<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>P1 Labs &#187; telecom</title>
	<atom:link href="http://labs.p1sec.com/tag/telecom/feed/" rel="self" type="application/rss+xml" />
	<link>http://labs.p1sec.com</link>
	<description>P1 Security Labs</description>
	<lastBuildDate>Wed, 31 Dec 2014 00:24:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>[31C3] SS7map : mapping vulnerability of the international mobile roaming infrastructure at #31C3</title>
		<link>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/</link>
		<comments>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/#comments</comments>
		<pubDate>Fri, 05 Dec 2014 13:38:41 +0000</pubDate>
		<dc:creator><![CDATA[Alexandre De Oliveira]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Projects]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[MAP]]></category>
		<category><![CDATA[Mapping]]></category>
		<category><![CDATA[sigtran]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[SS7map]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=677</guid>
		<description><![CDATA[Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014. The conference &#8220;SS7map : mapping vulnerability of the international mobile roaming infrastructure&#8221; will ...]]></description>
				<content:encoded><![CDATA[<p>Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014.</p>
<p>The conference &#8220;<strong>SS7map : mapping vulnerability of the international mobile roaming infrastructure</strong>&#8221; will focus on the method used to map the global SS7 network, what have been map the network and more in depth statistics and analysis.</p>
<p>Details of the conference schedule:<br />
Start time: 2014-12-27 23:00:00 +0100<br />
Room: Saal 6</p>
<p>CCC is one of the main security event in Europe, it will take place from 27th Dec to 30th Dec 2014.</p>
<p>See you at #31C3 !</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/12/05/ss7map-mapping-vulnerability-of-the-international-mobile-roaming-infrastructure-at-31c3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>[Hackito Ergo Sum 2014] Worldwide attacks on SS7/SIGTRAN network</title>
		<link>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/</link>
		<comments>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/#comments</comments>
		<pubDate>Fri, 02 May 2014 13:59:34 +0000</pubDate>
		<dc:creator><![CDATA[Pierre-Olivier Vauboin]]></dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[MAP]]></category>
		<category><![CDATA[sigtran]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=516</guid>
		<description><![CDATA[We are pleased to announce that P1 Security was present at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/). Worldwide attacks on SS7/SIGTRAN network from P1Security Download slides here. Abstract: Mobile telecommunication networks are complex and provide a wide range ...]]></description>
				<content:encoded><![CDATA[<p>We are pleased to announce that P1 Security was present at the Hackito Ergo Sum 2014 conference in Paris (<a href="http://2014.hackitoergosum.org/">http://2014.hackitoergosum.org/</a>).</p>
<p><center><iframe style="border: 1px solid #CCC; border-width: 1px 1px 0; margin-bottom: 5px; max-width: 100%;" src="http://www.slideshare.net/slideshow/embed_code/34023721" width="597" height="486" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" allowfullscreen="allowfullscreen"></iframe></p>
<div style="margin-bottom: 5px;"><strong> <a title="Worldwide attacks on SS7/SIGTRAN network" href="https://www.slideshare.net/p1sec/worldwide-attacks-onss7networkp1securityhackito2014" target="_blank">Worldwide attacks on SS7/SIGTRAN network</a> </strong> from <strong><a href="http://www.slideshare.net/p1sec" target="_blank">P1Security </a></strong></div>
<p></center></p>
<p>Download slides <a href="http://2014.hackitoergosum.org/slides/day3_Worldwide_attacks_on_SS7_network_P1security_Hackito_2014.pdf">here</a>.</p>
<p>Abstract:</p>
<p>Mobile telecommunication networks are complex and provide a wide range of services, making them a tempting target for fraudsters and for intelligence agencies. Moreover, the architecture, equipment and protocols used on these networks were never designed with security in mind, availability being the first concern. Today, even though some telecom operators are investing money into securing their network, events confirm that for most of them maturity in term of security is yet to come, as recently shown with the example of massive traffic interception on compromised SCCP and GRX providers like Belgacom’s BICS. Here we present the most typical and legitimate telecom callflows from making a mobile phone call to sending a SMS. Then we describe the protocol layers involved and how to abuse them, which fields can be manipulated in order to attack both the operator infrastructure and its subscribers. Finally, we show a real life example of scan performed from an international SS7 interconnection and practical attacks on subscribers such as spam, spoofed SMS and user location tracking.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/05/02/hackito-ergo-sum-2014-worldwide-attacks-on-ss7sigtran-network/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Diameter vs SS7 from a security perspective</title>
