Mobile Network A9ack Evolu=on

Size: px
Start display at page:

Download "Mobile Network A9ack Evolu=on"

Transcription

1 Mobile Network A9ack Evolu=on Karsten Nohl Luca Mele9e SRLabs Template v12

2 Security research is successful if vulnerabili=es get removed Security researchers discover new vulnerability classes (and some=mes mi=ga=ons) Industry assesses impact and implements counter measures This talk focuses on the industry response to mobile network security research 2

3 Agenda Advanced SIM card a<acks Advanced GSM intercept Keeping network operators honest 3

4 SIM security research mo=vated some technology upgrades Security researchers published several SIM card a<acks Industry reacted swioly but not thoroughly Finding 1 Anybody can send management SMS to SIM cards Response Many networks started filtering the most obvious a9ack messages 2 The OTA app mgmt interface is not always protected with good crypto Some operators phased out DES keys in favor of 3DES 3 SIM applica=ons can break out of their JavaCard sandbox The vulnerability has not been addressed yet in affected cards 4

5 1 Binary SMS can take many forms to circumvent filters Best pracdce filters vs. Imple- mented filters Several message types may go to the SIM Some phones also forward other types Many networks only filter one type SMS field PID DCS UDHI User data 127 * * * * 246 or 22 * * * * * * * * * 5

6 2 Misconfigura=ons in SIMs go well beyond DES keys ILLUSTRATIVE SIM configuradons need to be assessed in two dimensions 1. Verify that all keys are 3DES or AES Keyset 1: 3DES 2: 3DES 2. Verify that all SIM applicadons enforce cryptography ApplicaDon (TAR) Sign + encrypt Sign + encrypt FFFFFF Unprotected (MSL=0) Sign 16: DES Sign Sign 6

7 Demo Persistent infec=on of modern SIM card Target New nano- SIM (October 2013) in iphone 5s from major US carrier A<ack steps A B Lure the phone onto fake base sta=on to circumvent network filters Scan the SIM remotely for configura=on issues (on the SIM in this demo: discover TAR with MSL=0) C D Install Java virus through vulnerable TAR Let phone connect back to normal network, maintain persistent access through SMS- C&C 7

8 Tool release: SIM card configura=on security assessment Tool name SIMtester Purpose Find cryptographic a9ack surface: Signature disclosure 3DES downgrade Enumerate logical a9ack surface: Detect hidden applica=on TARs and test their security level Upload traces to gsmmap.org for further analysis (Thank you.) Requirements PC/SC smartcard reader or Osmocom phone Source opensource.srlabs.de 8

9 Agenda Advanced SIM card a9acks Advanced GSM intercept Keeping network operators honest 9

10 GSM intercept a9acks are s=ll under addressed The majority of mobile phone calls worldwide sdll uses 2G GSM frequencies To protect customers, mobile networks must support and harden two encrypdon standards 1 Older phones only support A5/1 encrypdon 2 A5/3 protects much be9er ProtecDon status: Available strengthening measures are rarely seen ProtecDon status: S=ll only a minority of networks support A5/3 10

11 1 A5/1 decryp=on can mostly be prevented through randomiza=on!! Features!to!decrease!cryptographic!attack!surface! Example!call!setup!trace! Unprotected!! Padding!randomization! +!SI5!randomization! Ciphering)Mode)Cmd) ) ) ) TMSI)Reallocation)Cmd) ) ) ) Null)Frame) ) ) ) System)Information)5) ) ) ) Call)Proceeding) ) ) ) System)Information)6) ) ) ) Null)Frame) ) ) ) Fragment) ) ) ) Assignment)Command) ) ) ) System)Information)5ter) ) ) ) ) Predictability,, High,, Medium,, None,(secure),, Not,ciphered,, 11

12 2 A5/3 makes intercept much harder, but decryp=on is s=ll possible for well- funded spy agencies Speed A5/1. One computer with 2TB storage decrypts short transac=ons (SMS) with 95% success in 1s (aggregated) Challenge: A5/3 decryp=on is computa=onally two million =mes more difficult A5/ computers break one 1- minute call per minute with 50% success Success Rate Cost 12

