<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>P1 Labs &#187; Network &amp; Protocols</title>
	<atom:link href="http://labs.p1sec.com/category/network-2/feed/" rel="self" type="application/rss+xml" />
	<link>http://labs.p1sec.com</link>
	<description>P1 Security Labs</description>
	<lastBuildDate>Wed, 31 Dec 2014 00:24:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>[31C3] SS7map : mapping vulnerability of the international mobile roaming infrastructure at #31C3</title>
		<link>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/</link>
		<comments>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/#comments</comments>
		<pubDate>Fri, 05 Dec 2014 13:38:41 +0000</pubDate>
		<dc:creator><![CDATA[Alexandre De Oliveira]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Projects]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[MAP]]></category>
		<category><![CDATA[Mapping]]></category>
		<category><![CDATA[sigtran]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[SS7map]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=677</guid>
		<description><![CDATA[Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014. The conference &#8220;SS7map : mapping vulnerability of the international mobile roaming infrastructure&#8221; will ...]]></description>
				<content:encoded><![CDATA[<p>Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014.</p>
<p>The conference &#8220;<strong>SS7map : mapping vulnerability of the international mobile roaming infrastructure</strong>&#8221; will focus on the method used to map the global SS7 network, what have been map the network and more in depth statistics and analysis.</p>
<p>Details of the conference schedule:<br />
Start time: 2014-12-27 23:00:00 +0100<br />
Room: Saal 6</p>
<p>CCC is one of the main security event in Europe, it will take place from 27th Dec to 30th Dec 2014.</p>
<p>See you at #31C3 !</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>[Hackito Ergo Sum 2014] Hacking Telco Equipment: The HLR/HSS</title>
		<link>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/</link>
		<comments>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/#comments</comments>
		<pubDate>Wed, 07 May 2014 18:11:57 +0000</pubDate>
		<dc:creator><![CDATA[Laurent Ghigonis]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[Diameter]]></category>
		<category><![CDATA[fuzzing]]></category>
		<category><![CDATA[hlr]]></category>
		<category><![CDATA[hss]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[virtualization]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=529</guid>
		<description><![CDATA[P1 Security presented at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/) the weaknesses of Telecom Infrastructure systems, and particularly HLR/HSS equipment. Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis from P1Security Download slides here. Abstract: HLR...]]></description>
				<content:encoded><![CDATA[<p style="color: #b30f25;"><span style="color: #505050;">P1 Security presented at the Hackito Ergo Sum 2014 conference in Paris (</span><a style="color: #ea6315;" href="http://2014.hackitoergosum.org/">http://2014.hackitoergosum.org/</a><span style="color: #505050;">) the weaknesses of Telecom Infrastructure systems, and particularly HLR/HSS equipment.</span></p>
<p><iframe style="border: 1px solid #CCC; border-width: 1px 1px 0; margin-bottom: 5px; max-width: 100%;" src="http://www.slideshare.net/slideshow/embed_code/34291135" width="597" height="486" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" allowfullscreen="allowfullscreen"> </iframe></p>
<div style="margin-bottom: 5px;"><strong> <a title="Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis" href="https://www.slideshare.net/p1sec/day1-hacking-telcoequipmentthehlrhsslaurentghigonisp1sec" target="_blank">Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis</a> </strong> from <strong><a href="http://www.slideshare.net/p1sec" target="_blank">P1Security</a></strong></div>
<p>Download slides <a href="http://2014.hackitoergosum.org/slides/day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec.pdf">here</a>.</p>
<p>Abstract:</p>
<p>HLR and HSS are the most important Telecom Equipment in an Operator Core Network.<br />
We are going to see that this so-called “Critical Infrastructure” is not as robust as you could think, by exploring the some weaknesses of the HLR/HSS equipment.</p>
<p>Plan:<br />
* Virtualization of HLR/HSS, for instrumentation purposes<br />
* HLR/HSS system analysis<br />
* SS7/Diameter network fuzzing<br />
* HLR/HSS binaries reverse</p>
<p>We also did another presentation on <a style="color: #ea6315;" href="http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/">Worldwide attacks on SS7/SIGTRAN network</a> at HES.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Diameter vs SS7 from a security perspective</title>
		<link>http://labs.p1sec.com/2013/07/28/346/</link>
		<comments>http://labs.p1sec.com/2013/07/28/346/#comments</comments>
		<pubDate>Sun, 28 Jul 2013 22:34:42 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Diameter]]></category>