		<link>http://labs.p1sec.com/2013/07/28/346/</link>
		<comments>http://labs.p1sec.com/2013/07/28/346/#comments</comments>
		<pubDate>Sun, 28 Jul 2013 22:34:42 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Diameter]]></category>
		<category><![CDATA[pcap]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[wireshark]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=346</guid>
		<description><![CDATA[On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side: From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy protocol (but still ...]]></description>
				<content:encoded><![CDATA[<p>On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side:</p>
<div style="width: 266px" class="wp-caption alignleft"><img class=" " alt="" src="http://wiki.jss7.googlecode.com/git/images/MobicentsjSS7Layers.jpg" width="256" height="192" /><p class="wp-caption-text">Source: Mobicents</p></div>
<p>From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy protocol (but still the most used protocol for roaming), with protocol stacks which are sometime not very robust, even fragile, and have been released with only reliability to load in mind, not with reliability in front of malformed traffic. Hence the quite high number of crashes we witness in telecom and mobile core networks.</p>
<p>The reason for this is also the former lack of deep testing tools (fuzzers, scanners, etc..): for example, most of the fuzzers target at best M3UA (one of the encapsulation layer of SS7 over IP which is part of SIGTRAN) and do not cross neither its state machine nor the encoding. Fuzzing is mostly affecting the decoding of these message (ASN1), not the applications (MAP, INAP, CAP, &#8230;).</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="width: 247px" class="wp-caption alignright"><img alt="" src="http://www.diametriq.com/wp-content/uploads/2013/04/Diameter-Edge-Appliance.jpg" width="237" height="189" /><p class="wp-caption-text">Source: Diametriq</p></div>
<p>Diameter is much more inspired by IETF / Internet philosophy and practices. IP protocols being more exposed to attacks, the protocols are a little bit more security-minded in term of resilience in front of hostile activities. Using Diameter also means that more attacker will know how to attack these protocols, hence more threat pressure.<br />
Diameter is an evolution of Radius (hint: Diameter = Radius * 2).<br />
Some very questionable protocol design decision involve for example the removal of Radius shared secret. Another questionable design decision is to consider that Diameter must either be transported with TLS _or_ with IPsec. This is very damageable as the Diameter protocol has no way to verify that IPsec is really used underneath. Therefore, some deployment are done in Diameter mode &#8220;as&#8221; IPsec but without IPsec being deployed, therefore without spoofing or interception protection.</p>
<p>Another factor is the &#8220;reach&#8221; of signaling messages. Deep reach vs. Shallow reach.<br />
For example, SS7 has deep reach, can go from deep into Roaming network and deep toward Home network. For Diameter, it depends on the application being used (CCA, &#8230;).</p>
<p>Lastly, SS7 is being used for roaming and interworking of thousands of operators in the world whereas Diameter is being used only for maybe 10 to 20 operators for LTE roaming. SS7 and Diameter are both just &#8220;tubes&#8221; for transporting messages. Their respective strength is overrated, specifically with the myth or belief that SS7 and IPX network being closed, secure networks. They are not, they are as secure as the least secure operator having access to these. We will see the real impact and usage of Diameter as a worldwide transport mechanism in the future, but already one can see that it&#8217;s not a magic bullet regarding security from the audits we&#8217;ve done.</p>
<p>Some things P1 Security does with SS7, SIGTRAN and Diameter is:<br />
* Scanning with PTA<br />
* Fuzzing with PTF<br />
* Intrusion/Misuse detection with PTM<br />
and professional services, audits.</p>
<p>A few links about Diameter security at P1:<br />
<a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ep1sec%2Ecom%2Fcorp%2Fconsulting%2Flte-and-diameter-audit%2F&amp;urlhash=bMte&amp;_t=tracking_disc" target="_blank">http://www.p1sec.com/corp/consulting/lte-and-diameter-audit/</a><br />
