<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>P1 Labs &#187; Conferences</title>
	<atom:link href="http://labs.p1sec.com/category/conferences/feed/" rel="self" type="application/rss+xml" />
	<link>http://labs.p1sec.com</link>
	<description>P1 Security Labs</description>
	<lastBuildDate>Wed, 31 Dec 2014 00:24:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>[31C3] SS7map : mapping vulnerability of the international mobile roaming infrastructure at #31C3</title>
		<link>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/</link>
		<comments>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/#comments</comments>
		<pubDate>Fri, 05 Dec 2014 13:38:41 +0000</pubDate>
		<dc:creator><![CDATA[Alexandre De Oliveira]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Projects]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[MAP]]></category>
		<category><![CDATA[Mapping]]></category>
		<category><![CDATA[sigtran]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[SS7map]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=677</guid>
		<description><![CDATA[Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014. The conference &#8220;SS7map : mapping vulnerability of the international mobile roaming infrastructure&#8221; will ...]]></description>
				<content:encoded><![CDATA[<p>Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014.</p>
<p>The conference &#8220;<strong>SS7map : mapping vulnerability of the international mobile roaming infrastructure</strong>&#8221; will focus on the method used to map the global SS7 network, what have been map the network and more in depth statistics and analysis.</p>
<p>Details of the conference schedule:<br />
Start time: 2014-12-27 23:00:00 +0100<br />
Room: Saal 6</p>
<p>CCC is one of the main security event in Europe, it will take place from 27th Dec to 30th Dec 2014.</p>
<p>See you at #31C3 !</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>[Hackito Ergo Sum 2014] Hacking Telco Equipment: The HLR/HSS</title>
		<link>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/</link>
		<comments>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/#comments</comments>
		<pubDate>Wed, 07 May 2014 18:11:57 +0000</pubDate>
		<dc:creator><![CDATA[Laurent Ghigonis]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[Diameter]]></category>
		<category><![CDATA[fuzzing]]></category>
		<category><![CDATA[hlr]]></category>
		<category><![CDATA[hss]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[virtualization]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=529</guid>
		<description><![CDATA[P1 Security presented at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/) the weaknesses of Telecom Infrastructure systems, and particularly HLR/HSS equipment. Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis from P1Security Download slides here. Abstract: HLR...]]></description>
				<content:encoded><![CDATA[<p style="color: #b30f25;"><span style="color: #505050;">P1 Security presented at the Hackito Ergo Sum 2014 conference in Paris (</span><a style="color: #ea6315;" href="http://2014.hackitoergosum.org/">http://2014.hackitoergosum.org/</a><span style="color: #505050;">) the weaknesses of Telecom Infrastructure systems, and particularly HLR/HSS equipment.</span></p>
<p><iframe style="border: 1px solid #CCC; border-width: 1px 1px 0; margin-bottom: 5px; max-width: 100%;" src="http://www.slideshare.net/slideshow/embed_code/34291135" width="597" height="486" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" allowfullscreen="allowfullscreen"> </iframe></p>
<div style="margin-bottom: 5px;"><strong> <a title="Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis" href="https://www.slideshare.net/p1sec/day1-hacking-telcoequipmentthehlrhsslaurentghigonisp1sec" target="_blank">Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis</a> </strong> from <strong><a href="http://www.slideshare.net/p1sec" target="_blank">P1Security</a></strong></div>
<p>Download slides <a href="http://2014.hackitoergosum.org/slides/day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec.pdf">here</a>.</p>
<p>Abstract:</p>
<p>HLR and HSS are the most important Telecom Equipment in an Operator Core Network.<br />
We are going to see that this so-called “Critical Infrastructure” is not as robust as you could think, by exploring the some weaknesses of the HLR/HSS equipment.</p>
<p>Plan:<br />
* Virtualization of HLR/HSS, for instrumentation purposes<br />
* HLR/HSS system analysis<br />
* SS7/Diameter network fuzzing<br />
* HLR/HSS binaries reverse</p>
<p>We also did another presentation on <a style="color: #ea6315;" href="http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/">Worldwide attacks on SS7/SIGTRAN network</a> at HES.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>[Hackito Ergo Sum 2014] Worldwide attacks on SS7/SIGTRAN network</title>
		<link>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/</link>
		<comments>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/#comments</comments>
		<pubDate>Fri, 02 May 2014 13:59:34 +0000</pubDate>
		<dc:creator><![CDATA[Pierre-Olivier Vauboin]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[MAP]]></category>
		<category><![CDATA[sigtran]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=516</guid>
		<description><![CDATA[We are pleased to announce that P1 Security was present at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/). Worldwide attacks on SS7/SIGTRAN network from P1Security Download slides here. Abstract: Mobile telecommunication networks are complex and provide a wide range ...]]></description>
				<content:encoded><![CDATA[<p>We are pleased to announce that P1 Security was present at the Hackito Ergo Sum 2014 conference in Paris (<a href="http://2014.hackitoergosum.org/">http://2014.hackitoergosum.org/</a>).</p>
<p><center><iframe style="border: 1px solid #CCC; border-width: 1px 1px 0; margin-bottom: 5px; max-width: 100%;" src="http://www.slideshare.net/slideshow/embed_code/34023721" width="597" height="486" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" allowfullscreen="allowfullscreen"></iframe></p>
<div style="margin-bottom: 5px;"><strong> <a title="Worldwide attacks on SS7/SIGTRAN network" href="https://www.slideshare.net/p1sec/worldwide-attacks-onss7networkp1securityhackito2014" target="_blank">Worldwide attacks on SS7/SIGTRAN network</a> </strong> from <strong><a href="http://www.slideshare.net/p1sec" target="_blank">P1Security </a></strong></div>
<p></center></p>
<p>Download slides <a href="http://2014.hackitoergosum.org/slides/day3_Worldwide_attacks_on_SS7_network_P1security_Hackito_2014.pdf">here</a>.</p>
<p>Abstract:</p>
<p>Mobile telecommunication networks are complex and provide a wide range of services, making them a tempting target for fraudsters and for intelligence agencies. Moreover, the architecture, equipment and protocols used on these networks were never designed with security in mind, availability being the first concern. Today, even though some telecom operators are investing money into securing their network, events confirm that for most of them maturity in term of security is yet to come, as recently shown with the example of massive traffic interception on compromised SCCP and GRX providers like Belgacom’s BICS. Here we present the most typical and legitimate telecom callflows from making a mobile phone call to sending a SMS. Then we describe the protocol layers involved and how to abuse them, which fields can be manipulated in order to attack both the operator infrastructure and its subscribers. Finally, we show a real life example of scan performed from an international SS7 interconnection and practical attacks on subscribers such as spam, spoofed SMS and user location tracking.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
