{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"ss7-utoky","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/sk\/ss7-sms\/ss7-utoky\/","title":{"rendered":"\u00datoky SS7"},"content":{"rendered":"<h1>\u00datoky SS7<\/h1>\n<p>Podobne ako mnoh\u00e9 in\u00e9 star\u0161ie protokoly, aj SS7 bol navrhnut\u00fd s mal\u00fdm d\u00f4razom na bezpe\u010dnos\u0165. Koncepty ako autentifik\u00e1cia a autoriz\u00e1cia sa takmer nevyskytovali a ani sa o nich nediskutovalo. Bezpe\u010dnos\u0165 SS7 bola zalo\u017een\u00e1 v\u00fdlu\u010dne na d\u00f4vere. Z\u00e1kladn\u00e9 sie\u0165ov\u00e9 prvky boli pod\u013ea toho vytvoren\u00e9 s malou, ak v\u00f4bec nejakou ochranou proti zneu\u017eitiu funkci\u00ed SS7. Ke\u010f\u017ee sa SS7 pova\u017euje za uzavret\u00fa sie\u0165, vykonalo sa ve\u013emi m\u00e1lo bezpe\u010dnostn\u00e9ho v\u00fdskumu na pos\u00fadenie bezpe\u010dnosti SS7. V\u00fdskumn\u00edci v oblasti bezpe\u010dnosti nemali pr\u00edstup k sie\u0165am SS7 a poskytovatelia slu\u017eieb mali mal\u00fd z\u00e1ujem o sk\u00famanie tejto t\u00e9my.<\/p>\n<p>Sie\u0165 SS7 v\u0161ak u\u017e nie je uzavret\u00e1. Poskytovatelia siet\u00ed otv\u00e1raj\u00fa svoje siete SS7 pre tretie strany ako s\u00fa\u010das\u0165 svojich komer\u010dn\u00fdch pon\u00fak. Sie\u0165ov\u00e9 prvky, ako s\u00fa femto bunky, op\u00fa\u0161\u0165aj\u00fa uzavret\u00e9 hranice oper\u00e1torov a s\u00fa umiestnen\u00e9 na ned\u00f4veryhodn\u00fdch miestach; hackeri si m\u00f4\u017eu n\u00e1js\u0165 cestu do siet\u00ed mobiln\u00fdch oper\u00e1torov a je potrebn\u00e9 spomen\u00fa\u0165, \u017ee niektor\u00ed oper\u00e1tori m\u00f4\u017eu by\u0165 pod kontrolou n\u00e1rodn\u00fdch \u0161t\u00e1tov so zl\u00fdmi \u00famyslami zneu\u017ei\u0165 tak\u00e9to nezabezpe\u010den\u00e9 siete.<\/p>\n<p>Zneu\u017eitie neistoty SS7 m\u00f4\u017ee ma\u0165 z\u00e1va\u017en\u00e9 n\u00e1sledky; povaha protokolu umo\u017e\u0148uje pr\u00edstup k inform\u00e1ci\u00e1m, ako je poloha pou\u017e\u00edvate\u013ea a podrobnosti o volan\u00ed\/SMS. Finan\u010dn\u00e9 slu\u017eby a autentifika\u010dn\u00e9 syst\u00e9my boli vybudovan\u00e9 na z\u00e1klade d\u00f4very v slu\u017eby poskytovan\u00e9 tak\u00fdmito protokolmi. \u00datoky na odmietnutie slu\u017eby zneu\u017e\u00edvaj\u00face tieto neistoty m\u00f4\u017eu ma\u0165 pre telekomunika\u010dn\u00fa infra\u0161trukt\u00faru \u0161t\u00e1tov ni\u010div\u00e9 n\u00e1sledky.<\/p>\n<p>V nasleduj\u00facich \u010dastiach presk\u00famame niektor\u00e9 z \u00fatokov, ktor\u00e9 boli ozn\u00e1men\u00e9 proti SS7, v n\u00e1deji, \u017ee analyzujeme ch\u00fdbaj\u00face kontroln\u00e9 mechanizmy a pr\u00edpadne navrhneme niektor\u00e9 kontroln\u00e9 mechanizmy, ktor\u00e9 m\u00f4\u017eu obmedzi\u0165 \u00fa\u010dinok t\u00fdchto \u00fatokov. Tieto \u010dasti sa vo ve\u013ekej miere opieraj\u00fa o pr\u00e1cu, ktor\u00fa vykonali bezpe\u010dnostn\u00ed v\u00fdskumn\u00edci Tobias Engel a Karsten Nohl v oblastiach odpo\u010d\u00favania hovorov a SMS, sledovania polohy, podvodov a odmietnutia slu\u017eby.