<a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ep1sec%2Ecom%2Fcorp%2F2013%2F05%2F01%2Fp1-security-newsletter-the-6-best-ways-to-secure-your-telecom-network%2F&amp;urlhash=jA91&amp;_t=tracking_disc" target="_blank">http://www.p1sec.com/corp/2013/05/01/p1-security-newsletter-the-6-best-ways-to-secure-your-telecom-network/</a></p>
<p>Regarding the <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/">VKB</a>, we have seen so far fewer vulnerabilities on Diameter than on SS7:</p>
<p>Total <a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_DIAMETER+&amp;commit=Search">Diameter vulnerabilities</a>: 10<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SCCP&amp;commit=Search">SCCP vulnerabilities</a>: 18<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_MAP&amp;commit=Search">MAP vulnerabilities</a>: 46<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_INAP&amp;commit=Search">INAP vulnerabilities</a>: 4<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_TCAP&amp;commit=Search">TCAP vulnerabilities</a>: 4<br />
<span style="font-size: 13px; line-height: 19px;"><a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SCCP&amp;commit=Search">SCCP vulnerabilities</a>: 18<br />
</span>Total <a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SS7+&amp;commit=Search">SS7 vulnerabilities</a>: 90 (69 including overlaps vulnerabilities touching more than one SS7 protocol)</p>
<p>But this is also an exposure bias: we have seen much more mature/production deployment of SS7 than in Diameter so it&#8217;s only natural that the old protocol&#8217;s vulnerabilities are more known than the ones of recent protocols.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/28/346/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rising risk and importance of the vendor backdoors</title>
		<link>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/</link>
		<comments>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/#comments</comments>
		<pubDate>Sat, 13 Jul 2013 18:30:55 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=226</guid>
		<description><![CDATA[Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the recent network storage equipment backdoors (HP Keeps Installing Secret Backdoors in Enterprise Storage), the Huawei network element bac...]]></description>
				<content:encoded><![CDATA[<p>Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the <a href="http://www.theregister.co.uk/2013/07/11/hp_prepping_fix_for_latest_storage_vuln/">recent network storage equipment backdoors</a> (<a href="http://slashdot.org/topic/datacenter/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">HP Keeps Installing Secret Backdoors in Enterprise Storage</a>), the <a href="http://gigaom.com/2012/10/08/why-nobody-really-wants-to-get-to-the-bottom-of-china-zte-and-huawei/">Huawei network element backdoors</a> or the usual <a href="https://saas.p1sec.com/vulns/285">network equipment or DSL-router backdoors</a>, these are now clearly a real and strong threat to enterprises.</p>
<p>One interesting fact in the recent &#8220;<a href="https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_downloads/Partnerbeitraege/Partnerbeitrag_1und1_Telekom_Vodafone_Gefaehrdungsmatrix_2.pdf;jsessionid=467760209AE0AD8EEC10ED930219061B.2_cid369?__blob=publicationFile">Consolidated risk matrix</a>&#8221; referenced by german BSI and produced by Deutsche Telekom, Vodafone and 1&amp;1 Internet is that &#8220;Telecommunication and Network equipment backdoors&#8221; are one of the top rated vulnerabilities (4th top risk):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/DT_new_Table_en2.png"><img class="alignnone size-large wp-image-235" alt="DT_new_Table_en2" src="http://labs.p1sec.com/wp-content/uploads/2013/07/DT_new_Table_en2-1024x573.png" width="960" height="537" /></a></p>
<address>(Table extracted from the 1&amp;1, Deutsche Telekom and Vodafone study, in german, and translated by Google Translate)</address>
<p>The nature of these backdoors is already troubling.  The people you trust your data and business with are the one who betray you by having secret access to your systems, even if you secure these to the maximum known best practices.</p>
<p>What&#8217;s worse with critical network element is that these backdoors can be activated from a great numbers of entry vectors, and can exfiltrate data by an even bigger set of vectors:</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/P1-Vector-for-backdoors-3.png"><img class="alignnone size-full wp-image-239" alt="P1 Vector for backdoors 3" src="http://labs.p1sec.com/wp-content/uploads/2013/07/P1-Vector-for-backdoors-3.png" width="741" height="428" /></a></p>
