{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"ss7-uzbrukumi","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/lv\/ss7-sms\/ss7-uzbrukumi\/","title":{"rendered":"SS7 uzbrukumi"},"content":{"rendered":"<h1>SS7 uzbrukumi<\/h1>\n<p>T\u0101pat k\u0101 daudzi citi vecie protokoli, ar\u012b SS7 tika izstr\u0101d\u0101ts, maz dom\u0101jot par dro\u0161\u012bbu. T\u0101di j\u0113dzieni k\u0101 autentifik\u0101cija un autoriz\u0101cija tikpat k\u0101 netika iek\u013cauti vai apspriesti. SS7 dro\u0161\u012bba balst\u012bj\u0101s tikai uz uztic\u0113\u0161anos. T\u012bkla pamatelementi tika veidoti atbilsto\u0161i, un tajos bija maz vai pat nek\u0101das aizsardz\u012bbas pret SS7 funkciju \u013caunpr\u0101t\u012bgu izmanto\u0161anu. T\u0101 k\u0101 SS7 tiek uzskat\u012bts par sl\u0113gtu t\u012bklu, ir veikts \u013coti maz dro\u0161\u012bbas p\u0113t\u012bjumu, lai nov\u0113rt\u0113tu SS7 dro\u0161\u012bbu. Dro\u0161\u012bbas p\u0113tniekiem nebija piek\u013cuves SS7 t\u012bkliem, un pakalpojumu sniedz\u0113ji bija maz ieinteres\u0113ti p\u0113t\u012bt \u0161o tematu.<\/p>\n<p>Ta\u010du SS7 t\u012bkls vairs nav sl\u0113gts. T\u012bkla pakalpojumu sniedz\u0113ji atver savus SS7 t\u012bklus tre\u0161\u0101m person\u0101m k\u0101 da\u013cu no saviem komerci\u0101lajiem pied\u0101v\u0101jumiem. T\u012bkla elementi, piem\u0113ram, Femtocells, atst\u0101j operatoru sl\u0113gt\u0101s robe\u017eas un atrodas neuzticam\u0101s viet\u0101s; hakeri var atrast iesp\u0113ju iek\u013c\u016bt mobilo sakaru operatoru t\u012bklos, un ir j\u0101piemin, ka da\u017eus operatorus var kontrol\u0113t nacion\u0101las valstis ar \u013caunpr\u0101t\u012bgiem nodomiem izmantot \u0161\u0101dus nedro\u0161us t\u012bklus.<\/p>\n<p>SS7 nedro\u0161\u012bbas \u013caunpr\u0101t\u012bga izmanto\u0161ana var rad\u012bt nopietnas sekas; protokola b\u016bt\u012bba \u013cauj piek\u013c\u016bt t\u0101dai inform\u0101cijai k\u0101 lietot\u0101ja atra\u0161an\u0101s vieta un zvanu\/SMS inform\u0101cija. Finan\u0161u pakalpojumi un autentifik\u0101cijas sist\u0113mas tika veidotas, pamatojoties uz uztic\u0113\u0161anos \u0161\u0101du protokolu sniegtajiem pakalpojumiem. Pakalpojumu atteikuma atteikuma uzbrukumi, \u013caunpr\u0101t\u012bgi izmantojot \u0161os nedro\u0161\u012bbas elementus, var b\u016bt posto\u0161i valstu telekomunik\u0101ciju infrastrukt\u016brai.<\/p>\n<p>Turpm\u0101kaj\u0101s sada\u013c\u0101s m\u0113s apl\u016bkosim da\u017eus no uzbrukumiem, kas tika izzi\u0146oti pret SS7, cer\u012bb\u0101 analiz\u0113t tr\u016bksto\u0161\u0101s kontroles un galu gal\u0101 ierosin\u0101t da\u017eas kontroles, kas var ierobe\u017eot \u0161o uzbrukumu ietekmi. \u0160aj\u0101s sada\u013c\u0101s liel\u0101 m\u0113r\u0101 tiek izmantots dro\u0161\u012bbas p\u0113tnieku Tobias Engel un Karsten Nohl veiktais darbs zvanu un SMS p\u0101rtver\u0161anas, atra\u0161an\u0101s vietas izseko\u0161anas, kr\u0101p\u0161anas un pakalpojuma atteikuma jom\u0101.