<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>P1 Labs</title>
	<atom:link href="http://labs.p1sec.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://labs.p1sec.com</link>
	<description>P1 Security Labs</description>
	<lastBuildDate>Wed, 31 Dec 2014 00:24:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>SS7map: SS7 country risk ratings</title>
		<link>http://labs.p1sec.com/2014/12/28/ss7map-country-risk-ratings/</link>
		<comments>http://labs.p1sec.com/2014/12/28/ss7map-country-risk-ratings/#comments</comments>
		<pubDate>Sun, 28 Dec 2014 15:34:28 +0000</pubDate>
		<dc:creator><![CDATA[Laurent Ghigonis]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[SS7map]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=705</guid>
		<description><![CDATA[Mobile Network Operators rely on a network different from Internet that interconnects operators and other parties, to allow calls to work between operators especially when you are in another country (roaming). This is what is called the &#8220;SS7 network&#8221; a.k.a. &#8220;International Roaming I...]]></description>
				<content:encoded><![CDATA[<p>Mobile Network Operators rely on a network different from Internet that interconnects operators and other parties, to allow calls to work between operators especially when you are in another country (roaming).<br />
This is what is called the <strong>&#8220;SS7 network&#8221;</strong> a.k.a. &#8220;International Roaming Infrastructure&#8221;, that by it&#8217;s nature, transmits <strong>confidential customers and operators information</strong>.</p>
<p>In <a href="http://ss7map.p1sec.com" target="_blank">SS7map</a>, we are presenting the <strong>first cartography of SS7 International Roaming Infrastructure vulnerabilities</strong>, to push the industry to react, and show to all of us customers the security level of the infrastructure we are all using.</p>
<p>For decades the SS7 network has been used by Intelligence agencies and various entities to <strong>track location</strong> of customers and help in the <strong>interception of calls and SMS</strong>. It&#8217;s time to have visibility on <strong>which country is taking care of these issues</strong> and protecting their population. The SS7 network is obscure, and mapping it is a step towards better security.</p>
<p>Our first release presents SS7 Roaming Infrastructure <strong>ratings for countries worldwide</strong>. The project is still in an early stage and we have work to do to offer a precise vision, but for the first time there is a public worldwide view on the security of this vital core network.</p>
<p><a href="http://ss7map.p1sec.com/" target="_blank"><img class="alignnone wp-image-746 size-medium" src="http://labs.p1sec.com/wp-content/uploads/2014/12/ss7map_screenshot-300x169.png" alt="ss7map_screenshot" width="300" height="169" /></a></p>
<h1>SS7map Ratings</h1>
<p>SS7map ratings are separated in 3 categories:</p>
<ul>
<li><strong>Privacy Leaks</strong>: How much the operators of a given country are leaking out subscriber privacy data such as location of their subscribers to anyone on the SS7 network.<br />
Any operator and many company offering location / SMS services can gather these informations.</li>
<li><strong>Network Exposure</strong>: Network Elements exposed and security mechanism implemented by operators of a given country. It shows the attack surface of the Telecom Network of a country from the SS7 perspective.</li>
<li><strong>Global risk</strong>: This combines Privacy Leaks and Network Exposure, giving more importance to Privacy Leaks.</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The country ratings for these 3 categories are showed on the <a href="http://ss7map.p1sec.com" target="_blank">SS7map website main</a> page by colors on the map.</p>
<p>On the <a href="http://ss7map.p1sec.com/country/United%20Kingdom/" target="_blank">per-country pages</a> we show also subscores for Privacy Leaks and Network Exposure, explained below.</p>
<h2>Privacy Leaks</h2>
<p>In Privacy Leaks we regroup leaks of customers information of all operators in a country:</p>
<ul>
<li>Subscriber location leak</li>
<li>Subscriber private informations (identifiers, cryptographic keys, postpaid/prepaid status)</li>
<li>Subscriber communications confidentiality (decryption of SMS/calls using known attacks)</li>
</ul>
<p>&nbsp;</p>
<p>Gathering privacy related informations on the SS7 Network is mainly done by sending SS7 Mobile Application Part (MAP) messages. They are numerous SS7 MAP messages related to privacy, as show on this diagram:</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/12/ss7map_privacyleak_diagram.png" target="_blank"><img class="alignnone wp-image-719 size-medium" src="http://labs.p1sec.com/wp-content/uploads/2014/12/ss7map_privacyleak_diagram-300x169.png" alt="ss7map_privacyleak_diagram" width="300" height="169" /></a></p>
<p>The answers from the operators of a particular country are processed and then a score is attributed following this formula:</p>
<pre style="color: #808080; padding-left: 30px;">privacyleak =
  150 * leak_locationcell
+ 100 * leak_privateinfos
+  60 * net_homerouting
+  50 * leak_authvectors
+  40 * leak_subscriberplan
+  10 * net_homerouting_defeated_ati
+  10 * net_homerouting_defeated_psi
+  10 * leak_location</pre>
<p>&nbsp;</p>
<p>We are using the following subscores for Privacy Leaks rating:</p>
<h4>MAP messages vulnerabilities discloses precise subscriber location (200m) (leak_locationcell)</h4>
<p><em>How operators in the country are protecting subscribers precise street-level (200m) location from other countries and external parties ?</em></p>
<p>This score is based on answers to the following SS7 MAP messages:</p>
<ul>
<li>ATI: Any-Time-Interrogation, to gather MSC and Cell-ID from HLR</li>
<li>PSI: Provide-Subscriber-Information, to gather Cell-ID directly from MSC</li>
</ul>
<h4></h4>
<h4>Number of different MAP messages vulnerabilities disclosing subscriber private information (leak_privateinfos)</h4>
<p><em>How operators in the country are protecting subscribers private unique identifier (IMSI) ?</em></p>
<p>Gathering IMSI allows attackers to gather further informations on a subscriber.</p>
<p>This score is based on answers to the following SS7 MAP messages:</p>
<ul>
<li>SRISM: Send-Routing-Information-for-Short-Message, to gather IMSI from HLR</li>
<li>SRI: Send-Routing-Info, to gather IMSI from HLR</li>
</ul>
<p>&nbsp;</p>
<h4>Number of different MAP messages vulnerabilities disclosing subscriber location (leak_location)</h4>
<p><em>How operators in the country are protecting subscribers city-level (50km) location from other countries and external parties ?</em></p>
<p><span style="color: #333333;">This score is based on answers to the following SS7 MAP messages:</span></p>
<ul>
<li><span style="color: #333333;">SRISM: Send-Routing-Information-for-Short-Message, to gather MSC from HLR</span></li>
<li><span style="color: #333333;">SRI: Send-Routing-Info, to gather MSC from HLR</span></li>
<li><span style="color: #333333;">ATI: Any-Time-Interrogation, to gather MSC from HLR</span></li>
</ul>
<p>&nbsp;</p>
<h4>Leak of subscriber keys (Network Impersonation possible) (leak_authvectors)</h4>
<p><em>How operators in the country are protecting subscribers against decryption of calls and SMS by attackers ?</em></p>
<p>This score is based on answers to the following SS7 MAP messages:</p>
<ul>
<li>SAI: Send-Authentication-Info, to gather Authentication vectors from HLR</li>
</ul>
<p>&nbsp;</p>
<h4>Leak of prepaid/postpaid subscriber status (leak_subscriberplan)</h4>
<p><em>How operators in the country are protecting informations about subscriber account, like the postpaid/prepaid options of the subscription ?</em></p>
<p>This score is based on answers to the following SS7 MAP messages:</p>
<ul>
<li>INTSS: Interrogate-SS, to gather subscriber plan informations from MSC/VLR</li>
</ul>
<p>&nbsp;</p>
<h4>Leak of subscriber location through Home Routing bypass (net_homerouting, net_homerouting_defeated_psi, net_homerouting_defeated_ati)</h4>
<p><em>Are operators in the country using protection mechanism to hide subscriber location from other operators / third-parties ?</em></p>
<p>This score is based on answers to the following SS7 MAP messages:</p>
<ul>
<li>SRISM: Send-Routing-Information-for-Short-Message, to gather informations from HLR</li>
<li>ATI: Any-Time-Interrogation, to gather informations from HLR</li>
<li>PSI: Provide-Subscriber-Information, to gather informations from MSC</li>
</ul>
<p>&nbsp;</p>
<h2>Network Exposure</h2>
<p>In Network Exposure our focus is the Core Networks of operators in a country:</p>
<ul>
<li>Attack surface of the Operators (network topology, identification of the network nodes (a.k.a Network Elements)</li>
<li>Network misconfigurations allowing attackers to modify data</li>
<li>Bypass of Network security mecanisms</li>
</ul>
<p>&nbsp;</p>
<p>We map operators Network Exposure of a country by sending<i> </i>SS7 Transaction Capabilites Application Part (TCAP) and SS7 Mobile Applicaiton Part (MAP) messages, as shown on this diagram:</p>
<h4><a href="http://labs.p1sec.com/wp-content/uploads/2014/12/ss7map_networkexposure_diagram.png" target="_blank"><img class="alignleft wp-image-720 size-medium" src="http://labs.p1sec.com/wp-content/uploads/2014/12/ss7map_networkexposure_diagram-300x169.png" alt="ss7map_networkexposure_diagram" width="300" height="169" /></a></h4>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The formula for Network Exposure calculation is the following:</p>
<pre style="padding-left: 30px;"><span style="color: #808080;">networkexposure = </span>
<span style="color: #808080;">  200 * net_fingerprint_ne</span>
<span style="color: #808080;">+ 100 * net_homerouting</span>
<span style="color: #808080;">+ 30 * net_homerouting_defeated_ati</span>
<span style="color: #808080;">+ 30 * net_homerouting_defeated_psi</span>
<span style="color: #808080;">+ 50 * leak_location
+ 40 * leak_subscriberplan</span>
<span style="color: #808080;">+ 20 * leak_locationcell</span>
<span style="color: #808080;">+ 10 * leak_authvectors</span>
<span style="color: #808080;">+ 10 * net_ne</span>
<span style="color: #808080;">+ 5 * net_directanswer</span></pre>
<p>&nbsp;</p>
<p>We are using the following subscores for Network Exposure rating:</p>
<h4>Network Elements fingerprint (net_fingerprint_ne)</h4>
<p><em>Are the operators revealing the type of Network Elements they are using ?</em></p>
<p>This score is based on answers to the following SS7 messages:</p>
<ul>
<li>SRISM: Send-Routing-Information-for-Short-Message, to gather network informations from HLR</li>
<li>SRI: Send-Routing-Info, to gather network informations from HLR</li>
<li>ATI: Any-Time-Interrogation, to gather network informations from HLR</li>
<li>PSI: Provide-Subscriber-Information, to gather network informations from MSC</li>
<li>TCAP, to gather network informations from all Network Elements</li>
</ul>
<h4></h4>
<h4>SCCP discovery attack surface (net_ne)</h4>
<p><em>Are the operators exposing a lot of Network Elements or disclosing there Network Topology ?</em></p>
<p>This score is based on answers to the following SS7 messages:</p>
<ul>
<li>SRISM: Send-Routing-Information-for-Short-Message, to gather network informations from HLR</li>
<li>SRI: Send-Routing-Info, to gather network informations from HLR</li>
<li>ATI: Any-Time-Interrogation, to gather network informations from HLR</li>
<li>PSI: Provide-Subscriber-Information, to gather network informations from MSC</li>
<li>TCAP, to gather network informations from all Network Elements</li>
</ul>
<p>&nbsp;</p>
<h4>Potential change of prepaid/postpaid status (fraud) (net_directanswer, leak_subscriberplan)</h4>
<p><em>Do the operators allow change on subscriber information from anyone, allowing potential fraud ?</em></p>
<p>This score is based on answers to the following SS7 MAP messages:</p>
<ul>
<li>INTSS, REGSS: Interrogate-SS, Register-SS, to gather MSC/VLR configuration</li>
</ul>
<p>&nbsp;</p>
<h4>Home Routing (net_homerouting)</h4>
<p><em>Are the operators using protection mechanism (Home Routing) to hide customer location and private identifiers ?</em></p>
<p>This score is based on answers to the following SS7 MAP messages:</p>
<ul>