<p>The great difference in countries preparedness at the telecom and mobile level shows extreme discrepancies in the awareness and maturity regarding the telecom and mobile security.</p>
<p>The National Information Security Agencies have had mixed results in their attempts to regulate security or help the operator improve their security due to the resistive posture taken by some operators, vendors and industry association and many cover-up of internal and external compromise of telecom critical infrastructure.</p>
<p>The liability of operators and vendors is huge with regard to this matter, most notably with VIP eavesdropping consequences and with the potential for general public class actions where law permits.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Huawei reverse engineering: legacy and new network elements surprises</title>
		<link>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/</link>
		<comments>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/#comments</comments>
		<pubDate>Thu, 23 May 2013 09:44:58 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Huawei Core]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[ppc]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[vkb]]></category>
		<category><![CDATA[vulndev]]></category>
		<category><![CDATA[vulnres]]></category>
		<category><![CDATA[vxworks]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=170</guid>
		<description><![CDATA[Sometime, reverse engineering for bug hunting reveals some fun stuff. So of course, when you&#8217;re dealing with Core Network elements such as Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000, you don&#8217;t expect to find these Chinese ASCII arts of an octopus being killed by an angel (!): We ca...]]></description>
				<content:encoded><![CDATA[<p>Sometime, reverse engineering for bug hunting reveals some fun stuff.</p>
<p>So of course, when you&#8217;re dealing with Core Network elements such as <a href="http://www.huawei.com/en/products/core-network/singlecore/fixed-softswitch/index.htm">Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000</a>, you don&#8217;t expect to find these Chinese ASCII arts of an octopus being killed by an angel (!):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.39-AM1.png"><img class="alignnone size-full wp-image-173" alt="Screen Shot 2013-05-23 at 11.33.39 AM" src="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.39-AM1.png" width="576" height="454" /></a></p>
<p>We can see that internally, this is called &#8220;Cool Beauty System 1.0.3&#8243; build (?) 35808001, by HuaWei R&amp;D CN (Research and Development Core Network).</p>
<p>We see also that this design dates back from when Huawei was spelled internally HuaWei, that is probably from the 1980s even if the build time of this firmware image (VxWorks Tornado based) is from 2010.</p>
<p>&nbsp;</p>
<p>and even less usual but more interesting to find the PCB schematics in ASCII art (!!):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.57-AM.png"><img class="alignnone size-full wp-image-172" alt="Screen Shot 2013-05-23 at 11.33.57 AM" src="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.57-AM.png" width="556" height="486" /></a></p>
<p>That reveals it&#8217;s running (well&#8230; we saw that earlier) on PowerPC RISC processor MPC750 by Freescale Semiconductor, Inc. Here is the datasheet <a href="http://labs.p1sec.com/wp-content/uploads/2013/05/MPC750.pdf">MPC750 RISC Processor by Freescale</a>. Please note the JTAG interface on page 15.</p>
<p>By googling the other components, you will find the pinout of the JTAG interfaces of each chip as well as the UART and the way to to In-Circuit debugging (and dumping) of the bootrom.</p>
<p>Thanks to Huawei engineers for this moments of fun and education. Is it best practice to teach reverse engineers what your hardware architecture looks like?</p>
<p>Oh&#8230; and thanks for the 4 new vulnerabilities added in the <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/">VKB</a> based on this reverse engineering and bug hunting session.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>SS7 traffic analysis with Wireshark</title>
		<link>http://labs.p1sec.com/2013/04/04/ss7-traffic-analysis-with-wireshark/</link>
		<comments>http://labs.p1sec.com/2013/04/04/ss7-traffic-analysis-with-wireshark/#comments</comments>
		<pubDate>Thu, 04 Apr 2013 13:30:31 +0000</pubDate>
		<dc:creator><![CDATA[Laurent Ghigonis]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[pcap]]></category>
		<category><![CDATA[ss7]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[wireshark]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=13</guid>
