{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"atacuri-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/ro\/ss7-sms\/atacuri-ss7\/","title":{"rendered":"Atacuri SS7"},"content":{"rendered":"<h1>Atacuri SS7<\/h1>\n<p>La fel ca \u00een cazul multor protocoale tradi\u021bionale, SS7 a fost conceput f\u0103r\u0103 s\u0103 se \u021bin\u0103 cont de securitate. Concepte precum autentificarea \u0219i autorizarea au fost rareori prezente sau discutate. Securitatea SS7 a fost bazat\u0103 exclusiv pe \u00eencredere. Elementele de baz\u0103 ale re\u021belei au fost construite \u00een consecin\u021b\u0103, cu pu\u021bine sau chiar deloc mijloace de ap\u0103rare \u00eempotriva utiliz\u0103rii abuzive a func\u021bionalit\u0103\u021bilor SS7. Fiind considerat\u0103 o re\u021bea \u00eenchis\u0103, au fost efectuate foarte pu\u021bine cercet\u0103ri privind securitatea pentru a evalua securitatea SS7. Cercet\u0103torii \u00een domeniul securit\u0103\u021bii nu au avut acces la re\u021belele SS7, iar furnizorii de servicii au fost pu\u021bin interesa\u021bi s\u0103 analizeze acest subiect.<\/p>\n<p>Dar re\u021beaua SS7 nu mai este \u00eenchis\u0103. Furnizorii de re\u021bele \u00ee\u0219i deschid re\u021belele SS7 pentru ter\u021bi, ca parte a ofertelor lor comerciale. Elementele de re\u021bea, cum ar fi femtocelulele, p\u0103r\u0103sesc grani\u021bele \u00eenchise ale operatorilor \u0219i se afl\u0103 \u00een loca\u021bii nesigure; hackerii pot p\u0103trunde \u00een re\u021belele operatorilor de telefonie mobil\u0103 \u0219i este inutil s\u0103 men\u021bion\u0103m c\u0103 unii operatori pot fi controla\u021bi de state na\u021bionale cu inten\u021bii r\u0103uvoitoare de a abuza de aceste re\u021bele nesigure.<\/p>\n<p>Abuzarea insecurit\u0103\u021bilor SS7 poate avea efecte grave; natura protocolului permite accesul la informa\u021bii precum loca\u021bia utilizatorului \u0219i detaliile apelurilor\/SMS. Serviciile financiare \u0219i sistemele de autentificare au fost construite pe baza \u00eencrederii \u00een serviciile furnizate de astfel de protocoale. Atacurile de negare a serviciului care abuzeaz\u0103 de aceste insecurit\u0103\u021bi pot fi devastatoare pentru infrastructura de telecomunica\u021bii a na\u021biunilor.<\/p>\n<p>\u00cen sec\u021biunile urm\u0103toare, vom examina unele dintre atacurile care au fost anun\u021bate \u00eempotriva SS7, \u00een speran\u021ba de a analiza controalele lips\u0103 \u0219i de a propune \u00een cele din urm\u0103 unele controale care pot limita efectul acestor atacuri. Aceste sec\u021biuni se bazeaz\u0103 \u00een mare m\u0103sur\u0103 pe activitatea desf\u0103\u0219urat\u0103 de cercet\u0103torii \u00een domeniul securit\u0103\u021bii Tobias Engel \u0219i Karsten Nohl \u00een domeniile intercept\u0103rii apelurilor \u0219i SMS-urilor, urm\u0103ririi loca\u021biei, fraudei \u0219i refuzului de serviciu.<\/p>\n<h2>Interceptarea apelurilor \u0219i a SMS-urilor<\/h2>\n<p>Interceptarea comunica\u021biilor a fost \u00eentotdeauna \u021binta final\u0103 a oric\u0103rei opera\u021biuni de spionaj. Pe vremea telefoanelor cu fir, atacatorul trebuia s\u0103 intercepteze fizic firul pentru a putea asculta un apel \u00een curs.<br \/>\n\u00cen era comunica\u021biilor mobile, apelul este transmis prin radio \u00eentre p\u0103r\u021bile apelante \u0219i re\u021belele mobile. \u00cen mod normal, traficul este criptat pe interfa\u021ba aerian\u0103. Criptarea se realizeaz\u0103 utiliz\u00e2nd protocoalele A5\/1 sau A5\/3. Recent, suita A5\/1 a fost spart\u0103 \u0219i este posibil\u0103 decriptarea apelurilor transferate prin interfa\u021ba aerian\u0103 folosind interceptoare radio ieftine \u0219i tabele curcubeu (Nohl, Munant, 2010). Ca o<br \/>\nPrin urmare, operatorii au \u00eenceput s\u0103 implementeze protocolul de cifrare mai puternic A5\/3 pentru a combate astfel de atacuri.<\/p>\n<p>Cu toate acestea, vulnerabilit\u0103\u021bile SS7 dezv\u0103luite recent au deschis multiple posibilit\u0103\u021bi care faciliteaz\u0103 interceptarea apelurilor \u0219i a SMS-urilor transmise prin re\u021beaua mobil\u0103.<\/p>","protected":false},"excerpt":{"rendered":"<p>Atacuri SS7 La fel ca multe protocoale tradi\u021bionale, SS7 a fost proiectat f\u0103r\u0103 s\u0103 se \u021bin\u0103 cont de securitate. Concepte precum autentificarea \u0219i autorizarea au fost rareori prezente sau discutate. Securitatea SS7 a fost bazat\u0103 exclusiv pe \u00eencredere. Elementele de baz\u0103 ale re\u021belei au fost construite \u00een consecin\u021b\u0103, cu pu\u021bine sau chiar deloc mijloace de ap\u0103rare \u00eempotriva utiliz\u0103rii abuzive a func\u021bionalit\u0103\u021bilor SS7. Fiind considerat\u0103 o re\u021bea \u00eenchis\u0103...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/ro\/ss7-sms\/atacuri-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/ro\/ss7-sms\/atacuri-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Atacuri SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/ro\/ss7-sms\/atacuri-ss7\/","og_locale":"ro_RO","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/ro\/ss7-sms\/atacuri-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"Atacuri SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/ro\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}