{"id":385,"date":"2024-02-05T18:45:11","date_gmt":"2024-02-05T15:45:11","guid":{"rendered":"https:\/\/sms-txt.net\/?p=385"},"modified":"2024-09-05T12:45:33","modified_gmt":"2024-09-05T09:45:33","slug":"hogyan-hasznaljak-az-ss7-protokollt-a-hackelesben","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/hu\/sms-elfogasa\/hogyan-hasznaljak-az-ss7-protokollt-a-hackelesben\/","title":{"rendered":"Hogyan haszn\u00e1lj\u00e1k az SS7 protokollt a hackel\u00e9sben?"},"content":{"rendered":"<p>A hackerek vissza\u00e9lnek a <strong>SS7<\/strong> protokoll a kibert\u00e1mad\u00e1sokhoz. N\u00e9metorsz\u00e1gban a hackerek gyakrabban alkalmaznak malware-t\u00e1mad\u00e1sokat, amint arr\u00f3l a k\u00fcl\u00f6nb\u00f6z\u0151 h\u00edrad\u00e1sokb\u00f3l \u00e9rtes\u00fclhett\u00fcnk. A hackerek ezekkel a kibert\u00e1mad\u00e1sokkal a banksz\u00e1ml\u00e1k, jelszavak, sz\u00e1mlaegyenlegek \u00e9s bejelentkez\u00e9si adatok adatait haszn\u00e1lj\u00e1k ki.<\/p>\n<p>R\u00e1ad\u00e1sul a leg\u00fajabb hacker technik\u00e1kkal k\u00e9pesek voltak \u00e1tir\u00e1ny\u00edtani a banki \u00fczeneteket a tranzakci\u00f3 r\u00e9szletei\u00e9rt. Sikeresen tranzakci\u00f3t hajtanak v\u00e9gre a c\u00e9lsz\u00e1ml\u00e1kr\u00f3l.<\/p>\n<h2>Mi az SS7?<\/h2>\n<p>Az SS7-et 1975-ben vezett\u00e9k be a mobilok \u00f6sszekapcsol\u00e1s\u00e1ra. <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/ss7-attacks\/\">SS7<\/a> kezeli az egyik mobiltelefonr\u00f3l a m\u00e1sikra ir\u00e1nyul\u00f3 h\u00edv\u00e1sokat \u00e9s \u00fczeneteket. Ezt csak mobilh\u00e1l\u00f3zatokban val\u00f3 haszn\u00e1latra tervezt\u00e9k. K\u00e9s\u0151bb azonban a sebezhet\u0151s\u00e9ggel kapcsolatos sz\u00e1mos probl\u00e9ma kezd jelent\u0151sen felmer\u00fclni. A sebezhet\u0151s\u00e9g meger\u0151s\u00edt\u00e9se \u00e9rdek\u00e9ben a CBS news h\u00edrszerkeszt\u0151je tervezte, hogy megvizsg\u00e1lja ezt a sebezhet\u0151s\u00e9get.<\/p>\n<p>A h\u00f6lgy el\u0151sz\u00f6r egy \u00faj telefont v\u00e1s\u00e1rolt, \u00e9s azt az \"Informatikai Ellen\u0151rz\u0151 Bizotts\u00e1g\" egyik tagj\u00e1nak adta, Lieu a telefont a bizotts\u00e1gi tagokkal val\u00f3 szok\u00e1sos kommunik\u00e1ci\u00f3j\u00e1ra haszn\u00e1lta. A h\u00f6lgy a biztons\u00e1gi kutat\u00f3labor seg\u00edts\u00e9g\u00e9vel k\u00e9pes volt nyomon k\u00f6vetni Lieu telefonh\u00edv\u00e1sait. \u00cdgy meger\u0151s\u00edtette az SS7 protokoll kihaszn\u00e1l\u00e1s\u00e1t a h\u00edv\u00e1sok felt\u00f6r\u00e9s\u00e9hez. S\u0151t, a tart\u00f3zkod\u00e1si hely\u00e9t is le tudt\u00e1k vonni, annak ellen\u00e9re, hogy a GPS ki volt kapcsolva.<\/p>\n<h2>Mit tehetnek a hackerek az SS7-hez val\u00f3 hozz\u00e1f\u00e9r\u00e9ssel?<\/h2>\n<p>Mivel a rosszindulat\u00fa programok t\u00e1mad\u00e1sai az oper\u00e1ci\u00f3s rendszerek er\u0151ss\u00e9g\u00e9t\u0151l f\u00fcggenek. Teh\u00e1t a gyenge oper\u00e1ci\u00f3s rendszerrel rendelkez\u0151 mobileszk\u00f6z\u00f6k hajlamosabbak a kibert\u00e1mad\u00e1sokra. Ilyenek p\u00e9ld\u00e1ul a BlackBerry, az Androidok \u00e9s a Windows Mobilok. Ez azt jelenti, hogy a mobilok min\u0151s\u00e9ge a biztons\u00e1g szempontj\u00e1b\u00f3l is az oper\u00e1ci\u00f3s rendszerek er\u0151ss\u00e9g\u00e9t\u0151l f\u00fcgg. Az SS7 protokoll minden mobilban jelen van, az alacsony min\u0151s\u00e9gt\u0151l a magas min\u0151s\u00e9gig.<\/p>\n<h2>Hogyan v\u00e9dekezhetek az SS7-en kereszt\u00fcl t\u00f6rt\u00e9n\u0151 szimatol\u00e1s ellen?<\/h2>\n<p>Van egy egyszer\u0171 \u00e9s k\u00f6nny\u0171 m\u00f3dja annak, hogy megv\u00e9dje mobilj\u00e1t a kibert\u00e1mad\u00e1sokt\u00f3l. A legjobb m\u00f3dja ennek az, ha elker\u00fclj\u00fck a szolg\u00e1ltat\u00e1sok haszn\u00e1lat\u00e1t. Amit a mobilszolg\u00e1ltat\u00f3 biztos\u00edt. Haszn\u00e1ljon b\u00e1rmelyik internetes hangalap\u00fa alkalmaz\u00e1st. Ezek az alkalmaz\u00e1sok k\u00f6z\u00e9 tartozik a WhatsApp, az Instagram stb. De ezek is ki vannak t\u00e9ve az SS7 sebezhet\u0151s\u00e9g\u00e9nek. Sz\u00e1mos m\u00e1s lehet\u0151s\u00e9g is van, amelyekkel meg\u00f3vhatja mag\u00e1t ezekt\u0151l a kibert\u00e1mad\u00e1sokt\u00f3l.<\/p>","protected":false},"excerpt":{"rendered":"<p>A hackerek vissza\u00e9lnek az SS7 protokollal a kibert\u00e1mad\u00e1sokhoz. N\u00e9metorsz\u00e1gban a hackerek gyakrabban alkalmaznak malware-t\u00e1mad\u00e1sokat, amint arr\u00f3l a k\u00fcl\u00f6nb\u00f6z\u0151 h\u00edrad\u00e1sokb\u00f3l \u00e9rtes\u00fclhett\u00fcnk. A hackerek ezekkel a kibert\u00e1mad\u00e1sokkal a banksz\u00e1ml\u00e1k, jelszavak, sz\u00e1mlaegyenlegek \u00e9s bejelentkez\u00e9si adatok adatait haszn\u00e1lj\u00e1k ki. Ezen t\u00falmen\u0151en k\u00e9pesek lettek \u00e1tir\u00e1ny\u00edtani a banki \u00fczeneteket a tranzakci\u00f3ra vonatkoz\u00f3 figyelmeztet\u0151...