		<description><![CDATA[The problem with wireshark Primary usage of wireshark is to visualize packets coming from traditional IP traffic, that is why default wireshark settings provides a relatively good overview of IP packets for most of the use cases. The problem is that this configuration is not at all suitable for spec...]]></description>
				<content:encoded><![CDATA[<h1>The problem with wireshark</h1>
<p>Primary usage of wireshark is to visualize packets coming from traditional IP traffic, that is why default wireshark settings provides a relatively good overview of IP packets for most of the use cases.</p>
<p>The problem is that this configuration is not at all suitable for specific needs of Telecom traffic analysis, and does not give you a quick vision when you are working on an SS7 Pcap.</p>
<p>Here is an example of SS7 traffic using default wireshark settings:</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_no_color_rules_mobicents.png"><img class="alignnone size-large wp-image-65" alt="Labs_wireshark_no_color_rules_mobicents" src="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_no_color_rules_mobicents-1024x562.png" width="625" height="343" /></a>(click on image to enlarge)</p>
<p>With default wireshark configuration:</p>
<ul>
<li>You cannot see the interesting addresses in packet list view due to different addressing in SS7 and multiple layers involved.</li>
<li>You see only one color for all different SS7 traffic types, because wireshark pre-configures coloring only for standard protocols.</li>
</ul>
<h3>Why SS7 traffic is more complex to analyze</h3>
<p>First, <strong>SS7 Addressing is more complex than IP</strong> :<br />
Instead of only <strong>IP + port </strong>tuples to represent endpoints of IP communication, in SS7 you use <strong>Global Titles</strong> (GT), <strong>Point Codes</strong> (PC or SPC) and <strong>Sub-System Numbers</strong> (SSN), that can be used as follow:</p>
<ul>
<li>Global Title (GT)</li>
<li>Global Title + Sub-System Number (GT + SSN)</li>
<li>Point Code (PC)</li>
<li>Point Code + Sub-System Number (PC + SSN)</li>
<li>Sub-System Number (SSN)</li>
</ul>
<p>Secondly, their are <strong>much more network layers involved in Telecom traffic</strong> than on usual IP only traffic. On typical SS7 traffic you face in order:</p>
<ul>
<li>Ethernet</li>
<li>Multiprotocol Label Switching (MPLS)</li>
<li>Internet Protocol (IP)</li>
<li>Stream Control Transmission Protocol (SCTP)</li>
<li>MTP Level 3 (MTP3) User Adaptation Layer (M3UA)</li>
<li>Signalling Connection Control Part (SCCP)</li>
<li>Transaction Capabilities Application Part (TCAP)</li>
<li>Mobile Application Part (MAP)</li>
</ul>
<p>Each of these layer contains more parameters compared to IP.</p>
<p>Besides, many small packet flags are critically important, such as M3UA Network Indicator (Coded on 1 Byte, it represents the type of SS7 link : Internal, National or International).</p>
<h1>Customize your wireshark</h1>
<h2>Customize Wireshark columns</h2>
<p>You can customize the display columns of Wireshark to show GT and SSN in the packet list view, and do this in a separate profile to have different views on your packet depending of your activity.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/wireshark_ss7_columns_anon.png"><img alt="wireshark_ss7_columns_anon" src="http://labs.p1sec.com/wp-content/uploads/2013/04/wireshark_ss7_columns_anon-1024x587.png" width="663" height="379" /></a></p>
<p>(click on image to enlarge)</p>
<h3>How to configure column display (wireshark &gt;= 1.8.0)</h3>
<ol>
<li>Create a new profile : Go to &#8220;Edit &gt; Configuration Profiles&#8221;, click on Add and call it &#8220;SS7&#8243;.</li>
<li>Add a column: Right click on the packet list view column titles and go in &#8220;Column Preferences&#8221;. In this window, click on &#8220;Add&#8221; to add a column, and set it&#8217;s name by clicking on it in the columns list.</li>
<li>Set the field type in the &#8220;Field Type&#8221; of your new column, select &#8220;Custom&#8221;. Now you can enter your wireshark expression in &#8220;Field Name&#8221;, for example sccp.calling.digits or sccp.called.ssn.</li>
<li>Click on &#8220;Apply&#8221;: you will have your new column in your Wireshark packet list view.</li>
</ol>
<p>NOTE: This can be generalized to any Wireshark expression, so you can display any data you want from the pcap in the columns view.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/wireshark_ss7_columns_conf.png"><img alt="wireshark_ss7_columns_conf" src="http://labs.p1sec.com/wp-content/uploads/2013/04/wireshark_ss7_columns_conf-1024x592.png" width="625" height="361" /></a></p>
<p>(click on image to enlarge)</p>
<h3>Exporting / Importing columns setting</h3>
<p>The following file stores the configuration for your Wireshark profile:</p>
<p><i>/home/user/</i>.wireshark./profiles/SS7/preferences</p>
<p>Example:</p>
<pre>[...]