<\/p>\n<h2>Odpo\u010d\u00favanie hovorov a SMS<\/h2>\n<p>Zachyt\u00e1vanie komunik\u00e1cie bolo v\u017edy hlavn\u00fdm cie\u013eom \u0161pion\u00e1\u017enych oper\u00e1ci\u00ed. V d\u00e1vnych \u010dasoch dr\u00f4tov\u00fdch telef\u00f3nov sa \u00fato\u010dn\u00edk musel fyzicky napoji\u0165 na dr\u00f4t, aby mohol odpo\u010d\u00fava\u0165 prebiehaj\u00faci hovor.<br \/>\nV \u00e9re mobilnej komunik\u00e1cie sa hovor pren\u00e1\u0161a cez r\u00e1dio medzi volaj\u00facimi stranami a mobiln\u00fdmi sie\u0165ami. Obvykle je prenos \u0161ifrovan\u00fd cez vzduchov\u00e9 rozhranie. \u0160ifrovanie sa vykon\u00e1va pomocou protokolov A5\/1 alebo A5\/3. Ned\u00e1vno bol prelomen\u00fd bal\u00edk A5\/1 a hovory pren\u00e1\u0161an\u00e9 cez vzduchov\u00e9 rozhranie je mo\u017en\u00e9 de\u0161ifrova\u0165 pomocou lacn\u00fdch r\u00e1diov\u00fdch odpo\u010d\u00fava\u010dov a d\u00fahov\u00fdch tabuliek (Nohl, Munant, 2010). Ako<br \/>\nV d\u00f4sledku toho oper\u00e1tori za\u010dali zav\u00e1dza\u0165 silnej\u0161\u00ed \u0161ifrovac\u00ed protokol A5\/3 na boj proti tak\u00fdmto \u00fatokom.<\/p>\n<p>Ned\u00e1vno odhalen\u00e9 zranite\u013enosti SS7 v\u0161ak otvorili viacer\u00e9 mo\u017enosti, ktor\u00e9 u\u013eah\u010duj\u00fa odpo\u010d\u00favanie hovorov a SMS pren\u00e1\u0161an\u00fdch cez mobiln\u00fa sie\u0165.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u00datoky na SS7 Podobne ako mnoh\u00e9 in\u00e9 star\u0161ie protokoly, aj SS7 bol navrhnut\u00fd s mal\u00fdm d\u00f4razom na bezpe\u010dnos\u0165. Koncepty ako autentifik\u00e1cia a autoriz\u00e1cia sa takmer nevyskytovali ani sa o nich nediskutovalo. Bezpe\u010dnos\u0165 SS7 bola zalo\u017een\u00e1 v\u00fdlu\u010dne na d\u00f4vere. Z\u00e1kladn\u00e9 sie\u0165ov\u00e9 prvky boli pod\u013ea toho vytvoren\u00e9 s malou, ak v\u00f4bec nejakou ochranou proti zneu\u017eitiu funkci\u00ed SS7. Pova\u017euje sa za uzavret\u00fa...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/sk\/ss7-sms\/ss7-utoky\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/sk\/ss7-sms\/ss7-utoky\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00datoky SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/sk\/ss7-sms\/ss7-utoky\/","og_locale":"sk_SK","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/sk\/ss7-sms\/ss7-utoky\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"\u00datoky SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/sk\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}