		<category><![CDATA[pcap]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[wireshark]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=346</guid>
		<description><![CDATA[On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side: From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy protocol (but still ...]]></description>
				<content:encoded><![CDATA[<p>On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side:</p>
<div style="width: 266px" class="wp-caption alignleft"><img class=" " alt="" src="http://wiki.jss7.googlecode.com/git/images/MobicentsjSS7Layers.jpg" width="256" height="192" /><p class="wp-caption-text">Source: Mobicents</p></div>
<p>From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy protocol (but still the most used protocol for roaming), with protocol stacks which are sometime not very robust, even fragile, and have been released with only reliability to load in mind, not with reliability in front of malformed traffic. Hence the quite high number of crashes we witness in telecom and mobile core networks.</p>
<p>The reason for this is also the former lack of deep testing tools (fuzzers, scanners, etc..): for example, most of the fuzzers target at best M3UA (one of the encapsulation layer of SS7 over IP which is part of SIGTRAN) and do not cross neither its state machine nor the encoding. Fuzzing is mostly affecting the decoding of these message (ASN1), not the applications (MAP, INAP, CAP, &#8230;).</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="width: 247px" class="wp-caption alignright"><img alt="" src="http://www.diametriq.com/wp-content/uploads/2013/04/Diameter-Edge-Appliance.jpg" width="237" height="189" /><p class="wp-caption-text">Source: Diametriq</p></div>
<p>Diameter is much more inspired by IETF / Internet philosophy and practices. IP protocols being more exposed to attacks, the protocols are a little bit more security-minded in term of resilience in front of hostile activities. Using Diameter also means that more attacker will know how to attack these protocols, hence more threat pressure.<br />
Diameter is an evolution of Radius (hint: Diameter = Radius * 2).<br />
Some very questionable protocol design decision involve for example the removal of Radius shared secret. Another questionable design decision is to consider that Diameter must either be transported with TLS _or_ with IPsec. This is very damageable as the Diameter protocol has no way to verify that IPsec is really used underneath. Therefore, some deployment are done in Diameter mode &#8220;as&#8221; IPsec but without IPsec being deployed, therefore without spoofing or interception protection.</p>
<p>Another factor is the &#8220;reach&#8221; of signaling messages. Deep reach vs. Shallow reach.<br />
For example, SS7 has deep reach, can go from deep into Roaming network and deep toward Home network. For Diameter, it depends on the application being used (CCA, &#8230;).</p>
<p>Lastly, SS7 is being used for roaming and interworking of thousands of operators in the world whereas Diameter is being used only for maybe 10 to 20 operators for LTE roaming. SS7 and Diameter are both just &#8220;tubes&#8221; for transporting messages. Their respective strength is overrated, specifically with the myth or belief that SS7 and IPX network being closed, secure networks. They are not, they are as secure as the least secure operator having access to these. We will see the real impact and usage of Diameter as a worldwide transport mechanism in the future, but already one can see that it&#8217;s not a magic bullet regarding security from the audits we&#8217;ve done.</p>
<p>Some things P1 Security does with SS7, SIGTRAN and Diameter is:<br />
* Scanning with PTA<br />
* Fuzzing with PTF<br />
* Intrusion/Misuse detection with PTM<br />
and professional services, audits.</p>
<p>A few links about Diameter security at P1:<br />
<a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ep1sec%2Ecom%2Fcorp%2Fconsulting%2Flte-and-diameter-audit%2F&amp;urlhash=bMte&amp;_t=tracking_disc" target="_blank">http://www.p1sec.com/corp/consulting/lte-and-diameter-audit/</a><br />
<a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ep1sec%2Ecom%2Fcorp%2F2013%2F05%2F01%2Fp1-security-newsletter-the-6-best-ways-to-secure-your-telecom-network%2F&amp;urlhash=jA91&amp;_t=tracking_disc" target="_blank">http://www.p1sec.com/corp/2013/05/01/p1-security-newsletter-the-6-best-ways-to-secure-your-telecom-network/</a></p>
<p>Regarding the <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/">VKB</a>, we have seen so far fewer vulnerabilities on Diameter than on SS7:</p>
<p>Total <a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_DIAMETER+&amp;commit=Search">Diameter vulnerabilities</a>: 10<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SCCP&amp;commit=Search">SCCP vulnerabilities</a>: 18<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_MAP&amp;commit=Search">MAP vulnerabilities</a>: 46<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_INAP&amp;commit=Search">INAP vulnerabilities</a>: 4<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_TCAP&amp;commit=Search">TCAP vulnerabilities</a>: 4<br />
