{"id":476,"date":"2024-07-09T08:12:10","date_gmt":"2024-07-09T05:12:10","guid":{"rendered":"https:\/\/sms-txt.net\/?p=476"},"modified":"2024-09-05T12:47:44","modified_gmt":"2024-09-05T09:47:44","slug":"antiga-tecnologia-ss7-agora-as-vulnerabilidades-modernas","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/pt\/ss7-sms\/antiga-tecnologia-ss7-agora-as-vulnerabilidades-modernas\/","title":{"rendered":"A antiga tecnologia SS7 agora \u00e9 a vulnerabilidade moderna"},"content":{"rendered":"<h1>Introdu\u00e7\u00e3o:<\/h1>\n<p>Como podemos ver facilmente, muitas operadoras de telefonia m\u00f3vel protegem sua margem SS7 por meio da reconfigura\u00e7\u00e3o dos instrumentos de rede e da implementa\u00e7\u00e3o de solu\u00e7\u00f5es de roteamento dom\u00e9stico de SMS.<\/p>\n<p>Essa pode ser a maneira de enfrentar os principais ataques ao SS7, mas n\u00e3o \u00e9 mais suficiente para proteger sua rede. Nosso exerc\u00edcio de pesquisa e plano de prote\u00e7\u00e3o demonstra que h\u00e1 oportunidades para controlar os ataques ao SS7 que ignoram esse mecanismo de seguran\u00e7a. Al\u00e9m disso, os ataques t\u00eam uma tend\u00eancia a se tornarem trabalhosos, o que \u00e9 extra e dif\u00edcil de encontrar desde cedo. Essa \u00e9 a raz\u00e3o pela qual acreditamos que as operadoras de telefonia m\u00f3vel precisam participar do rastreamento da prote\u00e7\u00e3o de conex\u00f5es SS7 externas incentivadas por uma base de exposi\u00e7\u00e3o. Nesta discuss\u00e3o, explicarei os v\u00e1rios aspectos interessantes<\/p>\n<h1>A antiga tecnologia SS7 agora \u00e9 a vulnerabilidade moderna<\/h1>\n<p>Engenharia SS7 desatualizada hoje as vulnerabilidades contempor\u00e2neas<\/p>\n<p>Com acesso ao SS7 e tamb\u00e9m ao telefone de uma v\u00edtima, um invasor pode ouvir algum di\u00e1logo, identificar a localiza\u00e7\u00e3o de algu\u00e9m e interceptar mensagens para obter acesso a solu\u00e7\u00f5es banc\u00e1rias m\u00f3veis e enviar um controle USSD (Unstructured Supplementary Service Data, dados de servi\u00e7o suplementar n\u00e3o estruturado) para algum tipo de telefone, al\u00e9m de diversos ataques alfandeg\u00e1rios. \u00c9 importante observar que \u00e9 imposs\u00edvel penetrar na rede diretamente - ela deve ser acessada com o uso de um gateway SS7. No entanto, obter acesso a um gateway SS7 \u00e9 simples. Um invasor pode obter a permiss\u00e3o da operadora nos locais ou obter acesso por meio da economia de um representante para conseguir alguns milh\u00f5es de d\u00f3lares. Quando houver um engenheiro em uma categoria de usu\u00e1rio, ele logo poder\u00e1 realizar uma s\u00e9rie de ataques por meio de ordens ou combinar seus programas com o SS7. Voc\u00ea encontrar\u00e1 os respectivos procedimentos para entrar em um distrito residencial com o uso de equipamento de operadora encerado, GGSN (Gateway GPRS (General Packet services Radio) Service Node) ou at\u00e9 mesmo uma femtocell.<\/p>\n<p>&nbsp;<\/p>\n<p>Os ataques SS7 podem ser realizados de qualquer lugar e o invasor n\u00e3o precisa estar pr\u00f3ximo do assinante, portanto \u00e9 imposs\u00edvel identificar o invasor. O hacker n\u00e3o est\u00e1 mais interessado em ser um especialista. Existem prop\u00f3sitos para o SS7 em toda a web, e as operadoras de telefonia m\u00f3vel n\u00e3o ser\u00e3o mais competentes para represar pedidos devido a esse terr\u00edvel impacto com a viola\u00e7\u00e3o dos fundamentos que est\u00e3o \u00e0 deriva e isso pode acontecer em um provedor.<\/p>\n<p>&nbsp;<\/p>\n<p>As chances de sinaliza\u00e7\u00e3o s\u00e3o abertas para v\u00e1rios ataques. Por exemplo, os controles SS7 MAP (Mobile Application Part) permitem que um telefone celular fique obstru\u00eddo fora do espa\u00e7o. Os problemas com a seguran\u00e7a do SS7 colocam em risco n\u00e3o apenas os assinantes de telefonia celular, mas tamb\u00e9m um ecossistema crescente de aparelhos industriais e de IoT (World Wide Web of Matters) - por meio de ATMs (Automatic TellerDevice) em arranjos de controladores de press\u00e3o de gasolina GSM (Global System for Mobile communications) que tamb\u00e9m s\u00e3o vistos como assinantes de vizinhan\u00e7a local celular.<\/p>\n<p>&nbsp;<\/p>\n<p>Consequentemente, a prote\u00e7\u00e3o do SS7 \u00e9 apenas uma das prioridades na constru\u00e7\u00e3o de uma defesa internacional. A prote\u00e7\u00e3o desse SS7 de m\u00e9dio porte em resist\u00eancia a ataques tornou-se uma tend\u00eancia de seguran\u00e7a maior entre as operadoras de telefonia nos \u00faltimos anos. Muitas operadoras reconfiguram os programas de rede usando a prote\u00e7\u00e3o b\u00e1sica e definem op\u00e7\u00f5es de roteamento interno de SMS, algumas delas adicionam firewalls SS7 for\u00e7ados. Aqui est\u00e3o os meios para resistir aos ataques b\u00e1sicos do SS7, mas isso n\u00e3o \u00e9 suficiente para proteger<\/p>\n<p>&nbsp;<\/p>\n<p>A comunidade como um todo. As avalia\u00e7\u00f5es b\u00e1sicas de seguran\u00e7a e a nossa pesquisa mostram que h\u00e1 possibilidades de atender a ataques de SS7 que exalam esse tipo de mecanismo de seguran\u00e7a.<\/p>\n<p>&nbsp;<\/p>\n<p>Um ataque real tende a ser mais silencioso e mais furtivo, portanto, \u00e9 dif\u00edcil not\u00e1-los. Essa \u00e9 a raz\u00e3o pela qual esperamos que as operadoras de celular tenham que possuir uma observa\u00e7\u00e3o de seguran\u00e7a de discuss\u00e3o de conex\u00f5es SS7 externas incentivadas com uma base de exposi\u00e7\u00e3o.