<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>P1 Labs &#187; Tools</title>
	<atom:link href="http://labs.p1sec.com/category/tools/feed/" rel="self" type="application/rss+xml" />
	<link>http://labs.p1sec.com</link>
	<description>P1 Security Labs</description>
	<lastBuildDate>Wed, 31 Dec 2014 00:24:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>Samsung LTE USB stick GT-B3730/B3740 hacking</title>
		<link>http://labs.p1sec.com/2013/08/05/samsung-lte-usb-stick-gt-b3730b3740-hacking/</link>
		<comments>http://labs.p1sec.com/2013/08/05/samsung-lte-usb-stick-gt-b3730b3740-hacking/#comments</comments>
		<pubDate>Mon, 05 Aug 2013 15:53:11 +0000</pubDate>
		<dc:creator><![CDATA[Ramtin Amin]]></dc:creator>
				<category><![CDATA[LTE]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[Tools]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=379</guid>
		<description><![CDATA[Samsung LTE USB stick GT-B3730/B3740 Samsung LTE USB dongles codename Kalmia I acquired a couple of GT-B3740 800Mhz LTE Dongle, and decided to open one of them to find out what the chipset was used in it. The very surprizing part was to see that it had a JTAG connector there and it was written JTAG ...]]></description>
				<content:encoded><![CDATA[<h1>Samsung LTE USB stick GT-B3730/B3740</h1>
<h2>Samsung LTE USB dongles codename Kalmia</h2>
<p><a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/Kalmia_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/Kalmia_small.png" alt="" width="489" height="652" /></a></p>
<p style="clear: both;">I acquired a couple of GT-B3740 800Mhz LTE Dongle, and decided to open one of them to find out what the chipset was used in it.</p>
<p><a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/GT-B3740_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/GT-B3740_small.png" alt="" width="652" height="489" /></a></p>
<p style="clear: both;">The very surprizing part was to see that it had a JTAG connector there and it was written JTAG !<br />
So after looking for some documentations about it, another interesting thing came. Googling a bit let me find the Service Manual of the device !</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/B3740_TOPLEVEL.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/B3740_TOPLEVEL.png" alt="" width="718" height="475" /></a></p>
<p style="clear: both;">Even more surprizing, there was a schematic in there, with the JTAG pinout description!</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/JTAG_HEADER.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/JTAG_HEADER.png" alt="" width="387" height="216" /></a></p>
<p style="clear: both;">After some investigation, I found the connector DATASHEET: <a href="http://www3.panasonic.biz/ac/e_download/control/connector/base-fpc/catalog/con_eng_f4s.pdf?via=ok" target="_blank">http://www3.panasonic.biz/ac/e_download/control/connector/base-fpc/catalog/con_eng_f4s.pdf?via=ok</a> It is in fact a PANASONIC AXT512124.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/Panasonic_conn.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/Panasonic_conn.png" alt="" width="517" height="93" /></a></p>
<p style="clear: both;">One can find those at Digikey or Mouser.<br />
So THE problem with those connector is the size. In fact, any soldering iron would melt the connector before being able to soler anything to it. So there is no other way than finding the Female connector and extending it. My first attemp was a failure. In fact, I tried to do it with a flex based copper sheet and PNPBlue. here is the result</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/JTAG_FLEX.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/JTAG_FLEX.png" alt="" width="128" height="192" /></a></p>
<p style="clear: both;">In fact, the clearance is so low that it could only be done in a factory with a pick and place.<br />
Looking here and there, I found on Alibaba a multiple JTAG cable that looked quite similar.</p>
<p><a href="http://www.aliexpress.com/store/product/JTAG-JPin-JIG-Pinouts-by-RIFF-ORT-JPR-MEDUSA-BOX/927318_922669231.html" target="_blank">http://www.aliexpress.com/store/product/JTAG-JPin-JIG-Pinouts-by-RIFF-ORT-JPR-MEDUSA-BOX/927318_922669231.html</a></p>
<p>So I decided to buy one to give it a test. The thing is that you have to buy the whole set. At the time I&#8217;m writing, it&#8217;s price was $68.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/JTAG_MOORC.jpeg"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/JTAG_MOORC.jpeg" alt="" width="450" height="336" /></a></p>