<li>SRISM: Send-Routing-Information-for-Short-Message, to gather network informations from HLR</li>
<li>SRI: Send-Routing-Info, to gather network informations from HLR</li>
<li>ATI: Any-Time-Interrogation, to gather network informations from HLR</li>
</ul>
<p>&nbsp;</p>
<h4>Leak of internal topology through Home Routing bypass (net_homerouting, net_homerouting_defeated_psi, net_homerouting_defeated_ati)</h4>
<p><em>Is Home Routing susceptible to bypass, revealing real Network Topology ?</em></p>
<p>This score is based on answers to the following SS7 MAP messages:</p>
<ul>
<li>SRISM: Send-Routing-Information-for-Short-Message, to gather network informations from HLR</li>
<li>SRI: Send-Routing-Info, to gather network informations from HLR</li>
<li>ATI: Any-Time-Interrogation, to gather network informations from HLR</li>
<li>PSI: Provide-Subscriber-Information, to gather network informations from MSC</li>
</ul>
<p>&nbsp;</p>
<h2>Global Risk</h2>
<p>Global Risk combines Privacy Leaks and Network Exposure, using the following formula:</p>
<pre style="padding-left: 30px;"><span style="color: #808080;">globalrisk =</span>
<span style="color: #808080;">  5 * privacyleak</span>
<span style="color: #808080;">+ 1 * networkexposure</span></pre>
<p>&nbsp;</p>
<p>These ratings are going to evolve as we continue our research, we will post notifications accordingly.</p>
<p><a href="http://eepurl.com/baeFU5" target="_blank">Register</a> to get email news about SS7map.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/12/28/ss7map-country-risk-ratings/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>[31C3] SS7map : mapping vulnerability of the international mobile roaming infrastructure at #31C3</title>
		<link>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/</link>
		<comments>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/#comments</comments>
		<pubDate>Fri, 05 Dec 2014 13:38:41 +0000</pubDate>
		<dc:creator><![CDATA[Alexandre De Oliveira]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Projects]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[MAP]]></category>
		<category><![CDATA[Mapping]]></category>
		<category><![CDATA[sigtran]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[SS7map]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=677</guid>
		<description><![CDATA[Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014. The conference &#8220;SS7map : mapping vulnerability of the international mobile roaming infrastructure&#8221; will ...]]></description>
				<content:encoded><![CDATA[<p>Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014.</p>
<p>The conference &#8220;<strong>SS7map : mapping vulnerability of the international mobile roaming infrastructure</strong>&#8221; will focus on the method used to map the global SS7 network, what have been map the network and more in depth statistics and analysis.</p>
<p>Details of the conference schedule:<br />
Start time: 2014-12-27 23:00:00 +0100<br />
Room: Saal 6</p>
<p>CCC is one of the main security event in Europe, it will take place from 27th Dec to 30th Dec 2014.</p>
<p>See you at #31C3 !</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SS7map risk rating calculation</title>
		<link>http://labs.p1sec.com/2014/09/11/ss7map-risk-index-calculation/</link>
		<comments>http://labs.p1sec.com/2014/09/11/ss7map-risk-index-calculation/#comments</comments>
		<pubDate>Thu, 11 Sep 2014 10:16:14 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Projects]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=592</guid>
		<description><![CDATA[Details about SS7map risk rating calculation are coming soon after our presentation at 31C3 ! You can subscribe here to be notified: http://eepurl.com/baeFU5...]]></description>
				<content:encoded><![CDATA[<h1></h1>
<p>Details about SS7map risk rating calculation are coming soon after our presentation at 31C3 !</p>
<p>You can subscribe here to be notified: <a title="here" href="http://eepurl.com/baeFU5" target="_blank">http://eepurl.com/baeFU5</a></p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/09/11/ss7map-risk-index-calculation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>[Hackito Ergo Sum 2014] Hacking Telco Equipment: The HLR/HSS</title>
		<link>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/</link>
		<comments>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/#comments</comments>
		<pubDate>Wed, 07 May 2014 18:11:57 +0000</pubDate>
		<dc:creator><![CDATA[Laurent Ghigonis]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[Diameter]]></category>
		<category><![CDATA[fuzzing]]></category>
		<category><![CDATA[hlr]]></category>
		<category><![CDATA[hss]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[system]]></category>
		<category><![CDATA[virtualization]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=529</guid>
		<description><![CDATA[P1 Security presented at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/) the weaknesses of Telecom Infrastructure systems, and particularly HLR/HSS equipment. Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis from P1Security Download slides here. Abstract: HLR...]]></description>
				<content:encoded><![CDATA[<p style="color: #b30f25;"><span style="color: #505050;">P1 Security presented at the Hackito Ergo Sum 2014 conference in Paris (</span><a style="color: #ea6315;" href="http://2014.hackitoergosum.org/">http://2014.hackitoergosum.org/</a><span style="color: #505050;">) the weaknesses of Telecom Infrastructure systems, and particularly HLR/HSS equipment.</span></p>
<p><iframe style="border: 1px solid #CCC; border-width: 1px 1px 0; margin-bottom: 5px; max-width: 100%;" src="http://www.slideshare.net/slideshow/embed_code/34291135" width="597" height="486" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" allowfullscreen="allowfullscreen"> </iframe></p>
<div style="margin-bottom: 5px;"><strong> <a title="Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis" href="https://www.slideshare.net/p1sec/day1-hacking-telcoequipmentthehlrhsslaurentghigonisp1sec" target="_blank">Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis</a> </strong> from <strong><a href="http://www.slideshare.net/p1sec" target="_blank">P1Security</a></strong></div>
<p>Download slides <a href="http://2014.hackitoergosum.org/slides/day1_Hacking-telco-equipment-The-HLR-HSS-Laurent-Ghigonis-p1sec.pdf">here</a>.</p>
<p>Abstract:</p>
<p>HLR and HSS are the most important Telecom Equipment in an Operator Core Network.<br />
We are going to see that this so-called “Critical Infrastructure” is not as robust as you could think, by exploring the some weaknesses of the HLR/HSS equipment.</p>
<p>Plan:<br />
* Virtualization of HLR/HSS, for instrumentation purposes<br />
* HLR/HSS system analysis<br />
* SS7/Diameter network fuzzing<br />
* HLR/HSS binaries reverse</p>
<p>We also did another presentation on <a style="color: #ea6315;" href="http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/">Worldwide attacks on SS7/SIGTRAN network</a> at HES.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/05/07/hackito-ergo-sum-2014-hacking-telco-equipment-the-hlrhss/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>[Hackito Ergo Sum 2014] Worldwide attacks on SS7/SIGTRAN network</title>
		<link>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/</link>
		<comments>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/#comments</comments>
		<pubDate>Fri, 02 May 2014 13:59:34 +0000</pubDate>
		<dc:creator><![CDATA[Pierre-Olivier Vauboin]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[MAP]]></category>
		<category><![CDATA[sigtran]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=516</guid>
		<description><![CDATA[We are pleased to announce that P1 Security was present at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/). Worldwide attacks on SS7/SIGTRAN network from P1Security Download slides here. Abstract: Mobile telecommunication networks are complex and provide a wide range ...]]></description>
				<content:encoded><![CDATA[<p>We are pleased to announce that P1 Security was present at the Hackito Ergo Sum 2014 conference in Paris (<a href="http://2014.hackitoergosum.org/">http://2014.hackitoergosum.org/</a>).</p>
<p><center><iframe style="border: 1px solid #CCC; border-width: 1px 1px 0; margin-bottom: 5px; max-width: 100%;" src="http://www.slideshare.net/slideshow/embed_code/34023721" width="597" height="486" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" allowfullscreen="allowfullscreen"></iframe></p>
<div style="margin-bottom: 5px;"><strong> <a title="Worldwide attacks on SS7/SIGTRAN network" href="https://www.slideshare.net/p1sec/worldwide-attacks-onss7networkp1securityhackito2014" target="_blank">Worldwide attacks on SS7/SIGTRAN network</a> </strong> from <strong><a href="http://www.slideshare.net/p1sec" target="_blank">P1Security </a></strong></div>
<p></center></p>
<p>Download slides <a href="http://2014.hackitoergosum.org/slides/day3_Worldwide_attacks_on_SS7_network_P1security_Hackito_2014.pdf">here</a>.</p>
<p>Abstract:</p>
<p>Mobile telecommunication networks are complex and provide a wide range of services, making them a tempting target for fraudsters and for intelligence agencies. Moreover, the architecture, equipment and protocols used on these networks were never designed with security in mind, availability being the first concern. Today, even though some telecom operators are investing money into securing their network, events confirm that for most of them maturity in term of security is yet to come, as recently shown with the example of massive traffic interception on compromised SCCP and GRX providers like Belgacom’s BICS. Here we present the most typical and legitimate telecom callflows from making a mobile phone call to sending a SMS. Then we describe the protocol layers involved and how to abuse them, which fields can be manipulated in order to attack both the operator infrastructure and its subscribers. Finally, we show a real life example of scan performed from an international SS7 interconnection and practical attacks on subscribers such as spam, spoofed SMS and user location tracking.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>4G Wireshark Dissector based on Samsung USB stick</title>
		<link>http://labs.p1sec.com/2013/08/18/4g-wireshark-dissector-based-on-samsung-usb-stick/</link>
		<comments>http://labs.p1sec.com/2013/08/18/4g-wireshark-dissector-based-on-samsung-usb-stick/#comments</comments>
		<pubDate>Sun, 18 Aug 2013 14:16:14 +0000</pubDate>
		<dc:creator><![CDATA[Ramtin Amin]]></dc:creator>
				<category><![CDATA[LTE]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=394</guid>
		<description><![CDATA[After having analyzed the Samsung Stick firmware, it was time to make something useful out of it. When first plugged into a linux machine, it appears to be a usb Storage. With the help of usb_modswitch, it is possible to activate the ttyUSB device, as well as the control device. Here is the output o...]]></description>
				<content:encoded><![CDATA[<p style="clear: both;">After having analyzed the Samsung Stick firmware, it was time to make something useful out of it. When first plugged into a linux machine, it appears to be a usb Storage.<br />
With the help of usb_modswitch, it is possible to activate the ttyUSB device, as well as the control device.<br />
Here is the output of a lsusb</p>
<pre style="color: white; background-color: black; overflow: auto;"><code>
# lsusb 
Bus 001 Device 038: ID 04e8:689a Samsung Electronics Co., Ltd LTE Storage Driver [CMC2xx]
Bus 002 Device 002: ID 05ca:18c2 Ricoh Co., Ltd 
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 005 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 006 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
</code></pre>
<p style="clear: both;">The command line for the usb_modswitch would be:</p>
<pre style="color: white; background-color: black; overflow: auto;"><code>
usb_modeswitch -W -v 0x04e8 -p 0x689a -I -M '55534243785634120100000080000601000000000000000000000000000000' 
</code></pre>
<p style="clear: both;">Here is an output log:</p>
<pre style="color: white; background-color: black; overflow: auto;"><code>
# usb_modeswitch -W -v 0x04e8 -p 0x689a -I -M '55534243785634120100000080000601000000000000000000000000000000' 
Taking all parameters from the command line