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introdu\u00e7\u00e3o: Como podemos ver facilmente, muitas operadoras de telefonia m\u00f3vel protegem sua margem SS7 reconfigurando os instrumentos de rede e implementando solu\u00e7\u00f5es de roteamento dom\u00e9stico de SMS. Essa pode ser a maneira de enfrentar os principais ataques ao SS7, mas n\u00e3o \u00e9 mais suficiente para proteger sua rede. Nosso exerc\u00edcio de pesquisa e plano de prote\u00e7\u00e3o demonstra que h\u00e1 oportunidades...<\/p>","protected":false},"author":1,"featured_media":1735,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68,70,69,1],"tags":[],"class_list":["post-476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-call-interception","category-location-tracking","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Old SS7 technology now the modern Vulnerabilities<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/pt\/ss7-sms\/antiga-tecnologia-ss7-agora-as-vulnerabilidades-modernas\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Old SS7 technology now the modern Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Introduction: Since we can easily see, many mobile operators shield their SS7 margin via re-configuring network instruments and Implementing SMS household Routing remedies. This could be the means to come up with chief SS7 attacks, but it&#8217;s not any longer sufficient to safeguard your network. Our search and protection plan exercise demonstrate there are opportunities...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/pt\/ss7-sms\/antiga-tecnologia-ss7-agora-as-vulnerabilidades-modernas\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-09T05:12:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Old SS7 technology now the modern Vulnerabilities\",\"datePublished\":\"2024-07-09T05:12:10+00:00\",\"dateModified\":\"2024-09-05T09:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\",\"articleSection\":[\"Call Interception\",\"Location Tracking\",\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\",\"url\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\",\"name\":\"Old SS7 technology now the modern Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\",\"datePublished\":\"2024-07-09T05:12:10+00:00\",\"dateModified\":\"2024-09-05T09:47:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg\",\"width\":900,\"height\":507},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Old SS7 technology now the modern Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A antiga tecnologia SS7 agora \u00e9 a vulnerabilidade moderna","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/pt\/ss7-sms\/antiga-tecnologia-ss7-agora-as-vulnerabilidades-modernas\/","og_locale":"pt_BR","og_type":"article","og_title":"Old SS7 technology now the modern Vulnerabilities","og_description":"Introduction: Since we can easily see, many mobile operators shield their SS7 margin via re-configuring network instruments and Implementing SMS household Routing remedies. This could be the means to come up with chief SS7 attacks, but it&#8217;s not any longer sufficient to safeguard your network. Our search and protection plan exercise demonstrate there are opportunities...","og_url":"https:\/\/sms-txt.net\/pt\/ss7-sms\/antiga-tecnologia-ss7-agora-as-vulnerabilidades-modernas\/","og_site_name":"SS7 Hacking","article_published_time":"2024-07-09T05:12:10+00:00","article_modified_time":"2024-09-05T09:47:44+00:00","og_image":[{"width":900,"height":507,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Old SS7 technology now the modern Vulnerabilities","datePublished":"2024-07-09T05:12:10+00:00","dateModified":"2024-09-05T09:47:44+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/"},"wordCount":635,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","articleSection":["Call Interception","Location Tracking","SMS Intercept","SS7"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/","url":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/","name":"A antiga tecnologia SS7 agora \u00e9 a vulnerabilidade moderna","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","datePublished":"2024-07-09T05:12:10+00:00","dateModified":"2024-09-05T09:47:44+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Old-SS7-technology.jpg","width":900,"height":507},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ar\/%d8%a7%d9%84%d8%b1%d8%b3%d8%a7%d8%a6%d9%84-%d8%a7%d9%84%d9%82%d8%b5%d9%8a%d8%b1%d8%a9-ss7\/%d8%aa%d9%82%d9%86%d9%8a%d8%a9-ss7-%d8%a7%d9%84%d9%82%d8%af%d9%8a%d9%85%d8%a9-%d8%a7%d9%84%d8%a2%d9%86-%d8%a7%d9%84%d8%ab%d8%ba%d8%b1%d8%a7%d8%aa-%d8%a7%d9%84%d8%a3%d9%85%d9%86%d9%8a%d8%a9-%d8%a7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Old SS7 technology now the modern Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking de SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts\/476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/comments?post=476"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts\/476\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/media\/1735"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/media?parent=476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/categories?post=476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/tags?post=476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}