<\/p>\n<h2>Zvanu un SMS p\u0101rtver\u0161ana<\/h2>\n<p>Sakaru p\u0101rtver\u0161ana vienm\u0113r ir bijusi galvenais m\u0113r\u0137is jebkurai spiego\u0161anas oper\u0101cijai. Vecajos laikos, kad tika izmantoti vadu telefoni, uzbruc\u0113jam bija fiziski j\u0101pieskaras vadam, lai var\u0113tu noklaus\u012bties notieko\u0161o sarunu.<br \/>\nMobilo sakaru laikmet\u0101 izsaukums starp izsauco\u0161aj\u0101m pus\u0113m un mobilo sakaru t\u012bkliem tiek p\u0101rraid\u012bts pa radio. Parasti datpl\u016bsma tiek \u0161ifr\u0113ta, izmantojot gaisa saskarni. \u0160ifr\u0113\u0161anu veic, izmantojot A5\/1 vai A5\/3 protokolus. Nesen A5\/1 protokols ir lauzts, un ir iesp\u0113jams at\u0161ifr\u0113t pa gaisa saskarni p\u0101rs\u016bt\u012btos zvanus, izmantojot l\u0113tus radio p\u0101rtv\u0113r\u0113jus un varav\u012bksnes tabulas (Nohl, Munant, 2010). T\u0101 k\u0101<br \/>\nt\u0101p\u0113c operatori s\u0101ka ieviest sp\u0113c\u012bg\u0101ku \u0161ifr\u0113\u0161anas protokolu A5\/3, lai c\u012bn\u012btos pret \u0161\u0101diem uzbrukumiem.<\/p>\n<p>Tom\u0113r nesen atkl\u0101t\u0101s SS7 ievainojam\u012bbas pav\u0113ra vair\u0101kas iesp\u0113jas, kas atvieglo pa mobilo sakaru t\u012bklu p\u0101rraid\u012bto zvanu un SMS p\u0101rtver\u0161anu.<\/p>","protected":false},"excerpt":{"rendered":"<p>SS7 uzbrukumi T\u0101pat k\u0101 daudzi citi vecie protokoli, ar\u012b SS7 tika izstr\u0101d\u0101ts, maz dom\u0101jot par dro\u0161\u012bbu. T\u0101di j\u0113dzieni k\u0101 autentifik\u0101cija un autoriz\u0101cija gandr\u012bz netika iek\u013cauti vai apspriesti. SS7 dro\u0161\u012bba balst\u012bj\u0101s tikai uz uztic\u0113\u0161anos. T\u012bkla pamatelementi tika veidoti atbilsto\u0161i, un tajos bija maz vai pat nek\u0101das aizsardz\u012bbas pret SS7 funkciju \u013caunpr\u0101t\u012bgu izmanto\u0161anu. T\u0101 k\u0101 SS7 tika uzskat\u012bts par sl\u0113gtu...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/lv\/ss7-sms\/ss7-uzbrukumi\/\" \/>\n<meta property=\"og:locale\" content=\"lv_LV\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/lv\/ss7-sms\/ss7-uzbrukumi\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"lv\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"lv\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lv\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"lv\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7 uzbrukumi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/lv\/ss7-sms\/ss7-uzbrukumi\/","og_locale":"lv_LV","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/lv\/ss7-sms\/ss7-uzbrukumi\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"lv"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"SS7 uzbrukumi","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"lv","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 uzlau\u0161ana","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lv"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"lv","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/lv\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}