13 Tools release: Measuring mobile network security from Android or Linux Tool name GSMmap.apk xgoldscanner OsmocomBB Purpose Collect network traces on Android phone and upload for analysis to gsmmap.org Record network traces for analysis in Linux Update to Sylvain s burst_ind setup to capture network traces for analysis in Linux Requirements Rooted Samsung Galaxy S2/S3 Samsung Galaxy S2, S3, Note 2, or Nexus An older Motorola phone (C123, ) Source Google Play: GSMmap opensource.srlabs.de OsmocomBB git: gsmmap branch 13

14 Agenda Advanced SIM card a9acks Advanced GSM intercept Keeping network operators honest 14

15 Live ISO puts mobile security tools on ready- to- use USB s=ck GSM map live ISO bundles mobile security tools Network measurement with Galaxy S2/S3 Network measurement & IMSI catcher detec=on with Osmocom BB phone SIM card assessment with PC/SC reader or Osmocom BB phone Download and How- Tos opensource.srlabs.de 15

16 gsmmap.org Tracking mobile network evolu=on online 16

17 Thank you! Research supported by Many thanks to Lukas Kuzmiak and Linus Neumann for crea=ng and suppor=ng the research tools released today! Ques=ons? Karsten Nohl Luca Mele9e 17

GPRS Intercept: Wardriving your country. Karsten Nohl, Luca Melette,

GPRS Intercept: Wardriving your country. Karsten Nohl, Luca Melette, GPRS Intercept: Wardriving your country Karsten Nohl, nohl@srlabs.de Luca Melette, luca@srlabs.de Executive summary Do not send sensitive data over GPRS GPRS/EDGE networks provide the data backbone of

More information

Mobile network security report: Ukraine

Mobile network security report: Ukraine Mobile network security report: Ukraine GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin June 2017 Abstract. Mobile networks differ widely in their protection capabilities against common

More information

GSM security country report: Estonia

GSM security country report: Estonia GSM security country report: Estonia GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin September 2014 Abstract. GSM networks differ widely in their protection capabilities against common

More information

Understanding IMSI Privacy!

Understanding IMSI Privacy! Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy

More information

GSM security country report: Thailand

GSM security country report: Thailand GSM security country report: Thailand GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2013 Abstract. GSM networks differ widely in their protection capabilities against common

More information

Ghost Telephonist. Link Hijack Exploitations in 4G LTE CS Fallback. Yuwei ZHENG, Lin HUANG, Qing YANG, Haoqi SHAN, Jun LI

Ghost Telephonist. Link Hijack Exploitations in 4G LTE CS Fallback. Yuwei ZHENG, Lin HUANG, Qing YANG, Haoqi SHAN, Jun LI Ghost Telephonist Link Hijack Exploitations in 4G LTE CS Fallback Yuwei ZHENG, Lin HUANG, Qing YANG, Haoqi SHAN, Jun LI UnicornTeam, 360 Technology July 27, 2017 Who We Are? 360 Technology is a leading

More information

Ghost Telephonist. Link Hijack Exploitations in 4G LTE CS Fallback. Yuwei ZHENG, Lin HUANG, Qing YANG, Haoqi SHAN, Jun LI

Ghost Telephonist. Link Hijack Exploitations in 4G LTE CS Fallback. Yuwei ZHENG, Lin HUANG, Qing YANG, Haoqi SHAN, Jun LI Ghost Telephonist Link Hijack Exploitations in 4G LTE CS Fallback Yuwei ZHENG, Lin HUANG, Qing YANG, Haoqi SHAN, Jun LI UnicornTeam, 360 Technology July 27, 2017 Who We Are? 360 Technology is a leading

More information

Guess Who s Texting You?

