{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"serangan-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/id\/ss7-sms\/serangan-ss7\/","title":{"rendered":"Serangan SS7"},"content":{"rendered":"<h1>Serangan SS7<\/h1>\n<p>Seperti halnya banyak protokol lama, SS7 dirancang dengan sedikit keamanan. Konsep seperti autentikasi dan otorisasi hampir tidak ada atau dibahas. Keamanan SS7 semata-mata hanya didasarkan pada kepercayaan. Elemen jaringan inti dibangun dengan sedikit atau bahkan tidak ada pertahanan terhadap penyalahgunaan fungsi SS7. Karena dianggap sebagai jaringan tertutup, sangat sedikit penelitian keamanan yang dilakukan untuk menilai keamanan SS7. Peneliti keamanan tidak memiliki akses ke jaringan SS7, dan penyedia layanan hanya memiliki sedikit ketertarikan untuk melihat topik ini.<\/p>\n<p>Tetapi jaringan SS7 tidak lagi tertutup. Penyedia jaringan membuka jaringan SS7 mereka untuk pihak ketiga sebagai bagian dari penawaran komersial mereka. Elemen jaringan seperti Femtocells meninggalkan batas-batas tertutup operator dan berbasis di lokasi yang tidak dipercaya; peretas dapat menemukan jalan mereka ke jaringan operator seluler, dan perlu disebutkan bahwa beberapa operator mungkin berada di bawah kendali negara dengan niat jahat untuk menyalahgunakan jaringan yang tidak aman.<\/p>\n<p>Menyalahgunakan ketidakamanan SS7 dapat menimbulkan dampak yang parah; sifat protokol ini memungkinkan akses ke informasi seperti lokasi pengguna dan detail panggilan\/SMS. Layanan keuangan dan sistem otentikasi dibangun berdasarkan kepercayaan terhadap layanan yang disediakan oleh protokol tersebut. Serangan penolakan layanan yang menyalahgunakan ketidakamanan tersebut dapat menghancurkan infrastruktur telekomunikasi suatu negara.<\/p>\n<p>Pada bagian selanjutnya, kami akan memeriksa beberapa serangan yang diumumkan terhadap SS7, dengan harapan dapat menganalisis kontrol yang hilang dan akhirnya mengusulkan beberapa kontrol yang dapat membatasi efek serangan ini. Bagian ini banyak mengacu pada pekerjaan yang dilakukan oleh peneliti keamanan Tobias Engel dan Karsten Nohl di bidang penyadapan panggilan dan SMS, pelacakan lokasi, penipuan, dan penolakan layanan.<\/p>\n<h2>Intersepsi Panggilan dan SMS<\/h2>\n<p>Menyadap komunikasi selalu menjadi target utama untuk setiap operasi spionase. Di masa lalu telepon kabel, penyerang perlu menyadap kabel secara fisik untuk dapat mendengarkan panggilan yang sedang berlangsung.<br \/>\nDi era komunikasi seluler, panggilan ditransmisikan melalui radio antara pihak yang menelepon dan jaringan seluler. Biasanya lalu lintas dienkripsi melalui antarmuka udara. Enkripsi dilakukan dengan menggunakan protokol A5\/1 atau A5\/3. Baru-baru ini suite A5\/1 telah rusak dan memungkinkan untuk mendekripsi panggilan yang ditransfer melalui antarmuka udara menggunakan penyadap radio yang murah dan tabel pelangi (Nohl, Munant, 2010). Sebagai<br \/>\nAkibatnya, operator mulai meluncurkan protokol penyandian yang lebih kuat A5\/3 untuk memerangi serangan tersebut.<\/p>\n<p>Namun, kerentanan SS7 yang baru-baru ini diungkapkan membuka banyak celah yang memfasilitasi intersepsi panggilan dan SMS yang dikirimkan melalui jaringan seluler.<\/p>","protected":false},"excerpt":{"rendered":"<p>Serangan SS7 Seperti halnya banyak protokol lama, SS7 didesain dengan sedikit keamanan. Konsep-konsep seperti autentikasi dan otorisasi hampir tidak ada atau dibahas. Keamanan SS7 hanya didasarkan pada kepercayaan. Elemen-elemen jaringan inti dibangun dengan sedikit atau bahkan tidak ada pertahanan terhadap penyalahgunaan fungsi SS7. Dianggap sebagai jaringan yang tertutup...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/id\/ss7-sms\/serangan-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/id\/ss7-sms\/serangan-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"id-ID\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"id-ID\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id-ID\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id-ID\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Serangan SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/id\/ss7-sms\/serangan-ss7\/","og_locale":"id_ID","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/id\/ss7-sms\/serangan-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"id-ID"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"Serangan SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"id-ID","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Peretasan SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id-ID"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"id-ID","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/id\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}