{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"ss7-atakos","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/lt\/ss7-sms\/ss7-atakos\/","title":{"rendered":"SS7 atakos"},"content":{"rendered":"<h1>SS7 atakos<\/h1>\n<p>Kaip ir daugelio kit\u0173 sen\u0173j\u0173 protokol\u0173 atveju, SS7 buvo kuriamas menkai u\u017etikrinant saugum\u0105. Tokios s\u0105vokos, kaip autenti\u0161kumo patvirtinimas ir autorizacija, beveik nebuvo naudojamos ir aptariamos. SS7 saugumas buvo grind\u017eiamas tik pasitik\u0117jimu. Pagrindiniai tinklo elementai buvo sukurti atitinkamai, o apsaugos nuo piktnaud\u017eiavimo SS7 funkcijomis buvo ma\u017eai arba visai nebuvo. Kadangi SS7 laikomas u\u017edaru tinklu, atlikta labai ma\u017eai saugumo tyrim\u0173 SS7 saugumui \u012fvertinti. Saugumo tyr\u0117jai netur\u0117jo prieigos prie SS7 tinkl\u0173, o paslaug\u0173 teik\u0117jai buvo ma\u017eai suinteresuoti nagrin\u0117ti \u0161i\u0105 tem\u0105.<\/p>\n<p>Ta\u010diau SS7 tinklas neb\u0117ra u\u017edaras. Tinklo teik\u0117jai atveria savo SS7 tinklus tre\u010diosioms \u0161alims kaip savo komercini\u0173 pasi\u016blym\u0173 dal\u012f. Tokie tinklo elementai, kaip antai \"Femtocells\", palieka u\u017edaras operatori\u0173 ribas ir yra dislokuoti nepatikimose vietose; \u012fsilau\u017e\u0117liai gali rasti b\u016bd\u0173 patekti \u012f mobiliojo ry\u0161io operatori\u0173 tinklus, be to, reikia pamin\u0117ti, kad kai kuriuos operatorius gali kontroliuoti nacionalin\u0117s valstyb\u0117s, turin\u010dios piktavali\u0161k\u0173 ketinim\u0173 piktnaud\u017eiauti tokiais nesaugiais tinklais.<\/p>\n<p>Piktnaud\u017eiavimas SS7 nesaugumu gali tur\u0117ti rimt\u0173 pasekmi\u0173; protokolo pob\u016bdis leid\u017eia pasiekti toki\u0105 informacij\u0105, kaip naudotojo buvimo vieta ir skambu\u010di\u0173 \/ SMS informacija. Finansin\u0117s paslaugos ir autenti\u0161kumo nustatymo sistemos buvo kuriamos remiantis pasitik\u0117jimu toki\u0173 protokol\u0173 teikiamomis paslaugomis. Paslaug\u0173 atsisakymo atakos, kuriomis piktnaud\u017eiaujama \u0161iais nesaugumo principais, gali b\u016bti pra\u017e\u016btingos valstybi\u0173 telekomunikacij\u0173 infrastrukt\u016brai.<\/p>\n<p>Kituose skyriuose nagrin\u0117sime kai kurias atakas, kurios buvo paskelbtos prie\u0161 SS7, tik\u0117damiesi i\u0161analizuoti tr\u016bkstamas kontrol\u0117s priemones ir galiausiai pasi\u016blyti tam tikras kontrol\u0117s priemones, galin\u010dias apriboti \u0161i\u0173 atak\u0173 poveik\u012f. \u0160iuose skyriuose daug remiamasi saugumo tyr\u0117j\u0173 Tobiaso Engelio ir Karsteno Nohlio atliktu darbu skambu\u010di\u0173 ir SMS per\u0117mimo, buvimo vietos sekimo, suk\u010diavimo ir atsisakymo aptarnauti srityse.<\/p>\n<h2>Skambu\u010di\u0173 ir SMS per\u0117mimas<\/h2>\n<p>Ry\u0161i\u0173 per\u0117mimas visada buvo svarbiausias bet koki\u0173 \u0161nipin\u0117jimo operacij\u0173 tikslas. Senaisiais laidini\u0173 telefon\u0173 laikais u\u017epuolikui reik\u0117jo fizi\u0161kai prisijungti prie laido, kad gal\u0117t\u0173 klausytis vykstan\u010dio pokalbio.<br \/>\nMobiliojo ry\u0161io am\u017eiuje skambutis tarp skambinan\u010di\u0173j\u0173 \u0161ali\u0173 ir mobiliojo ry\u0161io tinkl\u0173 perduodamas radijo ry\u0161iu. Paprastai duomen\u0173 srautas per oro s\u0105saj\u0105 yra \u0161ifruojamas. \u0160ifravimas atliekamas naudojant A5\/1 arba A5\/3 protokolus. Neseniai A5\/1 paketas buvo sulau\u017eytas ir per oro s\u0105saj\u0105 perduodamus skambu\u010dius galima i\u0161\u0161ifruoti naudojant pigius radijo per\u0117m\u0117jus ir vaivoryk\u0161t\u0117s lenteles (Nohl, Munant, 2010). Kaip<br \/>\ntod\u0117l operatoriai prad\u0117jo diegti stipresn\u012f \u0161ifravimo protokol\u0105 A5\/3, kad gal\u0117t\u0173 kovoti su tokiomis atakomis.<\/p>\n<p>Ta\u010diau neseniai atskleistos SS7 pa\u017eeid\u017eiamosios vietos atveria daugyb\u0119 galimybi\u0173, kurios palengvina mobiliuoju tinklu perduodam\u0173 skambu\u010di\u0173 ir SMS per\u0117mim\u0105.<\/p>","protected":false},"excerpt":{"rendered":"<p>SS7 atakos Kaip ir daugelis kit\u0173 sen\u0173j\u0173 protokol\u0173, SS7 buvo kuriamas ma\u017eai atsi\u017evelgiant \u012f saugum\u0105. Tokios s\u0105vokos, kaip autenti\u0161kumo patvirtinimas ir autorizacija, beveik nebuvo naudojamos ir aptariamos. SS7 saugumas buvo grind\u017eiamas tik pasitik\u0117jimu. Pagrindiniai tinklo elementai buvo sukurti atitinkamai, o apsaugos nuo piktnaud\u017eiavimo SS7 funkcijomis priemoni\u0173 buvo ma\u017eai arba visai nebuvo. Laikomas u\u017edaru...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/lt\/ss7-sms\/ss7-atakos\/\" \/>\n<meta property=\"og:locale\" content=\"lt_LT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/lt\/ss7-sms\/ss7-atakos\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"lt-LT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"lt-LT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lt-LT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lt-LT\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7 atakos","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/lt\/ss7-sms\/ss7-atakos\/","og_locale":"lt_LT","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/lt\/ss7-sms\/ss7-atakos\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"lt-LT"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"SS7 atakos","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"lt-LT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 \u012fsilau\u017eimas","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lt-LT"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"lt-LT","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/lt\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}