Guess Who s Texting You? TelcoSecDay @ Troopers 3/20/12 Heidelberg, Germany Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser SBA Research, Vienna, Austria Source: path.com

More information

Practical Attack Scenarios on Secure Element-enabled Mobile Devices

Practical Attack Scenarios on Secure Element-enabled Mobile Devices Practical Attack Scenarios on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria 4 th International Workshop on Near Field Communication 13 March

More information

Manual Iphone 5 Unlock Code At Tmobile Usa >>>CLICK HERE<<<

Manual Iphone 5 Unlock Code At Tmobile Usa >>>CLICK HERE<<< Manual Iphone 5 Unlock Code At Tmobile Usa nicolasdiazdiez Oct 16, 2014 5:49 AM My question..you think they will send it to me although I did not stay in US for 40 days? If the email instructions are not

More information

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated Ch 9: Mobile Payments CNIT 128: Hacking Mobile Devices Updated 4-24-17 Current Generation Scenarios Mobile banking apps NFC-based or barcode-based payment apps used by consumers to purchase goods Premium-rated

More information

Pulse Supported Mobile Platforms

Pulse Supported Mobile Platforms Pulse Supported Mobile Platforms Updated: May 15, 2015 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 1 Contents Introduction... 3 Definitions... 3 Qualified Platform... 3 Compatible

More information

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,

More information

Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices

Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria WIMA 2012 NFC Research Track 11 April 2012, Monaco

More information

IBM Security Guardium

IBM Security Guardium IBM Security Guardium Version 10.1.4 Mapping Server IPs within IBM Security Guardium v10.1.4 instead of using the IBM License Metric Tool (ILMT) This document describes how to get the Server IP list for

More information

Manual Update Android 4.3 Galaxy S4 Active S

Manual Update Android 4.3 Galaxy S4 Active S Manual Update Android 4.3 Galaxy S4 Active S At the time, the Samsung Galaxy S4 was running Android 4.2 Jelly Bean. Galaxy S4 has received a number of new software upgrades including Android 4.3 Jelly

More information

GSM Sniffing with OsmocomBB. Joshua Pereyda

GSM Sniffing with OsmocomBB. Joshua Pereyda GSM Sniffing with OsmocomBB Joshua Pereyda Introduction In November 2011, Karsten Nohl and Sylvain Munaut presented a passive sniffing attack on modern cell phone systems My goal was to reproduce this

More information

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Protecting Against Online Fraud. F5 EMEA Webinar August 2014 Protecting Against Online Fraud F5 EMEA Webinar August 2014 Agenda Fraud threat trends and business challenges Web fraud protection Mobile fraud protection Security operations center Example architecture

More information

Secure boot under attack: Simulation to enhance fault injection & defenses

Secure boot under attack: Simulation to enhance fault injection & defenses Secure boot under attack: Simulation to enhance fault injection & defenses Martijn Bogaard Senior Security Analyst martijn@riscure.com / @jmartijnb Niek Timmers Principal Security Analyst niek@riscure.com

More information

Manual For Android Jelly Bean Features Samsung Galaxy S3 Release Date

Manual For Android Jelly Bean Features Samsung Galaxy S3 Release Date Manual For Android Jelly Bean Features Samsung Galaxy S3 Release Date Update Samsung Galaxy S3 to Android 4.3 Jelly Bean Samsung promised to release the Android 4.3 update for all their flagship devices,

More information

Cisco Advanced Malware Protec3on

Cisco Advanced Malware Protec3on Cisco Advanced Malware Protec3on Malware is an ever- growing problem The Reality: Organiza3ons Are Under AAack 95% of large companies targeted by malicious traffic 100% of organiza3ons interacted with

More information

Unlock Code For Tmobile Samsung Galaxy S Iii

Unlock Code For Tmobile Samsung Galaxy S Iii Unlock Code For Tmobile Samsung Galaxy S Iii Price In India Unlock Samsung Galaxy S3 III - Get Samsung Galaxy S 3 III Unlock Code Below (SGH-i747, Hi how much will it cost to unlock a T-mobile galaxy siii?