 * usb_modeswitch: handle USB devices with multiple modes
 * Version 1.2.3 (C) Josua Dietze 2012
 * Based on libusb0 (0.1.12 and above)

 ! PLEASE REPORT NEW CONFIGURATIONS !

DefaultVendor=  0x04e8
DefaultProduct= 0x689a
TargetVendor=   not set
TargetProduct=  not set
TargetClass=    not set
TargetProductList=""

DetachStorageOnly=0
HuaweiMode=0
SierraMode=0
SonyMode=0
QisdaMode=0
GCTMode=0
KobilMode=0
SequansMode=0
MobileActionMode=0
CiscoMode=0
MessageEndpoint=  not set
MessageContent="55534243785634120100000080000601000000000000000000000000000000"
NeedResponse=0
ResponseEndpoint= not set

InquireDevice disabled
Success check disabled
System integration mode disabled

usb_set_debug: Setting debugging level to 15 (on)
usb_os_find_busses: Found 006
usb_os_find_busses: Found 005
usb_os_find_busses: Found 004
usb_os_find_busses: Found 003
usb_os_find_busses: Found 002
usb_os_find_busses: Found 001
usb_os_find_devices: Found 001 on 006
skipping descriptor 0x30
skipped 1 class/vendor specific endpoint descriptors
usb_os_find_devices: Found 001 on 005
usb_os_find_devices: Found 001 on 004
usb_os_find_devices: Found 001 on 003
usb_os_find_devices: Found 002 on 002
skipping descriptor 0xB
skipped 1 class/vendor specific endpoint descriptors
skipped 5 class/vendor specific interface descriptors
skipping descriptor 0x25
skipped 1 class/vendor specific endpoint descriptors
skipped 18 class/vendor specific interface descriptors
usb_os_find_devices: Found 001 on 002
error obtaining child information: Inappropriate ioctl for device
usb_os_find_devices: Found 038 on 001
usb_os_find_devices: Found 001 on 001
error obtaining child information: Inappropriate ioctl for device
Looking for default devices ...
  searching devices, found USB ID 1d6b:0003
  searching devices, found USB ID 1d6b:0002
  searching devices, found USB ID 1d6b:0001
  searching devices, found USB ID 1d6b:0001
  searching devices, found USB ID 05ca:18c2
  searching devices, found USB ID 1d6b:0002
  searching devices, found USB ID 04e8:689a
   found matching vendor ID
   found matching product ID
   adding device
  searching devices, found USB ID 1d6b:0002
 Found device in default mode, class or configuration (1)
Accessing device 038 on bus 001 ...
Getting the current device configuration ...
USB error: error sending control message: Connection timed out
Error getting the current configuration (error -110). Assuming configuration 1.
Using first interface: 0x00
Using endpoints 0x06 (out) and 0x85 (in)