<p>As one can see, the result is shown here under</p>
<p><a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/JTAG_CONNECTED_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/JTAG_CONNECTED_small.png" alt="" width="555" height="427" /></a></p>
<p>The interesting part about this cable is that the little adapter they give respects the JTAG pinout standard of the ARM, therefor, I could easily connect it with a Board to Board connector to a Amontek Jtag-Mini. So it was time to play with OpenOCD !<br />
Here is the configuration file used.</p>
<pre style="color: white; background-color: black; overflow: auto;"><code>
telnet_port 4444
#gdb_port 0
#tcl_port 0

jtag_khz    100000000
adapter_khz 100000000
#jtag_speed 3

reset_config trst_and_srst

jtag_nsrst_delay 400
jtag_ntrst_delay 400

if { [info exists CHIPNAME] } {
  set _CHIPNAME $CHIPNAME
} else {
  set _CHIPNAME cmc220
}

#reset_config none

if { [info exists CPU_TAPID ] } {
  set _CPU_TAPID $CPU_TAPID
} else {
  set _CPU_TAPID 0x4ba00477
}
jtag newtap $_CHIPNAME tap -irlen 4 -ircapture 0x1 -irmask 0x3 -expected-id $_CPU_TAPID

set _TARGETNAME $_CHIPNAME

target create $_TARGETNAME cortex_r4 -endian little -chain-position $_TARGETNAME.tap
</code></pre>
<p>So I managed to dump the Memory of the chip. And I got the firmware extracted. A couple of strings on the file shows that the file is REALLY verbose. All the debug symbols are there. All the printf are still there&#8230; It&#8217;s time to play with IDA pro !<br />
One interesting part is that I was able to tell IDA pro that the GDB Server is in fact OpenOCD. so IDA pro would go into debug mode and be able to step in the running code. Most of the time that would generate an interrupt tho. But that is quite good enough with some scripting to see what part of the Firmware is Code segment or Datasegment..</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/IDA_Graph.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/IDA_Graph.png" alt="" width="1425" height="863" /></a></p>
<p style="clear: both;">And as said earlyer, the amount of Strings debug is really big. Worth digging into it.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/IDA_STRINGS.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/IDA_STRINGS.png" alt="" width="695" height="528" /></a></p>
<p>In the meantime, I decided to get myself some GT-B3730 that does the 2.6Ghz LTE band as well as 2.75G and 3G. Hoping that they are similar.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/GT-B3730.jpg"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/GT-B3730.jpg" alt="" width="516" height="390" /></a></p>
<p>So Opening it showed me that it&#8217;s based on the same chip, which is connected to another chip in charge of the 2/3 G.</p>
<p><a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/G3730PCBA_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/G3730PCBA_small.png" alt="" width="275" height="367" /></a><br />
<a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/G3730PCBB_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/G3730PCBB_small.png" alt="" width="310" height="389" /></a></p>
<p>2 different Firmware are written in this one. mode A and B. A is LTE, B = 2/3 G. Therefor, in order to switch, it needs to reboot on its new firmware.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/08/05/samsung-lte-usb-stick-gt-b3730b3740-hacking/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Intrusion detection on telephony networks</title>
		<link>http://labs.p1sec.com/2013/04/22/intrusion-detection-on-telephony-networks/</link>
		<comments>http://labs.p1sec.com/2013/04/22/intrusion-detection-on-telephony-networks/#comments</comments>
		<pubDate>Mon, 22 Apr 2013 13:07:28 +0000</pubDate>
		<dc:creator><![CDATA[omar]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tools]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=83</guid>
		<description><![CDATA[With the explosion in the mobile communications sector, the deregulation of public switched telecommunication networks (PSTN) as well as the introduction of many new services the dependence on the signalling system 7 (SS7) network has rapidly increased over the last two decades. Typically, monitorin...]]></description>