More information

Verizon Samsung Galaxy S3 Jelly Bean 4.2 Update

Verizon Samsung Galaxy S3 Jelly Bean 4.2 Update Verizon Samsung Galaxy S3 Jelly Bean 4.2 Update Uk At the time, the Samsung Galaxy S4 was running Android 4.2 Jelly Bean. Samsung Galaxy S5 vs Galaxy S4 vs Galaxy S3 - Build Quality to work for owners

More information

IBM InfoSphere Guardium

IBM InfoSphere Guardium IBM InfoSphere Guardium Version 9.5 Server IP Mapping for the IBM License Metric Tool (ILMT) This document describes how to get the Server IP list for each Guardium chargeable component (CC). PID 5725-I12

More information

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture

More information

Global Deep Scans Measuring vulnerability levels across organizations, industries, and countries

Global Deep Scans Measuring vulnerability levels across organizations, industries, and countries Global Deep Scans Measuring vulnerability levels across organizations, industries, and countries Fabian Bräunlein Luca Melette SRLabs Template v12 Motivation for this

More information

Secure Authentication for Internet environment using Biometric and One-Time Password

Secure Authentication for Internet environment using Biometric and One-Time Password UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 Secure Authentication for Internet environment using Biometric and One-Time

More information

SCALE 15x (c) 2017 Ty Shipman

SCALE 15x (c) 2017 Ty Shipman Please view my linked-in page (under See more) to get a copy of this presenta

More information

Manual Android Jelly Bean Features Samsung Galaxy S3 Release Date

Manual Android Jelly Bean Features Samsung Galaxy S3 Release Date Manual Android Jelly Bean Features Samsung Galaxy S3 Release Date The Samsung Galaxy S3 GT-I9300 variant running the Android 4.3 Jelly best-selling smartphones to date but the latest Android 4.3 Jelly

More information

Verizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2 1

Verizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2 1 Verizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2 1 Android 4.2.1 jelly bean update for samsung galaxy s3 verizon variant: how to install using custom rom (tutorial) - Install android 4.2.1 jelly

More information

Manual Nokia 2690 Mobile Phone Software And

Manual Nokia 2690 Mobile Phone Software And Manual Nokia 2690 Mobile Phone Software And Install Do not switch the device on when wireless phone use is prohibited or when it may cause interference QUALIFIED SERVICE. Only qualified personnel may install

More information

For a complete list of modifications included in this update please refer to the Release Notes section at the bottom of this document.

For a complete list of modifications included in this update please refer to the Release Notes section at the bottom of this document. GALAXY S 2.2 UPDATE New features and enhancements - Speed enhancements - Flash 10.x support - Samsung Media Hub - Save apps to your SD card to save internal memory - Support for new Google apps and other

More information

Telecoms: Generational Evolution of Attack Surfaces. HITB Beijing 2018

Telecoms: Generational Evolution of Attack Surfaces. HITB Beijing 2018 Telecoms: Generational Evolution of Attack Surfaces HITB Beijing 2018 Blast from the Past Agenda Brief history of telecoms Generation Zero Generation Fixed Generation Analog Mobile 1G Mobile 2G Mobile

More information

Privacy-ABC Technologies on Mobile Phones

Privacy-ABC Technologies on Mobile Phones Privacy-ABC Technologies on Mobile Phones Dr. Gert Læssøe Mikkelsen, Alexandra Institute A/S ABC4Trust Summit Event Brussels, January 20, 2015 A research project funded by the European Commission s 7th

More information

An operating system for the NHS

An operating system for the NHS An operating system for the NHS Dr Marcus Baw @marcus_baw General Practitioner & Emergency Physician, former Anaesthetist Clinical informatician / General Hacktitioner NHS.UK Alpha, RCGP HIG, Endeavour

More information

Manual Upgrade Android 4.3 Samsung Galaxy S3 Release Date Uk

Manual Upgrade Android 4.3 Samsung Galaxy S3 Release Date Uk Manual Upgrade Android 4.3 Samsung Galaxy S3 Release Date Uk Samsung has released Android 4.4.4 KitKat firmware update for Galaxy S3 LTE I9305. Those who are outside Germany can also get the update by

More information

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and

More information

Date: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.