<span style="font-size: 13px; line-height: 19px;"><a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SCCP&amp;commit=Search">SCCP vulnerabilities</a>: 18<br />
</span>Total <a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SS7+&amp;commit=Search">SS7 vulnerabilities</a>: 90 (69 including overlaps vulnerabilities touching more than one SS7 protocol)</p>
<p>But this is also an exposure bias: we have seen much more mature/production deployment of SS7 than in Diameter so it&#8217;s only natural that the old protocol&#8217;s vulnerabilities are more known than the ones of recent protocols.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/28/346/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rising risk and importance of the vendor backdoors</title>
		<link>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/</link>
		<comments>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/#comments</comments>
		<pubDate>Sat, 13 Jul 2013 18:30:55 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=226</guid>
		<description><![CDATA[Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the recent network storage equipment backdoors (HP Keeps Installing Secret Backdoors in Enterprise Storage), the Huawei network element bac...]]></description>
				<content:encoded><![CDATA[<p>Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the <a href="http://www.theregister.co.uk/2013/07/11/hp_prepping_fix_for_latest_storage_vuln/">recent network storage equipment backdoors</a> (<a href="http://slashdot.org/topic/datacenter/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">HP Keeps Installing Secret Backdoors in Enterprise Storage</a>), the <a href="http://gigaom.com/2012/10/08/why-nobody-really-wants-to-get-to-the-bottom-of-china-zte-and-huawei/">Huawei network element backdoors</a> or the usual <a href="https://saas.p1sec.com/vulns/285">network equipment or DSL-router backdoors</a>, these are now clearly a real and strong threat to enterprises.</p>
<p>One interesting fact in the recent &#8220;<a href="https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_downloads/Partnerbeitraege/Partnerbeitrag_1und1_Telekom_Vodafone_Gefaehrdungsmatrix_2.pdf;jsessionid=467760209AE0AD8EEC10ED930219061B.2_cid369?__blob=publicationFile">Consolidated risk matrix</a>&#8221; referenced by german BSI and produced by Deutsche Telekom, Vodafone and 1&amp;1 Internet is that &#8220;Telecommunication and Network equipment backdoors&#8221; are one of the top rated vulnerabilities (4th top risk):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/DT_new_Table_en2.png"><img class="alignnone size-large wp-image-235" alt="DT_new_Table_en2" src="http://labs.p1sec.com/wp-content/uploads/2013/07/DT_new_Table_en2-1024x573.png" width="960" height="537" /></a></p>
<address>(Table extracted from the 1&amp;1, Deutsche Telekom and Vodafone study, in german, and translated by Google Translate)</address>
<p>The nature of these backdoors is already troubling.  The people you trust your data and business with are the one who betray you by having secret access to your systems, even if you secure these to the maximum known best practices.</p>
<p>What&#8217;s worse with critical network element is that these backdoors can be activated from a great numbers of entry vectors, and can exfiltrate data by an even bigger set of vectors:</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/P1-Vector-for-backdoors-3.png"><img class="alignnone size-full wp-image-239" alt="P1 Vector for backdoors 3" src="http://labs.p1sec.com/wp-content/uploads/2013/07/P1-Vector-for-backdoors-3.png" width="741" height="428" /></a></p>
<p>The great difference in countries preparedness at the telecom and mobile level shows extreme discrepancies in the awareness and maturity regarding the telecom and mobile security.</p>
<p>The National Information Security Agencies have had mixed results in their attempts to regulate security or help the operator improve their security due to the resistive posture taken by some operators, vendors and industry association and many cover-up of internal and external compromise of telecom critical infrastructure.</p>
<p>The liability of operators and vendors is huge with regard to this matter, most notably with VIP eavesdropping consequences and with the potential for general public class actions where law permits.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>RMLL / LSM 2013: Opening up mobile and telecommunications networks</title>
		<link>http://labs.p1sec.com/2013/07/11/rmll-lsm-2013-opening-up-mobile-and-telecommunications-networks/</link>
		<comments>http://labs.p1sec.com/2013/07/11/rmll-lsm-2013-opening-up-mobile-and-telecommunications-networks/#comments</comments>
		<pubDate>Thu, 11 Jul 2013 09:13:37 +0000</pubDate>
		<dc:creator><![CDATA[omar]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=211</guid>
		<description><![CDATA[As part of our effort to further the knowledge on telecommunications technologies in the open source and security community we have presented an introduction into mobile and telecom networks and From walled garden to open and reviewed security  Telecommunication networks differ from IP networks in s...]]></description>