# Packet list column format.
# Each pair of strings consists of a column title and its format.
gui.column.format:
	"No.", "%m",
	"Time", "%t",
	"cgGT", "%Cus:sccp.calling.digits:0:R",
	"cgSSN", "%Cus:sccp.calling.ssn:0:R",
	"cdGT", "%Cus:sccp.called.digits:0:R",
	"cdSSN", "%Cus:sccp.called.ssn:0:R",
	"Protocol", "%p",
	"Length", "%L",
	"Info", "%i"
[...]</pre>
<h2>Customize Wireshark coloring rules</h2>
<p>To get a better overview of the SS7 traffic and identify types of messages just by looking quickly at them, you can customize wireshark coloring rules. Each rule is defined by one filter (using the same syntax as usual wireshark display filters), and a set of 2 colors (foreground and background colors).</p>
<p>Here is an overview of 4 basic coloring rules applied on typical SS7 traffic: <a href="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_color_rules_04_anon.png"><img class="alignnone size-large wp-image-61" alt="Labs_wireshark_color_rules_04_anon" src="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_color_rules_04_anon-1024x562.png" width="625" height="343" /></a></p>
<p>(click on image to enlarge)</p>
<p>On the above screenshot, MAP layer is identified by yellow or green background color, whether the message is a MAP invoke (request) or MAP returnResultLast (answer).TCAP Abort (cancellation of TCAP dialog due to error) has a pink background, and TCAP Begin (initialization of TCAP dialog) has a light blue background (Not visible on the screenshot).</p>
<h3>How to configure coloring rules (wireshark &gt;= 1.8.0)</h3>
<ol>
<li>Go to &#8220;View &gt; Coloring Rules&#8221;.</li>
<li>Click on &#8220;New&#8221; to add a new rule.</li>
<li>Enter a wireshark display filter in &#8220;String:&#8221; text box. For example, to match MAP invoke messages you can use the filter &#8220;gsm_map.old.Component == 1&#8243;.</li>
<li>Choose one foreground and one background color for this filter, then click &#8220;OK&#8221;</li>
</ol>
<p>NOTE: coloring rules will be tried in order until one filter matches, top filter having the highest priority.</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_color_rules_02.png"><img class="alignnone size-full wp-image-44" alt="Labs_wireshark_color_rules_02" src="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_color_rules_02.png" width="750" height="679" /></a></p>
<p>(click on image to enlarge)</p>
<h3>Exporting / Importing coloring rules</h3>
<ol>
<li>Go to &#8220;View &gt; Coloring Rules&#8221;.</li>
<li>Optional: select one or more filtering rules to export by clicking on them. (Ctrl + Click to select multiple filters).</li>
<li>Click on &#8220;Export&#8221;.</li>
<li>Choose an output filename and optionally check the box &#8220;Export only selected filters&#8221;.</li>
</ol>
<p>You will get a file like <a href="http://labs.p1sec.com/wp-content/uploads/2013/04/Labs_wireshark_colorfilters_ss7.txt">this one</a>:</p>
<pre># DO NOT EDIT THIS FILE!  It was created by Wireshark
@MAP ReturnResultLast@gsm_map.old.Component == 2@[61023,65535,29648][0,0,0]
@MAP Invoke@gsm_map.old.Component == 1@[37006,53439,22070][0,0,0]
@TCAP abort@tcap.abort@[65535,52907,60113][0,0,0]
@TCAP begin@tcap.begin@[36382,59634,65535][0,0,0]</pre>
<p>This file can then be used to import coloring rules on another host.</p>
<p>&nbsp;</p>
<p>That&#8217;s it ! Don&#8217;t hesitate to comment with you&#8217;re own Wireshark tricks.</p>
<p>In a future blogpost, we&#8217;ll see how to use Wireshark to edit a PCAP, in order to forge packets or anonimize a PCAP file.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/04/04/ss7-traffic-analysis-with-wireshark/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