USB description data (for identification)
-------------------------
Manufacturer: not provided
     Product: not provided
  Serial No.: not provided
-------------------------
Looking for active driver ...
 OK, driver found ("usb-storage")
 OK, driver "usb-storage" detached
Setting up communication with interface 0
Using endpoint 0x06 for message sending ...
Trying to send message 1 to endpoint 0x06 ...
 OK, message successfully sent
Resetting response endpoint 0x85
USB error: could not clear/halt ep 133: Connection timed out
 Could not reset endpoint (probably harmless): -110
Resetting message endpoint 0x06
-&gt; Run lsusb to note any changes. Bye.
</code></pre>
<p style="clear: both;">So after that, a new lsusb would show us:</p>
<pre style="color: white; background-color: black; overflow: auto;"><code>
# lsusb 
Bus 001 Device 040: ID 04e8:6889 Samsung Electronics Co., Ltd GT-B3730 Composite LTE device (Commercial)
Bus 002 Device 002: ID 05ca:18c2 Ricoh Co., Ltd 
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 005 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 006 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
</code></pre>
<p style="clear: both;">In order to have a device descriptor for the stick, we need to modify the linux driver already available.</p>
<p><a class="magnify" href="https://github.com/mkotsbak/linux-2.6/blob/Samsung_kalmia_driver-3.0/drivers/net/usb/kalmia.c" target="_blank">https://github.com/mkotsbak/linux-2.6/blob/Samsung_kalmia_driver-3.0/drivers/net/usb/kalmia.c</a></p>
<p style="clear: both;">The new file kalmia.c is present <a class="magnify" href="https://github.com/P1sec/LTE_monitor_c2xx/blob/master/kernel/kalmia/kalmia.c" target="_blank">HERE</a><br />
. (Special thx to Xavier Martin for his this)<br />
and I added the Makefile that let me compile it</p>
<pre style="color: white; background-color: black; overflow: auto;"><code>
obj-m += kalmia.o

all:
	make -C /lib/modules/$(shell uname -r)/build M=$(PWD) modules

clean:
	make -C /lib/modules/$(shell uname -r)/build M=$(PWD) clean
</code></pre>
<p style="clear: both;">Now 2 new devices are present:</p>
<pre style="color: white; background-color: black; overflow: auto;"><code>
	/dev/ttyUSB0
	/dev/c2xx
</code></pre>
<p style="clear: both;">Now the /dev/c2xx device will give us all the debug packet, including NAS and RRC, so we could look at them with wireshark.<br />
In order to do that, we need a wireshark dissector that: <a class="magnify" href="https://github.com/P1sec/LTE_monitor_c2xx/blob/master/wireshark/epan/dissectors/packet-c2xx.c" target="_blank">packet-c2xx.c</a><br />
As seen on the following picture, the dissector takes a packet that we named c2xx.</p>
<p><img title="ETH_C2xx" alt="" src="http://ramtin-amin.fr/img/ETH_C2XX.png" /></p>
<p style="clear: both;">This packet is itself composed of a header, a HDLC flag, and a frame.</p>
<p><img title="C2xx" alt="" src="http://ramtin-amin.fr/img/C2XX.png" /></p>
<p style="clear: both;">Packet containing NAS are then visible</p>
<p><img title="C2xx" alt="" src="http://ramtin-amin.fr/img/NAS.png" width="800" height="450" /></p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/08/18/4g-wireshark-dissector-based-on-samsung-usb-stick/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Samsung LTE USB stick GT-B3730/B3740 hacking</title>
		<link>http://labs.p1sec.com/2013/08/05/samsung-lte-usb-stick-gt-b3730b3740-hacking/</link>
		<comments>http://labs.p1sec.com/2013/08/05/samsung-lte-usb-stick-gt-b3730b3740-hacking/#comments</comments>
		<pubDate>Mon, 05 Aug 2013 15:53:11 +0000</pubDate>
		<dc:creator><![CDATA[Ramtin Amin]]></dc:creator>
				<category><![CDATA[LTE]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[Tools]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=379</guid>
		<description><![CDATA[Samsung LTE USB stick GT-B3730/B3740 Samsung LTE USB dongles codename Kalmia I acquired a couple of GT-B3740 800Mhz LTE Dongle, and decided to open one of them to find out what the chipset was used in it. The very surprizing part was to see that it had a JTAG connector there and it was written JTAG ...]]></description>
				<content:encoded><![CDATA[<h1>Samsung LTE USB stick GT-B3730/B3740</h1>
<h2>Samsung LTE USB dongles codename Kalmia</h2>
<p><a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/Kalmia_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/Kalmia_small.png" alt="" width="489" height="652" /></a></p>
<p style="clear: both;">I acquired a couple of GT-B3740 800Mhz LTE Dongle, and decided to open one of them to find out what the chipset was used in it.</p>
<p><a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/GT-B3740_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/GT-B3740_small.png" alt="" width="652" height="489" /></a></p>
<p style="clear: both;">The very surprizing part was to see that it had a JTAG connector there and it was written JTAG !<br />
So after looking for some documentations about it, another interesting thing came. Googling a bit let me find the Service Manual of the device !</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/B3740_TOPLEVEL.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/B3740_TOPLEVEL.png" alt="" width="718" height="475" /></a></p>
<p style="clear: both;">Even more surprizing, there was a schematic in there, with the JTAG pinout description!</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/JTAG_HEADER.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/JTAG_HEADER.png" alt="" width="387" height="216" /></a></p>
<p style="clear: both;">After some investigation, I found the connector DATASHEET: <a href="http://www3.panasonic.biz/ac/e_download/control/connector/base-fpc/catalog/con_eng_f4s.pdf?via=ok" target="_blank">http://www3.panasonic.biz/ac/e_download/control/connector/base-fpc/catalog/con_eng_f4s.pdf?via=ok</a> It is in fact a PANASONIC AXT512124.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/Panasonic_conn.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/Panasonic_conn.png" alt="" width="517" height="93" /></a></p>
<p style="clear: both;">One can find those at Digikey or Mouser.<br />
So THE problem with those connector is the size. In fact, any soldering iron would melt the connector before being able to soler anything to it. So there is no other way than finding the Female connector and extending it. My first attemp was a failure. In fact, I tried to do it with a flex based copper sheet and PNPBlue. here is the result</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/JTAG_FLEX.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/JTAG_FLEX.png" alt="" width="128" height="192" /></a></p>
<p style="clear: both;">In fact, the clearance is so low that it could only be done in a factory with a pick and place.<br />
Looking here and there, I found on Alibaba a multiple JTAG cable that looked quite similar.</p>
<p><a href="http://www.aliexpress.com/store/product/JTAG-JPin-JIG-Pinouts-by-RIFF-ORT-JPR-MEDUSA-BOX/927318_922669231.html" target="_blank">http://www.aliexpress.com/store/product/JTAG-JPin-JIG-Pinouts-by-RIFF-ORT-JPR-MEDUSA-BOX/927318_922669231.html</a></p>
<p>So I decided to buy one to give it a test. The thing is that you have to buy the whole set. At the time I&#8217;m writing, it&#8217;s price was $68.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/JTAG_MOORC.jpeg"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/JTAG_MOORC.jpeg" alt="" width="450" height="336" /></a></p>
<p>As one can see, the result is shown here under</p>
<p><a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/JTAG_CONNECTED_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/JTAG_CONNECTED_small.png" alt="" width="555" height="427" /></a></p>
<p>The interesting part about this cable is that the little adapter they give respects the JTAG pinout standard of the ARM, therefor, I could easily connect it with a Board to Board connector to a Amontek Jtag-Mini. So it was time to play with OpenOCD !<br />
Here is the configuration file used.</p>
<pre style="color: white; background-color: black; overflow: auto;"><code>
telnet_port 4444
#gdb_port 0
#tcl_port 0

jtag_khz    100000000
adapter_khz 100000000
#jtag_speed 3

reset_config trst_and_srst

jtag_nsrst_delay 400
jtag_ntrst_delay 400

if { [info exists CHIPNAME] } {
  set _CHIPNAME $CHIPNAME
} else {
  set _CHIPNAME cmc220
}

