1ban.<\/p>\n<p>Az SS7 h\u00e1l\u00f3zat azonban m\u00e1r nem z\u00e1rt. A h\u00e1l\u00f3zati szolg\u00e1ltat\u00f3k kereskedelmi k\u00edn\u00e1latuk r\u00e9szek\u00e9nt megnyitj\u00e1k SS7-h\u00e1l\u00f3zataikat harmadik felek sz\u00e1m\u00e1ra. Az olyan h\u00e1l\u00f3zati elemek, mint p\u00e9ld\u00e1ul a femtocell\u00e1k, elhagyj\u00e1k a szolg\u00e1ltat\u00f3k z\u00e1rt hat\u00e1rait, \u00e9s nem megb\u00edzhat\u00f3 helyeken helyezkednek el; a hackerek utat tal\u00e1lhatnak a mobilszolg\u00e1ltat\u00f3k h\u00e1l\u00f3zataiba, \u00e9s nem kell megeml\u00edteni, hogy egyes szolg\u00e1ltat\u00f3k nemzet\u00e1llamok ellen\u0151rz\u00e9se alatt \u00e1llhatnak, amelyek rosszindulat\u00fa sz\u00e1nd\u00e9kkal vissza\u00e9lnek az ilyen nem biztons\u00e1gos h\u00e1l\u00f3zatokkal.<\/p>\n<p>Az SS7 bizonytalans\u00e1g\u00e1val val\u00f3 vissza\u00e9l\u00e9s s\u00falyos k\u00f6vetkezm\u00e9nyekkel j\u00e1rhat; a protokoll jellege lehet\u0151v\u00e9 teszi az olyan inform\u00e1ci\u00f3khoz val\u00f3 hozz\u00e1f\u00e9r\u00e9st, mint a felhaszn\u00e1l\u00f3 tart\u00f3zkod\u00e1si helye \u00e9s a h\u00edv\u00e1s\/SMS adatai. A p\u00e9nz\u00fcgyi szolg\u00e1ltat\u00e1sok \u00e9s a hiteles\u00edt\u00e9si rendszerek az ilyen protokollok \u00e1ltal ny\u00fajtott szolg\u00e1ltat\u00e1sok ir\u00e1nti bizalomra \u00e9p\u00fcltek. A szolg\u00e1ltat\u00e1smegtagad\u00e1si t\u00e1mad\u00e1sok, amelyek vissza\u00e9lnek ezekkel a bizonytalans\u00e1gokkal, puszt\u00edt\u00f3 hat\u00e1ssal lehetnek a nemzetek t\u00e1vk\u00f6zl\u00e9si infrastrukt\u00far\u00e1j\u00e1ra.<\/p>\n<p>A k\u00f6vetkez\u0151 szakaszokban megvizsg\u00e1lunk n\u00e9h\u00e1ny SS7 ellen bejelentett t\u00e1mad\u00e1st, abban a rem\u00e9nyben, hogy elemezz\u00fck a hi\u00e1nyz\u00f3 ellen\u0151rz\u00e9seket, \u00e9s v\u00e9g\u00fcl olyan ellen\u0151rz\u00e9seket javasolunk, amelyek korl\u00e1tozhatj\u00e1k e t\u00e1mad\u00e1sok hat\u00e1s\u00e1t. Ezek a szakaszok nagym\u00e9rt\u00e9kben t\u00e1maszkodnak Tobias Engel \u00e9s Karsten Nohl biztons\u00e1gi kutat\u00f3k \u00e1ltal a h\u00edv\u00e1sok \u00e9s SMS-ek lehallgat\u00e1sa, a helymeghat\u00e1roz\u00e1s, a csal\u00e1s \u00e9s a szolg\u00e1ltat\u00e1smegtagad\u00e1s ter\u00fclet\u00e9n v\u00e9gzett munk\u00e1ra.<\/p>\n<h2>H\u00edv\u00e1s- \u00e9s SMS-lehallgat\u00e1s<\/h2>\n<p>A kommunik\u00e1ci\u00f3 lehallgat\u00e1sa mindig is a k\u00e9mked\u00e9si m\u0171veletek v\u00e9gs\u0151 c\u00e9lpontja volt. A r\u00e9gi, vezet\u00e9kes telefonok idej\u00e9n a t\u00e1mad\u00f3nak fizikailag kellett lehallgatnia a vezet\u00e9ket, hogy lehallgathasson egy folyamatban l\u00e9v\u0151 h\u00edv\u00e1st.