				<content:encoded><![CDATA[<div title="Page 1">
<p style="text-align: left;">As part of our effort to further the knowledge on telecommunications technologies in the open source and security community we have presented an introduction into mobile and telecom networks and</p>
<p style="text-align: center;"><strong>From walled garden to open and reviewed security </strong></p>
<p style="text-align: left;">Telecommunication networks differ from IP networks in several important aspects. First, telecom networks have to provide the infrastructure ensuring high-availability, high throughput as well as resilience for a wide range of services. Second, telecom networks must offer support for legacy network elements and services as old as 40 years, requiring a multitude of protocols for backward compatibility and interoperability. Third, telecom networks support multiple addressing schemes making analysis and mapping more difficult than IP networks. The Internet is based in essence on a comparably small set of basic protocols that offer all the needed capabilities for higher layer services. The existing tools designed for the analysis of IP based networks offer little support for telecom networks and hence necessitate the development of dedicated tools. Here we present the techniques and tools that we have developed in order to better understand telecom networks. These tools allow us to scan, communicate on and visualize telecom networks. SCTPscan allows us to reliably and efficiently scan hosts for open SCTP ports which are possible entry points to the SS7 network. pysctp is a python library providing a simple API to the SCTP protocol, which is the basis for communicating on telecom networks. Finally, we demonstrate the capabilities of our toolset by analysing a typical telecom network and highlighting the aforementioned properties of such networks.</p>
<p style="text-align: center;">
<div class="shortcode1-2 "><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/network_arch.png"><img alt="network_arch" src="http://labs.p1sec.com/wp-content/uploads/2013/07/network_arch-300x192.png" width="300" height="192" /></a></p>
<p><em>The network architecture of a typical mobile network operator. Telecom networks are powered by a large number of different technologies.</em></div>
<div class="shortcode2-2 "><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/network_analysis.png"><img class="aligncenter" alt="network_analysis" src="http://labs.p1sec.com/wp-content/uploads/2013/07/network_analysis-300x186.png" width="304" height="190" /></a></p>
<p style="text-align: left;"><em>A passive network scan showing the different network elements (nodes) and the communication (edges) between them. The edge width is drawn proportional to the number of exchanged messages in the recorded period of time. (global titles have been anonymized)</em></div>
</p>
<p style="text-align: left;">We have recently presented this topic at the Libre Software Meeting, Security Track 2013 (<a title="Opening_up_telco_networks.pdf" href="http://labs.p1sec.com/wp-content/uploads/2013/07/Opening_up_telco_networks.pdf" target="_blank">slides</a>). Also check out the <a href="http://schedule2013.rmll.info/IMG/pdf/telecom_security.pdf">RMLL website</a>.</p>
</div>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/11/rmll-lsm-2013-opening-up-mobile-and-telecommunications-networks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Link reference in the telco world for security auditors</title>
		<link>http://labs.p1sec.com/2012/05/24/link-reference-in-the-telco-world-for-security-auditors/</link>
		<comments>http://labs.p1sec.com/2012/05/24/link-reference-in-the-telco-world-for-security-auditors/#comments</comments>
		<pubDate>Thu, 24 May 2012 13:22:20 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=180</guid>
		<description><![CDATA[These are important links to know when you&#8217;re going to enter the telecom world for security assessment. &#160; Ericsson data http://en.wikipedia.org/wiki/PLEX_(programming_language) http://en.wikipedia.org/wiki/AXE_telephone_exchange &#160; Billing http://en.wikipedia.org/wiki/Billing_Mediatio...]]></description>
				<content:encoded><![CDATA[<p>These are important links to know when you&#8217;re going to enter the telecom world for security assessment.</p>
<p>&nbsp;</p>
<p>Ericsson data</p>
<p><a href="http://en.wikipedia.org/wiki/PLEX_(programming_language)">http://en.wikipedia.org/wiki/PLEX_(programming_language)</a></p>
<p><a href="http://en.wikipedia.org/wiki/AXE_telephone_exchange">http://en.wikipedia.org/wiki/AXE_telephone_exchange</a></p>
<p>&nbsp;</p>
<p>Billing</p>
<p><a href="http://en.wikipedia.org/wiki/Billing_Mediation_Platform">http://en.wikipedia.org/wiki/Billing_Mediation_Platform</a></p>
<p><a href="http://en.wikipedia.org/wiki/Online_charging_system">http://en.wikipedia.org/wiki/Online_charging_system</a></p>
<p>&nbsp;</p>
<p><span style="font-size: 14px; line-height: 1.5em;"> </span></p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2012/05/24/link-reference-in-the-telco-world-for-security-auditors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