#reset_config none

if { [info exists CPU_TAPID ] } {
  set _CPU_TAPID $CPU_TAPID
} else {
  set _CPU_TAPID 0x4ba00477
}
jtag newtap $_CHIPNAME tap -irlen 4 -ircapture 0x1 -irmask 0x3 -expected-id $_CPU_TAPID

set _TARGETNAME $_CHIPNAME

target create $_TARGETNAME cortex_r4 -endian little -chain-position $_TARGETNAME.tap
</code></pre>
<p>So I managed to dump the Memory of the chip. And I got the firmware extracted. A couple of strings on the file shows that the file is REALLY verbose. All the debug symbols are there. All the printf are still there&#8230; It&#8217;s time to play with IDA pro !<br />
One interesting part is that I was able to tell IDA pro that the GDB Server is in fact OpenOCD. so IDA pro would go into debug mode and be able to step in the running code. Most of the time that would generate an interrupt tho. But that is quite good enough with some scripting to see what part of the Firmware is Code segment or Datasegment..</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/IDA_Graph.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/IDA_Graph.png" alt="" width="1425" height="863" /></a></p>
<p style="clear: both;">And as said earlyer, the amount of Strings debug is really big. Worth digging into it.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/IDA_STRINGS.png"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/IDA_STRINGS.png" alt="" width="695" height="528" /></a></p>
<p>In the meantime, I decided to get myself some GT-B3730 that does the 2.6Ghz LTE band as well as 2.75G and 3G. Hoping that they are similar.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2014/07/GT-B3730.jpg"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/GT-B3730.jpg" alt="" width="516" height="390" /></a></p>
<p>So Opening it showed me that it&#8217;s based on the same chip, which is connected to another chip in charge of the 2/3 G.</p>
<p><a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/G3730PCBA_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/G3730PCBA_small.png" alt="" width="275" height="367" /></a><br />
<a class="magnify" href="http://labs.p1sec.com/wp-content/uploads/2014/07/G3730PCBB_small.png" target="_blank"><img class="alignnone" title="Kalmia" src="http://ramtin-amin.fr/img/G3730PCBB_small.png" alt="" width="310" height="389" /></a></p>
<p>2 different Firmware are written in this one. mode A and B. A is LTE, B = 2/3 G. Therefor, in order to switch, it needs to reboot on its new firmware.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/08/05/samsung-lte-usb-stick-gt-b3730b3740-hacking/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Diameter vs SS7 from a security perspective</title>
		<link>http://labs.p1sec.com/2013/07/28/346/</link>
		<comments>http://labs.p1sec.com/2013/07/28/346/#comments</comments>
		<pubDate>Sun, 28 Jul 2013 22:34:42 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Diameter]]></category>
		<category><![CDATA[pcap]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[wireshark]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=346</guid>
		<description><![CDATA[On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side: From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy protocol (but still ...]]></description>
				<content:encoded><![CDATA[<p>On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side:</p>
<div style="width: 266px" class="wp-caption alignleft"><img class=" " alt="" src="http://wiki.jss7.googlecode.com/git/images/MobicentsjSS7Layers.jpg" width="256" height="192" /><p class="wp-caption-text">Source: Mobicents</p></div>
<p>From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy protocol (but still the most used protocol for roaming), with protocol stacks which are sometime not very robust, even fragile, and have been released with only reliability to load in mind, not with reliability in front of malformed traffic. Hence the quite high number of crashes we witness in telecom and mobile core networks.</p>
<p>The reason for this is also the former lack of deep testing tools (fuzzers, scanners, etc..): for example, most of the fuzzers target at best M3UA (one of the encapsulation layer of SS7 over IP which is part of SIGTRAN) and do not cross neither its state machine nor the encoding. Fuzzing is mostly affecting the decoding of these message (ASN1), not the applications (MAP, INAP, CAP, &#8230;).</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="width: 247px" class="wp-caption alignright"><img alt="" src="http://www.diametriq.com/wp-content/uploads/2013/04/Diameter-Edge-Appliance.jpg" width="237" height="189" /><p class="wp-caption-text">Source: Diametriq</p></div>
<p>Diameter is much more inspired by IETF / Internet philosophy and practices. IP protocols being more exposed to attacks, the protocols are a little bit more security-minded in term of resilience in front of hostile activities. Using Diameter also means that more attacker will know how to attack these protocols, hence more threat pressure.<br />
Diameter is an evolution of Radius (hint: Diameter = Radius * 2).<br />
Some very questionable protocol design decision involve for example the removal of Radius shared secret. Another questionable design decision is to consider that Diameter must either be transported with TLS _or_ with IPsec. This is very damageable as the Diameter protocol has no way to verify that IPsec is really used underneath. Therefore, some deployment are done in Diameter mode &#8220;as&#8221; IPsec but without IPsec being deployed, therefore without spoofing or interception protection.</p>
<p>Another factor is the &#8220;reach&#8221; of signaling messages. Deep reach vs. Shallow reach.<br />
For example, SS7 has deep reach, can go from deep into Roaming network and deep toward Home network. For Diameter, it depends on the application being used (CCA, &#8230;).</p>
<p>Lastly, SS7 is being used for roaming and interworking of thousands of operators in the world whereas Diameter is being used only for maybe 10 to 20 operators for LTE roaming. SS7 and Diameter are both just &#8220;tubes&#8221; for transporting messages. Their respective strength is overrated, specifically with the myth or belief that SS7 and IPX network being closed, secure networks. They are not, they are as secure as the least secure operator having access to these. We will see the real impact and usage of Diameter as a worldwide transport mechanism in the future, but already one can see that it&#8217;s not a magic bullet regarding security from the audits we&#8217;ve done.</p>
<p>Some things P1 Security does with SS7, SIGTRAN and Diameter is:<br />
* Scanning with PTA<br />
* Fuzzing with PTF<br />
* Intrusion/Misuse detection with PTM<br />
and professional services, audits.</p>
<p>A few links about Diameter security at P1:<br />
<a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ep1sec%2Ecom%2Fcorp%2Fconsulting%2Flte-and-diameter-audit%2F&amp;urlhash=bMte&amp;_t=tracking_disc" target="_blank">http://www.p1sec.com/corp/consulting/lte-and-diameter-audit/</a><br />
<a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ep1sec%2Ecom%2Fcorp%2F2013%2F05%2F01%2Fp1-security-newsletter-the-6-best-ways-to-secure-your-telecom-network%2F&amp;urlhash=jA91&amp;_t=tracking_disc" target="_blank">http://www.p1sec.com/corp/2013/05/01/p1-security-newsletter-the-6-best-ways-to-secure-your-telecom-network/</a></p>
<p>Regarding the <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/">VKB</a>, we have seen so far fewer vulnerabilities on Diameter than on SS7:</p>
<p>Total <a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_DIAMETER+&amp;commit=Search">Diameter vulnerabilities</a>: 10<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SCCP&amp;commit=Search">SCCP vulnerabilities</a>: 18<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_MAP&amp;commit=Search">MAP vulnerabilities</a>: 46<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_INAP&amp;commit=Search">INAP vulnerabilities</a>: 4<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_TCAP&amp;commit=Search">TCAP vulnerabilities</a>: 4<br />