<br \/>\nA mobilkommunik\u00e1ci\u00f3 kor\u00e1ban a h\u00edv\u00e1st r\u00e1di\u00f3n kereszt\u00fcl tov\u00e1bb\u00edtj\u00e1k a h\u00edv\u00f3 felek \u00e9s a mobilh\u00e1l\u00f3zatok k\u00f6z\u00f6tt. \u00c1ltal\u00e1ban a forgalom titkos\u00edtva van a l\u00e9gi interf\u00e9szen kereszt\u00fcl. A titkos\u00edt\u00e1s A5\/1 vagy A5\/3 protokollok seg\u00edts\u00e9g\u00e9vel t\u00f6rt\u00e9nik. Nemr\u00e9giben az A5\/1-es csomagot felt\u00f6rt\u00e9k, \u00e9s olcs\u00f3 r\u00e1di\u00f3s elfog\u00f3k \u00e9s sziv\u00e1rv\u00e1nyt\u00e1bl\u00e1k seg\u00edts\u00e9g\u00e9vel visszafejthet\u0151k a l\u00e9gi interf\u00e9szen kereszt\u00fcl tov\u00e1bb\u00edtott h\u00edv\u00e1sok (Nohl, Munant, 2010). Mivel a<br \/>\nEnnek eredm\u00e9nyek\u00e9ppen az \u00fczemeltet\u0151k elkezdt\u00e9k bevezetni az er\u0151sebb A5\/3 titkos\u00edt\u00e1si protokollt az ilyen t\u00e1mad\u00e1sok lek\u00fczd\u00e9s\u00e9re.<\/p>\n<p>A nemr\u00e9giben nyilv\u00e1noss\u00e1gra hozott SS7 sebezhet\u0151s\u00e9gek azonban t\u00f6bb olyan lehet\u0151s\u00e9get is nyitottak, amelyek megk\u00f6nny\u00edtik a mobilh\u00e1l\u00f3zaton kereszt\u00fcl tov\u00e1bb\u00edtott h\u00edv\u00e1sok \u00e9s SMS-ek lehallgat\u00e1s\u00e1t.<\/p>","protected":false},"excerpt":{"rendered":"<p>SS7-t\u00e1mad\u00e1sok Mint sok r\u00e9gi protokollt, az SS7-et is kev\u00e9s biztons\u00e1gi szempontot figyelembe v\u00e9ve tervezt\u00e9k. Az olyan fogalmak, mint a hiteles\u00edt\u00e9s \u00e9s az enged\u00e9lyez\u00e9s, alig voltak jelen, illetve alig ker\u00fcltek megvitat\u00e1sra. Az SS7 biztons\u00e1ga kiz\u00e1r\u00f3lag a bizalmon alapult. Az alapvet\u0151 h\u00e1l\u00f3zati elemeket ennek megfelel\u0151en \u00e9p\u00edtett\u00e9k fel, \u00e9s az SS7 funkci\u00f3ival val\u00f3 vissza\u00e9l\u00e9ssel szemben kev\u00e9s, vagy egy\u00e1ltal\u00e1n nem volt v\u00e9delem. Mivel a h\u00e1l\u00f3zatot z\u00e1rt...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/hu\/ss7-sms\/ss7-tamadasok\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/hu\/ss7-sms\/ss7-tamadasok\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"hu-HU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"hu-HU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu-HU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu-HU\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7 t\u00e1mad\u00e1sok","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/hu\/ss7-sms\/ss7-tamadasok\/","og_locale":"hu_HU","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/hu\/ss7-sms\/ss7-tamadasok\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"hu-HU"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"SS7 t\u00e1mad\u00e1sok","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"hu-HU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 Hacking","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu-HU"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"hu-HU","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}