				<content:encoded><![CDATA[<p>With the explosion in the mobile communications sector, the deregulation of public switched telecommunication networks (PSTN) as well as the introduction of many new services the dependence on the signalling system 7 (SS7) network has rapidly increased over the last two decades. Typically, monitoring systems on telephony networks have focused on fraud detection however the need for more effective and low-latency detection of attacks on today&#8217;s communication infrastructure has become indispensable (<a href="http://www.raid-symposium.org/raid99/PAPERS/Gorman.pdf" target="_blank">Gormann and Ruhl, 1999</a>). Attacks range from fraudulent access to network services and databases (e.g., HLR) to gain access to private or sensitive information to denial of service type attacks to disrupt or deny telecommunication services.</p>
<p>P1 Telecom Monitor (PTM) is an Intrusion Detection System (IDS) specifically designed for SS7 and SIGTRAN networks. It is composed of a realtime detection framework and a reporting and monitoring user interface. PTM&#8217;s design allows it to be easily scaled from a single network tap to large-scale deployments throughout the network to be protected. The network traffic is filtered and processed in a decentralized manner while alerts are collected in a central datastore.</p>
<div id="attachment_87" style="width: 273px" class="wp-caption aligncenter"><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/PTM-backend.png" target="_blank"><img class="size-medium wp-image-87  " alt="PTM detection framework" src="http://labs.p1sec.com/wp-content/uploads/2013/04/PTM-backend-263x300.png" width="263" height="300" /></a><p class="wp-caption-text">PTM offers a realtime extensible monitoring framework for time-correlated network events.</p></div>
<p>The PTM detection framework&#8217;s modular design allows us to quickly adapt and extend it to new attack types. Detectors are implemented as independent modules exposing a simple callback interface invoked by the detector framework upon interception of new traffic.</p>
<p>Attacks can often not be discerned from normal traffic by analyzing single packets, PTM also allows time-correlated events to be detected.</p>
<p>We believe that even the best IDS will be of little value if the detected events are not quickly translated into alerts and a response from the operations team. This is why PTM also offers a comprehensive web-based monitoring interface. On the one hand, a simple dashboard allows the engineer to gain a quick overview of the current status of the network and the most important threats. Aggregate statistics and real-time charts expose network activity and top attacks. On the other hand, detailed tabular reports allow the operator to understand and reconstruct events precisely and to react in the most appropriate fashion.</p>
<div style="width: 310px" class="wp-caption aligncenter"><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/PTM-UI1.png" target="_blank"><img class=" " alt="PTM UI" src="http://labs.p1sec.com/wp-content/uploads/2013/04/PTM-UI1-300x205.png" width="300" height="205" /></a><p class="wp-caption-text">PTM&#8217;s user interface offers both a simple event dashboard showing the current network status and highlighting current events, as well as a detailed tabular event report. A sample report generated from real anonymized data can be viewed <a href="http://labs.p1sec.com/wp-content/uploads/2013/04/PTM-UI-anonymized.pdf" target="_blank">here</a>.</p></div>
<p>The combination of a scalable realtime traffic monitor, an extensible event-detector framework and simple yet powerful interface position P1 Telecom Monitor at the forefront of intrusion detection systems in the telecommunications sector.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/04/22/intrusion-detection-on-telephony-networks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SS7 traffic analysis with Wireshark</title>
		<link>http://labs.p1sec.com/2013/04/04/ss7-traffic-analysis-with-wireshark/</link>
		<comments>http://labs.p1sec.com/2013/04/04/ss7-traffic-analysis-with-wireshark/#comments</comments>
		<pubDate>Thu, 04 Apr 2013 13:30:31 +0000</pubDate>
		<dc:creator><![CDATA[Laurent Ghigonis]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[pcap]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[wireshark]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=13</guid>
		<description><![CDATA[The problem with wireshark Primary usage of wireshark is to visualize packets coming from traditional IP traffic, that is why default wireshark settings provides a relatively good overview of IP packets for most of the use cases. The problem is that this configuration is not at all suitable for spec...]]></description>
				<content:encoded><![CDATA[<h1>The problem with wireshark</h1>