<span style="font-size: 13px; line-height: 19px;"><a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SCCP&amp;commit=Search">SCCP vulnerabilities</a>: 18<br />
</span>Total <a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SS7+&amp;commit=Search">SS7 vulnerabilities</a>: 90 (69 including overlaps vulnerabilities touching more than one SS7 protocol)</p>
<p>But this is also an exposure bias: we have seen much more mature/production deployment of SS7 than in Diameter so it&#8217;s only natural that the old protocol&#8217;s vulnerabilities are more known than the ones of recent protocols.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/28/346/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>P1 Security CERT is open</title>
		<link>http://labs.p1sec.com/2013/07/27/p1-security-cert-is-open/</link>
		<comments>http://labs.p1sec.com/2013/07/27/p1-security-cert-is-open/#comments</comments>
		<pubDate>Sat, 27 Jul 2013 22:33:34 +0000</pubDate>
		<dc:creator><![CDATA[remi]]></dc:creator>
				<category><![CDATA[Advisory]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=248</guid>
		<description><![CDATA[P1 Security Computer Emergency Response Team &#8211; P1 CERT &#8211;  is officially open! P1 CERT role is to guarantee a professional incident and vulnerability management by direct cooperation with Customers, VKB Subscribers, Telecom Vendors, Operators, Governments and other CERTs. P1 CERT is also ...]]></description>
				<content:encoded><![CDATA[<p>P1 Security Computer Emergency Response Team &#8211; P1 CERT &#8211;  is officially open!</p>
<p>P1 CERT role is to guarantee a professional incident and vulnerability management by direct cooperation with Customers, VKB Subscribers, Telecom Vendors, Operators, Governments and other CERTs. P1 CERT is also collaborating with <a href="http://tcert.org/" target="_blank">TCERT</a> for Telecom-related coordination activities.</p>
<p>Also you may wish to know more about our work on Mobile and  Telecom vulnerabilities releases by checking our <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/" target="_blank">Vulnerability Knowledge Base</a>.</p>
<p>Here is an overview of the the work of P1 CERT that is integrated into the VKB:</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/VKB_Overview-1.png"><img class="alignleft size-full wp-image-342" alt="VKB_Overview-1" src="http://labs.p1sec.com/wp-content/uploads/2013/07/VKB_Overview-1.png" width="361" height="314" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>This a visualization of P1 Security VKB vulnerability evolution over time. You can see that P1 CERT has done intense amount of reverse engineering and vulnerability research in order to qualify vulnerabilities and develop knowledge.<strong><br />
</strong></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/VKB_Overview-2.png"><img class="size-full wp-image-294 alignleft" alt="VKB_Overview-2" src="http://labs.p1sec.com/wp-content/uploads/2013/07/VKB_Overview-2.png" width="366" height="313" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>VKB vulnerabilities, sorted by risk, and including Best Practices. You can see here that P1 CERT focuses on high-impact vulnerabilities but at the same time provides Best Practices to help securing networks.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/VKB_Overview-4.png"><img class="size-full wp-image-296 alignleft" alt="VKB_Overview-4" src="http://labs.p1sec.com/wp-content/uploads/2013/07/VKB_Overview-4.png" width="363" height="314" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>VKB vulnerabilities by Network Element type. HLR &amp; MSC are currently the most impacted equipment, according to P1 VKB.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/VKB_Overview-03.png"><img class="size-full wp-image-329 alignleft" alt="VKB_Overview-03" src="http://labs.p1sec.com/wp-content/uploads/2013/07/VKB_Overview-03.png" width="363" height="318" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>VKB vulnerabilities per Vendor indicate that Huawei is the most concerned vendor in term of vulnerabilities entries. This can be a bias of analysis as Huawei is present in nearly 90% of the operators we do work with, so its representation in number of vulnerability is not only due to the intrinsic vulnerability of their equipment, but also to their ubiquitousness.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>For more demonstration, you may visit P1 Security <a title="VKB Demonstration" href="https://saas.p1sec.com/tour#vkb" target="_blank">VKB tour</a>.</p>
<p>Contact P1 Security CERT at : <a href="mailto:cert@p1sec.com">cert@p1sec.com</a></p>
<ul class='gdl-toggle-box'>
<li class=''>
<h2 class='toggle-box-title'><span class='toggle-box-icon'></span>Click here to see the P1 Security CERT PGP Key</h2>
<div class='toggle-box-content'>
<p>&#8212;&#8211;BEGIN PGP PUBLIC KEY BLOCK&#8212;&#8211;<br />
Version: GnuPG v1.4.12 (GNU/Linux)</p>
<p>mQINBEtXaFIBEADgJGDE1OLUtmN+v0tmlmjWdJZA1dWCtvC+LPdkvYIWiLJSiqpZ<br />
5v+MaLMxIsQ0A4emjBzW2vD5buTNwyTzi5Jy8xRw0uQJZtFww73W0QIksukGqLu/<br />
BtcyhoZdZeNYfkJc+/FaRczvEJOsp3dYjpztygAwLDzftagrQ3SM4J5dfjbkR4qU<br />
3BVjgcrSKnUihc2UwGgXNZi7MjA09doCpr+IvtuWMZKVOShF1Y0jPuVbzWhrb8/e<br />
Kr3ikrBdxuV97UXXLERFMxmuPAWJhsjxObjqCCXhwwuhSpA1kZ26za7b/Dzy1C0V<br />
WpuI4DTJevAOtIqss64uyDpuh+UFh0GMHLkYJu+GQftwcM6Pxs2xrADBuqWzgbvK<br />
q3OJrgK4LQGiBYPiK+s0tyE/w7rXu2QO4sml/EKVpbbTcRWiFodQPspTn0kkPtnI<br />
WFoLrM58EBDxTOMrVySri4pvcGvwsU+KW2n2vkPRH2tS2kGK5FocEpW1lN/U8VBA<br />
l0i2NayC/ro1yK+fe2Tfe5Eo0bDyEyQQsWGCY5cYEnyhUHVuNayDhx1B1oAqbo6v<br />
Um1ISaTvq7eCGtCtegD3nLUlR/I7UQ2cvCctrYtpc8qZdcVPAENfur6ZyBMeSsGx<br />
S7j8LfNlddMNVx5lJ4jxDuHVItThiwyFtgKL+5g1YqXbjiQinqNNUEKeiQARAQAB<br />
tB9DZXJ0LUlTVCA8Y2VydGlzdEBjZXJ0LWlzdC5jb20+iQIVAwUQS1dze7a+qPo1<br />
CmC6AQI1lg//QhwVz2axRWn4jearE4q6qkIQ3vHnxJ1piqK4eePxUNcDeB5GwDUT<br />
QfeQ3SeSFOw1ERVDZGlq21PPz+9RG/vDhJQnQ/QaUIFZfFMEsq01vqYFtCC8a80v<br />
gikPbC/kRj1Q3YgumK6CTbVSLiZLckd7wyTe33Acr3cql5EWsN7LHwD8hnHoH0zT<br />
FSjSbB9xu6W/8uVJqk3CqZIIEJfMirtcm1yrMzxRtgKOGNqNrI73q7HhPbw67Sax<br />
VZb7QpFmzIDIUnbE5eJUqELSq3QEBY0Z/YNXnBDFFHGBhJAs89LKluNXPPK8H/rr<br />
/PUN1a3e/eqOiOS8RHvI9KPh8nb8QwMonQvFUdxjG0owRwHHfm3za2BiPn1vk3+W<br />
ApsH9xyZTsG6rbziPUfpVtSF46Mes+0uCnS0/ynYIleHmtQMLwCVuSZqL8D9Vbml<br />
fEkwW15G3JAWwa/Knnwon63KDKcOb+jXq3vs0nbI65UX68l41kqGkhTsI9UNsQlq<br />
5jkRz9yw29qf3qj6ACAeo4N+vjEhwmd4WQbnqLQ5leGLWulQsHp5lYZNCrXHJyHW<br />
HhcTfP1Z12cimbU5q6NEqMVynsY1+YBIi9jn6lBtkS79pCZbCVZWMLmNQmb4nvxs<br />
LIfNKYAEHiP2vIZMsWLaeugMtDw/jnnq9fvlfi7QFdEfjyaX4W/pFaqJARUDBRBL<br />
WAJ6ji95MC7uHgsBAjQHB/0VQB9OHwZ7tuvmGEm8z2ThjP3T0SirSmHswmn3k7VY<br />
WfcqFEgR5pk9maWT4XgUrmWPRZUyv2FXkAUKAX6Qp8aGFOk4vETsV357THz/vRc8<br />
oqxgdgAVBbMkTpuL8w+SOlV+A/H7WEqt+i4cTqGkzrC2mxFJ/qsXXnu/PH7IA+Ap<br />
PbzQqWRIAZfuDiVeThhEuERvbL4T8AMQ8q+oIQqoGEk8HpsWFbFg7AiWKgr/6Fn+<br />
GTz/0AutmB0hoDAexRw8eBglI3NlyreHTdm3t/1iQIK8YxY7RemENWy1R0m+dQjk<br />
jUughf5q6ty4iQhwysAoI+9f0X2/ed5kMXGfP3kPiz8qiEYEExECAAYFAkwvukoA<br />
CgkQ13JbYSPmlWmzTwCfU1Ed3CsiQYrp6jaiNkPQE+tAqakAnjhkePGzSufgdVV7<br />
jTtFuOyCYXZptBxDZXJ0LUlTVCA8Y2VydEBjZXJ0LWlzdC5jb20+iQIVAwUQS1dz<br />
Vra+qPo1CmC6AQJaXA/+L0f6lXfIC1zILETJRbVN1BRSJNBH1H2l7+MaBiv1UUro<br />
swhD5IVxqPzdb1RLv6c2EnlUmpGDgtYWlaY4omYnp2F7bazWIvJjcEM1POK6s/wn<br />
5ZLHtctIC8NWqYeVXuC4+3sX+b3/hMije3PxhIblJSzPYRha1x+7ydz1rZewuSzA<br />
Dr45GPArkVa2m/3PH2foXNVdWcpU+rb9QVuD8p+tW8FLJERRJvFDIKW6RGkExoRS<br />
XBzBNgUpH2mdL0vukN86PHaHERYWcMWghXj4M7AJYxzYUVOD+Q0bL0MUkTqYxwa9<br />
OSByCkijOUwwl9ZuTdXehJgRGThFn6cVOqcuQR+Bvj6KH220oY58KHJkJycC2q5n<br />
Iayw2MGNj96goeefqSa/GLKCg3SUu8qAz23goWQEWKbCp9N+SM3OpHSlIRslsY0E<br />
