Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software
نویسندگان
چکیده
With the emergence of widely available hardware and software tools for GSM hacking, the security of cellular networks is threatened even by script kiddies. In this paper we present four different attacks in GSM networks, using commodity hardware as well as open source and freely available software tools. All attacks are performed using a common DVB-T TV tuner, which is used as a sniffer for the GSM radio interface, as well as an Arduino combined with a GSM shield that is used as a software programmable mobile phone. The attacks target both mobile users and the network, ranging from sniffing the signaling traffic to tracking and performing denial of service to the subscribers. Despite the script kiddie style of the attacks, their consequences are critical and threaten the normal operation of the cellular networks.
منابع مشابه
So long, and thanks for only using readily available scripts
There is a general belief that it has become easier to conduct cyber attacks and that little skill or knowledge is required to compromise systems. In particular, it is often argued that the technical expertise required to mount successful cyber attacks is declining as a consequence of new offensive resources, such as attack scripts and userfriendly attack execution tools, becoming available in ...
متن کاملAn advanced persistent threat in 3G networks: Attacking the home network from roaming networks
The HLR/AuC is considered to be one of the most important network elements of a 3G network. It can serve up to five million subscribers and at least one transaction with HLR/AuC is required for every single phone call or data session. This paper presents experimental results and observations that can be exploited to perform a novel distributed denial of service attack in 3G networks that target...
متن کاملIncreasing Performance in Commodity IP
Clusters built from commodity hardware and software have several advantages over more traditional supercomputers. Commodity clusters are cheap and ubiquitous, and so they are easier to design, program and maintain. However, even as high-speed networks reach 10Gb/s speeds and modern computer architectures reach past 1Ghz, new commodity clusters are not able to harness this power. One of the bott...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملUnderstanding the Packet Processing Capability of Multi-Core Servers
Compared to specialized network equipment, software routers running on commodity servers allow programmers to rapidly build and (re)program networks using the software and hardware platforms they tend to be most familiar with—that of the general-purpose computer. Unfortunately, the Achilles’ heel of software routers has been performance; commodity servers have traditionally proven incapable of ...
متن کامل