<p>Primary usage of wireshark is to visualize packets coming from traditional IP traffic, that is why default wireshark settings provides a relatively good overview of IP packets for most of the use cases.</p>
<p>The problem is that this configuration is not at all suitable for specific needs of Telecom traffic analysis, and does not give you a quick vision when you are working on an SS7 Pcap.</p>
<p>Here is an example of SS7 traffic using default wireshark settings:</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_no_color_rules_mobicents.png"><img class="alignnone size-large wp-image-65" alt="Labs_wireshark_no_color_rules_mobicents" src="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_no_color_rules_mobicents-1024x562.png" width="625" height="343" /></a>(click on image to enlarge)</p>
<p>With default wireshark configuration:</p>
<ul>
<li>You cannot see the interesting addresses in packet list view due to different addressing in SS7 and multiple layers involved.</li>
<li>You see only one color for all different SS7 traffic types, because wireshark pre-configures coloring only for standard protocols.</li>
</ul>
<h3>Why SS7 traffic is more complex to analyze</h3>
<p>First, <strong>SS7 Addressing is more complex than IP</strong> :<br />
Instead of only <strong>IP + port </strong>tuples to represent endpoints of IP communication, in SS7 you use <strong>Global Titles</strong> (GT), <strong>Point Codes</strong> (PC or SPC) and <strong>Sub-System Numbers</strong> (SSN), that can be used as follow:</p>
<ul>
<li>Global Title (GT)</li>
<li>Global Title + Sub-System Number (GT + SSN)</li>
<li>Point Code (PC)</li>
<li>Point Code + Sub-System Number (PC + SSN)</li>
<li>Sub-System Number (SSN)</li>
</ul>
<p>Secondly, their are <strong>much more network layers involved in Telecom traffic</strong> than on usual IP only traffic. On typical SS7 traffic you face in order:</p>
<ul>
<li>Ethernet</li>
<li>Multiprotocol Label Switching (MPLS)</li>
<li>Internet Protocol (IP)</li>
<li>Stream Control Transmission Protocol (SCTP)</li>
<li>MTP Level 3 (MTP3) User Adaptation Layer (M3UA)</li>
<li>Signalling Connection Control Part (SCCP)</li>
<li>Transaction Capabilities Application Part (TCAP)</li>
<li>Mobile Application Part (MAP)</li>
</ul>
<p>Each of these layer contains more parameters compared to IP.</p>
<p>Besides, many small packet flags are critically important, such as M3UA Network Indicator (Coded on 1 Byte, it represents the type of SS7 link : Internal, National or International).</p>
<h1>Customize your wireshark</h1>
<h2>Customize Wireshark columns</h2>
<p>You can customize the display columns of Wireshark to show GT and SSN in the packet list view, and do this in a separate profile to have different views on your packet depending of your activity.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/wireshark_ss7_columns_anon.png"><img alt="wireshark_ss7_columns_anon" src="http://labs.p1sec.com/wp-content/uploads/2013/04/wireshark_ss7_columns_anon-1024x587.png" width="663" height="379" /></a></p>
<p>(click on image to enlarge)</p>
<h3>How to configure column display (wireshark &gt;= 1.8.0)</h3>
<ol>
<li>Create a new profile : Go to &#8220;Edit &gt; Configuration Profiles&#8221;, click on Add and call it &#8220;SS7&#8243;.</li>
<li>Add a column: Right click on the packet list view column titles and go in &#8220;Column Preferences&#8221;. In this window, click on &#8220;Add&#8221; to add a column, and set it&#8217;s name by clicking on it in the columns list.</li>
<li>Set the field type in the &#8220;Field Type&#8221; of your new column, select &#8220;Custom&#8221;. Now you can enter your wireshark expression in &#8220;Field Name&#8221;, for example sccp.calling.digits or sccp.called.ssn.</li>
<li>Click on &#8220;Apply&#8221;: you will have your new column in your Wireshark packet list view.</li>
</ol>
<p>NOTE: This can be generalized to any Wireshark expression, so you can display any data you want from the pcap in the columns view.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/wireshark_ss7_columns_conf.png"><img alt="wireshark_ss7_columns_conf" src="http://labs.p1sec.com/wp-content/uploads/2013/04/wireshark_ss7_columns_conf-1024x592.png" width="625" height="361" /></a></p>
<p>(click on image to enlarge)</p>
<h3>Exporting / Importing columns setting</h3>
<p>The following file stores the configuration for your Wireshark profile:</p>
<p><i>/home/user/</i>.wireshark./profiles/SS7/preferences</p>
<p>Example:</p>
<pre>[...]