6oZ3VkS1kTofGTtDJ8J12PSfwsr2kYn/IMMPnhHerhJAFFnYpSZNcvP4nphwWZX0<br />
T2U/qjhQuVdIvJ4fY+2KELzYHCrUl/sKx6JjmtO8gnuNI4wpmZhOz1qWn3wjM+G8<br />
VyfJooa8Mn5yvLqqirQx+JQLpAlkFog7PZiuF6/zFFB/muIeborrK9vRVmBb4tzb<br />
xAiGx+xNOqBbMfDdbk3U2VAD9cNiHZOFMzZubpc119cLwoxvuCw9ZlVF1x4f6TqJ<br />
ARUDBRBLWAIoji95MC7uHgsBAl4RB/wJLvfvQzrzFk6W+fw4GnRxwK1EbzCC+dXU<br />
gQyw56kKOLgMVoosIq/Qlz3vrkX72Cb52N+xWjVigzibhPi7AYKAXG80nmdxPZZV<br />
/cpv9kI/mcCgoqW0q2yyHXn6nHodXRkqU/Sw3PBR36N6viABf/G+EXF9j47/LObl<br />
qoib53qLWLzROovHxJz0ueLhiRaa11HK4o4tYEhOLS3u7OvrJKTQqYIqzu6uTAT2<br />
Puvtny8Opi7cwsfQU/usDw48QnDG5PrXasQXb/E34RCzBrkg67FOA8XEaj5ZJu+Y<br />
JfrALNylnVYCnVaZfr5XFwyf+8fqTSlt2DNI9X+xENN78sbsuVaXiEYEExECAAYF<br />
AkwvukoACgkQ13JbYSPmlWmHYACfe3ITSHy0eRm5a4Tg9OhWPrFfIWMAn1HKPuyo<br />
TYhZJ+dScK5AGsGxhtjnmQINBFHxTVMBEADSdK3BX33CMBQyGinh8eNxRcs2Aicb<br />
m0NhUtPUjUYujno6QFFsmi+DPp4PhFP+xt2Ys/H9soBJ58QYUD7gd9G82aCRIe16<br />
Uaz6fhp+g6BC34glrkEmVPGNKR9NY45WOcBu2D9G91X3dCafbBoIZSo+bAsR34V1<br />
WAN1RQez1ABeDp069u4BNCuoWZNaUn26bdSu6T6ClWA8s/POo/lZkqNMhSdZC/9B<br />
KbfDEvgt0CDVYaMgC6fXhwJoxpIp1aMAOjdOxgwTIo+JkMwUNxfIX5tWHNrhupR2<br />
ePpkhqGiQ5B2MLSXw2CdeKXZH+/0mP/G5EPSCWbvuHxaegAfEVxD77uksLOjuOdq<br />
X/HQ7Vaqwz/NRWJCxuCHBg8/675YGBSkLVW4v9171cP5M4YOnaHyZ5in04r+EjkL<br />
6yK9y+y/1BXHkL+6xW08TtUmoT4AQk0EFnUzNLXHa6argmqbxuxxVWghYNStjFnV<br />
D0bVuwKwusZlJ7b5x83Z2QztHDQcwumcA9uTN4SePqck+N6H4PF2EntFEYtKyGdp<br />
vyLAMk728xtCo6ArCmsIkzF64ddvKPCHgxtGf/JaIHvaCXxkVlasYitOhqi0lr4L<br />
Kib5t+5urQinJcbBbyGP67MPuRljXxCnUzk1ngBRXp0W/i1Ho+NoLQrUJwfC2jQz<br />
nD1TMeo3vn3P3QARAQABtHRQMSBTZWN1cml0eSBDb21wdXRlciBFbWVyZ2VuY3kg<br />
UmVzcG9uc2UgVGVhbSAoVGhpcyBpcyB0aGUgb2ZmaWNpYWwgUEdQIGtleSBvZiB0<br />
aGUgUDEgU2VjdXJpdHkgQ0VSVCkgPGNlcnRAcDFzZWMuY29tPokCOAQTAQIAIgUC<br />
UfFNUwIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQjevsxXEnPnVGTA//<br />
eaRwXlR9MpH/+8eS0HB5t1EyWlkmRBb1ExmszBHyTRz8AomFUSjB7OZ+kvIskPkN<br />
RbWoaxFSUpZqVEID2qJbsQ5z6hLcAmFHhlHmXdh7sbGpkTwbm8bxwjx44jrb5ryq<br />
kKmsYWbNf1v2ie/iWlNmkR8t58szkkx+H+hEpxwcofjzocmmea1urjCCTsHv7lV7<br />
da/Q5GGUJHsED9AZJUsYQ3r7pJ7wSskUuGjMRTSl66qO90+xuETq9CFirj2CbSNU<br />
v/7ohKbjaZDXhm4TmPJ8/61erpHfmpuNkG7drlUBvqPZk/xOlorfswcjW8N6KTFw<br />
8ksI9aGeOug5LIFLZGnrlmAPQMJloVicXYkIfwh04LxOM1mzs5ri+3fwF3+SV6kl<br />
zFWdch4AY3wdzpp/ewgkwJPQpbvRxbXmCK4mP4Srs6gFv29zQBotE4QBQTmwLXvg<br />
wZ7YwT47XwW337MCBZOZuOl3sX/GiFxoT+nC7rvoQovC+at68Cl3AAJQTy0crr/c<br />
PgJuST1RpLp9BIzZhGpyXGckm80i7kXxSPbz0ZqchX+1ln7XTDW8gVsfYci3t4tu<br />
RS0QYLG6trFTw+d7KkqPdXWxvFOq9XWscfNcCADU2zLvI5UHNcQeomQldSnjtkOn<br />
BMHofqU+j1vByLOfa9LW7R/kmqFNptg9/rnnRyOCT3q5Ag0EUfFNUwEQANrOvLS2<br />
Jupnnb5x/oEViyI+OthYcWFS4/FD3vKCin4ag1UHX1tQe9Ex21Ey2gW9ga/cg6bi<br />
9ZGyomDHi0roYNl9RjwLE5fs/HKDF47W3ohLKln7bAI9160WF2fNoRI0YVQuBKqL<br />
qKgJMeTB1AYNYAJR1VIdh5jQcDHbSmXIU12CPwoyfWx6zBeUlAj+emkIyhzY83xR<br />
wJJJFlfIX8QpySOhMW/cEeOFD0OIV5iOetPwR4C9ef/WYxjAnRo4QA7cQygtad70<br />
nf0ldLj822emM5VfpajGiE5HYVSIx+1DRq+YAyD6hqHl6bLD5dhRDNXdp2MPG+r/<br />
PCj1XCKCBbcGLbUK6KQl4iK3ydIab8dfUJZqe//QpLud2XMNBxP1o617muPLlmM4<br />
2icPHnIVp/d8LEPc/OVsY/rNuzQFfYjL/OZmkUq7xI2E2pkdsl+Yey4Rodq22KrT<br />
SlOtja80DzT+99/aRf3etDvz0ZEghrRxvwxHKFXneL4bFNtr25gCNXKNT5HW6Tm/<br />
qNYwOBUZ1/pVxfoPQ5yjiZLuk9oxEin/eEJBQSrzNX6GN/+5wQPpE7xzzB4lJH7M<br />
qnm6jrnneqpI45nMg94mOJQ9C0AGGyDaijeZ4l8sLTVKvx70RHV5FzRJKdF8Eczg<br />
H0tNvUR6c7F0llvdCSaPqNCWKgUTkLQj6IspABEBAAGJAh8EGAECAAkFAlHxTVMC<br />
GwwACgkQjevsxXEnPnVvhhAAyYrbcEpoWIy5dWkY1zqgfCDGtjHMSmut/RoiKwnu<br />
4Zpdc29xx2qj/yzBYwJT9o3r5ceM1aiN7QREWeuaBBDcHc9CkrC30UPWKGcGKzjD<br />
lwd1DV7DbodEAROf5gGdL3ooh3B3gWNhA6dgPldZflGpXlFnPqcbruVSO4QQdLJn<br />
gIj6+WQgJo7RrL2WEdNhmEM+dkUHLX22CZhDvWwK0mr0p711GaAl7b36ys6RDfiE<br />
yy0xjK6+50iwfqv+eha1wplL3bV92sm+8RA5wiCY7gY2Zbt8GGDaOMeP5Za8Fqk7<br />
xhjJNQDRs8W7QSKBM8R72ljr5mcWujdr6qDtCG5XtzD/fmKev4rptBUphKcTFbc6<br />
apHk178ET8xUBcdNZZtgXOhvmPZ85HxLJGyYxVi7ZBCL+YasGQIYGZMzUV58AMht<br />
jBdSEK5MQrrSLvodZ+TWdd0cMOQlU6inpfPjUH69aAbvksvNJcgM6fPlz5uidUIY<br />
HFCcI+z1QYtMnf5x9G9F2iQCcVlnS9xJC/Er31XlwCFsKKtaxQPJlnl/kWxtR1vl<br />
bLU/gxSUYFAOQlWqUDsGW4ObnZbBcFJ9J7exLDKI7dMIYP7WwSdsgW1SfXGt/75V<br />
MyL1Rt1Oiu9oKRQXBQw6gf26W1ciKBxUquLMfItIcWTmlHy1Zwoi97in57PayYKq<br />
AL8=<br />
=N3+w<br />
&#8212;&#8211;END PGP PUBLIC KEY BLOCK&#8212;&#8211;</p>
</div>
</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/27/p1-security-cert-is-open/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rising risk and importance of the vendor backdoors</title>
		<link>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/</link>
		<comments>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/#comments</comments>
		<pubDate>Sat, 13 Jul 2013 18:30:55 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=226</guid>
		<description><![CDATA[Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the recent network storage equipment backdoors (HP Keeps Installing Secret Backdoors in Enterprise Storage), the Huawei network element bac...]]></description>
				<content:encoded><![CDATA[<p>Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the <a href="http://www.theregister.co.uk/2013/07/11/hp_prepping_fix_for_latest_storage_vuln/">recent network storage equipment backdoors</a> (<a href="http://slashdot.org/topic/datacenter/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">HP Keeps Installing Secret Backdoors in Enterprise Storage</a>), the <a href="http://gigaom.com/2012/10/08/why-nobody-really-wants-to-get-to-the-bottom-of-china-zte-and-huawei/">Huawei network element backdoors</a> or the usual <a href="https://saas.p1sec.com/vulns/285">network equipment or DSL-router backdoors</a>, these are now clearly a real and strong threat to enterprises.</p>
<p>One interesting fact in the recent &#8220;<a href="https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_downloads/Partnerbeitraege/Partnerbeitrag_1und1_Telekom_Vodafone_Gefaehrdungsmatrix_2.pdf;jsessionid=467760209AE0AD8EEC10ED930219061B.2_cid369?__blob=publicationFile">Consolidated risk matrix</a>&#8221; referenced by german BSI and produced by Deutsche Telekom, Vodafone and 1&amp;1 Internet is that &#8220;Telecommunication and Network equipment backdoors&#8221; are one of the top rated vulnerabilities (4th top risk):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/DT_new_Table_en2.png"><img class="alignnone size-large wp-image-235" alt="DT_new_Table_en2" src="http://labs.p1sec.com/wp-content/uploads/2013/07/DT_new_Table_en2-1024x573.png" width="960" height="537" /></a></p>
<address>(Table extracted from the 1&amp;1, Deutsche Telekom and Vodafone study, in german, and translated by Google Translate)</address>
<p>The nature of these backdoors is already troubling.  The people you trust your data and business with are the one who betray you by having secret access to your systems, even if you secure these to the maximum known best practices.</p>
<p>What&#8217;s worse with critical network element is that these backdoors can be activated from a great numbers of entry vectors, and can exfiltrate data by an even bigger set of vectors:</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/P1-Vector-for-backdoors-3.png"><img class="alignnone size-full wp-image-239" alt="P1 Vector for backdoors 3" src="http://labs.p1sec.com/wp-content/uploads/2013/07/P1-Vector-for-backdoors-3.png" width="741" height="428" /></a></p>
<p>The great difference in countries preparedness at the telecom and mobile level shows extreme discrepancies in the awareness and maturity regarding the telecom and mobile security.</p>
<p>The National Information Security Agencies have had mixed results in their attempts to regulate security or help the operator improve their security due to the resistive posture taken by some operators, vendors and industry association and many cover-up of internal and external compromise of telecom critical infrastructure.</p>