<\/p>","protected":false},"author":1,"featured_media":386,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69],"tags":[],"class_list":["post-385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How SS7 Protocol is Used in Hacking?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/hu\/sms-elfogasa\/hogyan-hasznaljak-az-ss7-protokollt-a-hackelesben\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How SS7 Protocol is Used in Hacking?\" \/>\n<meta property=\"og:description\" content=\"Hackers are misusing the SS7 protocol for cyber attacks. Malware attacks are more frequently used by hackers in Germany, as has been informed by the various news articles. Hackers are exploiting the bank accounts, passwords, account balance, and logins information by these cyber-attacks. Moreover, they became able to redirect the bank message alerts for transaction...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/hu\/sms-elfogasa\/hogyan-hasznaljak-az-ss7-protokollt-a-hackelesben\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-05T15:45:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:45:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How SS7 Protocol is Used in Hacking?\",\"datePublished\":\"2024-02-05T15:45:11+00:00\",\"dateModified\":\"2024-09-05T09:45:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\"},\"wordCount\":368,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\",\"articleSection\":[\"SMS Intercept\"],\"inLanguage\":\"hu-HU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\",\"url\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\",\"name\":\"How SS7 Protocol is Used in Hacking?\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\",\"datePublished\":\"2024-02-05T15:45:11+00:00\",\"dateModified\":\"2024-09-05T09:45:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#breadcrumb\"},\"inLanguage\":\"hu-HU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu-HU\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\",\"width\":2000,\"height\":761,\"caption\":\"ss7\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How SS7 Protocol is Used in Hacking?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu-HU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu-HU\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hogyan haszn\u00e1lj\u00e1k az SS7 protokollt a hackel\u00e9sben?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/hu\/sms-elfogasa\/hogyan-hasznaljak-az-ss7-protokollt-a-hackelesben\/","og_locale":"hu_HU","og_type":"article","og_title":"How SS7 Protocol is Used in Hacking?","og_description":"Hackers are misusing the SS7 protocol for cyber attacks. Malware attacks are more frequently used by hackers in Germany, as has been informed by the various news articles. Hackers are exploiting the bank accounts, passwords, account balance, and logins information by these cyber-attacks. Moreover, they became able to redirect the bank message alerts for transaction...","og_url":"https:\/\/sms-txt.net\/hu\/sms-elfogasa\/hogyan-hasznaljak-az-ss7-protokollt-a-hackelesben\/","og_site_name":"SS7 Hacking","article_published_time":"2024-02-05T15:45:11+00:00","article_modified_time":"2024-09-05T09:45:33+00:00","og_image":[{"width":2000,"height":761,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How SS7 Protocol is Used in Hacking?","datePublished":"2024-02-05T15:45:11+00:00","dateModified":"2024-09-05T09:45:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/"},"wordCount":368,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","articleSection":["SMS Intercept"],"inLanguage":"hu-HU"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/","url":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/","name":"Hogyan haszn\u00e1lj\u00e1k az SS7 protokollt a hackel\u00e9sben?","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","datePublished":"2024-02-05T15:45:11+00:00","dateModified":"2024-09-05T09:45:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#breadcrumb"},"inLanguage":"hu-HU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"hu-HU","@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","width":2000,"height":761,"caption":"ss7"},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How SS7 Protocol is Used in Hacking?"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 Hacking","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu-HU"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"hu-HU","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/posts\/385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/media\/386"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/hu\/wp-json\/wp\/v2\/tags?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}