# Packet list column format.
# Each pair of strings consists of a column title and its format.
gui.column.format:
	"No.", "%m",
	"Time", "%t",
	"cgGT", "%Cus:sccp.calling.digits:0:R",
	"cgSSN", "%Cus:sccp.calling.ssn:0:R",
	"cdGT", "%Cus:sccp.called.digits:0:R",
	"cdSSN", "%Cus:sccp.called.ssn:0:R",
	"Protocol", "%p",
	"Length", "%L",
	"Info", "%i"
[...]</pre>
<h2>Customize Wireshark coloring rules</h2>
<p>To get a better overview of the SS7 traffic and identify types of messages just by looking quickly at them, you can customize wireshark coloring rules. Each rule is defined by one filter (using the same syntax as usual wireshark display filters), and a set of 2 colors (foreground and background colors).</p>
<p>Here is an overview of 4 basic coloring rules applied on typical SS7 traffic: <a href="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_color_rules_04_anon.png"><img class="alignnone size-large wp-image-61" alt="Labs_wireshark_color_rules_04_anon" src="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_color_rules_04_anon-1024x562.png" width="625" height="343" /></a></p>
<p>(click on image to enlarge)</p>
<p>On the above screenshot, MAP layer is identified by yellow or green background color, whether the message is a MAP invoke (request) or MAP returnResultLast (answer).TCAP Abort (cancellation of TCAP dialog due to error) has a pink background, and TCAP Begin (initialization of TCAP dialog) has a light blue background (Not visible on the screenshot).</p>
<h3>How to configure coloring rules (wireshark &gt;= 1.8.0)</h3>
<ol>
<li>Go to &#8220;View &gt; Coloring Rules&#8221;.</li>
<li>Click on &#8220;New&#8221; to add a new rule.</li>
<li>Enter a wireshark display filter in &#8220;String:&#8221; text box. For example, to match MAP invoke messages you can use the filter &#8220;gsm_map.old.Component == 1&#8243;.</li>
<li>Choose one foreground and one background color for this filter, then click &#8220;OK&#8221;</li>
</ol>
<p>NOTE: coloring rules will be tried in order until one filter matches, top filter having the highest priority.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_color_rules_02.png"><img class="alignnone size-full wp-image-44" alt="Labs_wireshark_color_rules_02" src="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_color_rules_02.png" width="750" height="679" /></a></p>
<p>(click on image to enlarge)</p>
<h3>Exporting / Importing coloring rules</h3>
<ol>
<li>Go to &#8220;View &gt; Coloring Rules&#8221;.</li>
<li>Optional: select one or more filtering rules to export by clicking on them. (Ctrl + Click to select multiple filters).</li>
<li>Click on &#8220;Export&#8221;.</li>
<li>Choose an output filename and optionally check the box &#8220;Export only selected filters&#8221;.</li>
</ol>
<p>You will get a file like <a href="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_colorfilters_ss7.txt">this one</a>:</p>
<pre># DO NOT EDIT THIS FILE!  It was created by Wireshark
@MAP ReturnResultLast@gsm_map.old.Component == 2@[61023,65535,29648][0,0,0]
@MAP Invoke@gsm_map.old.Component == 1@[37006,53439,22070][0,0,0]
@TCAP abort@tcap.abort@[65535,52907,60113][0,0,0]
@TCAP begin@tcap.begin@[36382,59634,65535][0,0,0]</pre>
<p>This file can then be used to import coloring rules on another host.</p>
<p>&nbsp;</p>
<p>That&#8217;s it ! Don&#8217;t hesitate to comment with you&#8217;re own Wireshark tricks.</p>
<p>In a future blogpost, we&#8217;ll see how to use Wireshark to edit a PCAP, in order to forge packets or anonimize a PCAP file.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/04/04/ss7-traffic-analysis-with-wireshark/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