<p>The liability of operators and vendors is huge with regard to this matter, most notably with VIP eavesdropping consequences and with the potential for general public class actions where law permits.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>RMLL / LSM 2013: Opening up mobile and telecommunications networks</title>
		<link>http://labs.p1sec.com/2013/07/11/rmll-lsm-2013-opening-up-mobile-and-telecommunications-networks/</link>
		<comments>http://labs.p1sec.com/2013/07/11/rmll-lsm-2013-opening-up-mobile-and-telecommunications-networks/#comments</comments>
		<pubDate>Thu, 11 Jul 2013 09:13:37 +0000</pubDate>
		<dc:creator><![CDATA[omar]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=211</guid>
		<description><![CDATA[As part of our effort to further the knowledge on telecommunications technologies in the open source and security community we have presented an introduction into mobile and telecom networks and From walled garden to open and reviewed security  Telecommunication networks differ from IP networks in s...]]></description>
				<content:encoded><![CDATA[<div title="Page 1">
<p style="text-align: left;">As part of our effort to further the knowledge on telecommunications technologies in the open source and security community we have presented an introduction into mobile and telecom networks and</p>
<p style="text-align: center;"><strong>From walled garden to open and reviewed security </strong></p>
<p style="text-align: left;">Telecommunication networks differ from IP networks in several important aspects. First, telecom networks have to provide the infrastructure ensuring high-availability, high throughput as well as resilience for a wide range of services. Second, telecom networks must offer support for legacy network elements and services as old as 40 years, requiring a multitude of protocols for backward compatibility and interoperability. Third, telecom networks support multiple addressing schemes making analysis and mapping more difficult than IP networks. The Internet is based in essence on a comparably small set of basic protocols that offer all the needed capabilities for higher layer services. The existing tools designed for the analysis of IP based networks offer little support for telecom networks and hence necessitate the development of dedicated tools. Here we present the techniques and tools that we have developed in order to better understand telecom networks. These tools allow us to scan, communicate on and visualize telecom networks. SCTPscan allows us to reliably and efficiently scan hosts for open SCTP ports which are possible entry points to the SS7 network. pysctp is a python library providing a simple API to the SCTP protocol, which is the basis for communicating on telecom networks. Finally, we demonstrate the capabilities of our toolset by analysing a typical telecom network and highlighting the aforementioned properties of such networks.</p>
<p style="text-align: center;">
<div class="shortcode1-2 "><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/network_arch.png"><img alt="network_arch" src="http://labs.p1sec.com/wp-content/uploads/2013/07/network_arch-300x192.png" width="300" height="192" /></a></p>
<p><em>The network architecture of a typical mobile network operator. Telecom networks are powered by a large number of different technologies.</em></div>
<div class="shortcode2-2 "><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/network_analysis.png"><img class="aligncenter" alt="network_analysis" src="http://labs.p1sec.com/wp-content/uploads/2013/07/network_analysis-300x186.png" width="304" height="190" /></a></p>
<p style="text-align: left;"><em>A passive network scan showing the different network elements (nodes) and the communication (edges) between them. The edge width is drawn proportional to the number of exchanged messages in the recorded period of time. (global titles have been anonymized)</em></div>
</p>
<p style="text-align: left;">We have recently presented this topic at the Libre Software Meeting, Security Track 2013 (<a title="Opening_up_telco_networks.pdf" href="http://labs.p1sec.com/wp-content/uploads/2013/07/Opening_up_telco_networks.pdf" target="_blank">slides</a>). Also check out the <a href="http://schedule2013.rmll.info/IMG/pdf/telecom_security.pdf">RMLL website</a>.</p>
</div>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/11/rmll-lsm-2013-opening-up-mobile-and-telecommunications-networks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Huawei reverse engineering: legacy and new network elements surprises</title>
		<link>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/</link>
		<comments>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/#comments</comments>
		<pubDate>Thu, 23 May 2013 09:44:58 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Huawei Core]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[ppc]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[vkb]]></category>
		<category><![CDATA[vulndev]]></category>
		<category><![CDATA[vulnres]]></category>
		<category><![CDATA[vxworks]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=170</guid>
		<description><![CDATA[Sometime, reverse engineering for bug hunting reveals some fun stuff. So of course, when you&#8217;re dealing with Core Network elements such as Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000, you don&#8217;t expect to find these Chinese ASCII arts of an octopus being killed by an angel (!): We ca...]]></description>
				<content:encoded><![CDATA[<p>Sometime, reverse engineering for bug hunting reveals some fun stuff.</p>
<p>So of course, when you&#8217;re dealing with Core Network elements such as <a href="http://www.huawei.com/en/products/core-network/singlecore/fixed-softswitch/index.htm">Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000</a>, you don&#8217;t expect to find these Chinese ASCII arts of an octopus being killed by an angel (!):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.39-AM1.png"><img class="alignnone size-full wp-image-173" alt="Screen Shot 2013-05-23 at 11.33.39 AM" src="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.39-AM1.png" width="576" height="454" /></a></p>
<p>We can see that internally, this is called &#8220;Cool Beauty System 1.0.3&#8243; build (?) 35808001, by HuaWei R&amp;D CN (Research and Development Core Network).</p>
<p>We see also that this design dates back from when Huawei was spelled internally HuaWei, that is probably from the 1980s even if the build time of this firmware image (VxWorks Tornado based) is from 2010.</p>
<p>&nbsp;</p>
<p>and even less usual but more interesting to find the PCB schematics in ASCII art (!!):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.57-AM.png"><img class="alignnone size-full wp-image-172" alt="Screen Shot 2013-05-23 at 11.33.57 AM" src="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.57-AM.png" width="556" height="486" /></a></p>
<p>That reveals it&#8217;s running (well&#8230; we saw that earlier) on PowerPC RISC processor MPC750 by Freescale Semiconductor, Inc. Here is the datasheet <a href="http://labs.p1sec.com/wp-content/uploads/2013/05/MPC750.pdf">MPC750 RISC Processor by Freescale</a>. Please note the JTAG interface on page 15.</p>
<p>By googling the other components, you will find the pinout of the JTAG interfaces of each chip as well as the UART and the way to to In-Circuit debugging (and dumping) of the bootrom.</p>
<p>Thanks to Huawei engineers for this moments of fun and education. Is it best practice to teach reverse engineers what your hardware architecture looks like?</p>
<p>Oh&#8230; and thanks for the 4 new vulnerabilities added in the <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/">VKB</a> based on this reverse engineering and bug hunting session.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