Date: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc. Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification

More information

QUANTUM SAFE PKI TRANSITIONS

QUANTUM SAFE PKI TRANSITIONS QUANTUM SAFE PKI TRANSITIONS Quantum Valley Investments Headquarters We offer quantum readiness assessments to help you identify your organization s quantum risks, develop an upgrade path, and deliver

More information

Relay Attacks on Secure Elementenabled

Relay Attacks on Secure Elementenabled Relay Attacks on Secure Elementenabled Mobile Devices Virtual Pickpocketing Revisited Michael Roland University of Applied Sciences Upper Austria,, Austria SEC2012 IFIP International Information Security

More information

MPE+ Frequently Asked Questions & Troubleshooting

MPE+ Frequently Asked Questions & Troubleshooting MPE+ Frequently Asked Questions & Troubleshooting Version 7 (4.5.0.45078) 2011 AccessData Group, LLC Table of Contents Mobile Forensics Background Knowledge... 4 Q. What is the difference between Computer

More information

Uses of Cryptography

Uses of Cryptography Uses of Cryptography What can we use cryptography for? Lots of things Secrecy Authentication Prevention of alteration Page 1 Cryptography and Secrecy Pretty obvious Only those knowing the proper keys can

More information

Verizon Samsung Galaxy S3 Manual Update To Jelly Bean Official

Verizon Samsung Galaxy S3 Manual Update To Jelly Bean Official Verizon Samsung Galaxy S3 Manual Update To Jelly Bean 4.2.2 Official Pingback: Update Samsung Galaxy Note 2 N7100 to Official Android 4.3 Pingback: Flash Android 4.2.2 Jelly Bean OTA Update for Samsung

More information

Collabora've, Privacy Preserving Data Aggrega'on at Scale

Collabora've, Privacy Preserving Data Aggrega'on at Scale Collabora've, Privacy Preserving Data Aggrega'on at Scale Michael J. Freedman Princeton University Joint work with: Benny Applebaum, Haakon Ringberg, MaHhew Caesar, and Jennifer Rexford Problem: Network

More information

Verizon Samsung Galaxy S3 Update Fix 4.3 Uk O2

Verizon Samsung Galaxy S3 Update Fix 4.3 Uk O2 Verizon Samsung Galaxy S3 Update Fix 4.3 Uk O2 A new Samsung Galaxy S3 Android 4.4.4 KitKat update has been confirmed just S3, including the popular GT-I9300 variant, were left behind on Android 4.3 Jelly

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Dec 10, 2013 VERSION: 5.0R1 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform...

More information

Manual Update Motorola Droid 3 To Android 4.0.4

Manual Update Motorola Droid 3 To Android 4.0.4 Manual Update Motorola Droid 3 To Android 4.0.4 The Motorola Droid 4 is just five months old and when it was released back attain root at that point but with it receiving the Android 4.0.4 update recently,

More information

Pc Use Manual Pdf Samsung Galaxy S2 Lte

Pc Use Manual Pdf Samsung Galaxy S2 Lte Pc Use Manual Pdf Samsung Galaxy S2 Lte Use the instructions below and learn how to download and install them on your PC: After the computer boots into normal mode, you will need to connect the device

More information

Manual Iphone 5 Sim Usa Prices In Europe >>>CLICK HERE<<<

Manual Iphone 5 Sim Usa Prices In Europe >>>CLICK HERE<<< Manual Iphone 5 Sim Usa Prices In Europe Generally with a European SIM card, it's free to receive domestic texts and calls, calls and calls within the EU, and 5 15 cents to send a text within the EU. in

More information

Manually Root Droid Razr Maxx Jelly Bean Update Date

Manually Root Droid Razr Maxx Jelly Bean Update Date Manually Root Droid Razr Maxx Jelly Bean Update Date Droid bionic jelly bean root - The West researchers are is not droid bionic jelly bean The most anticipated update for the Droid RAZR Maxx HD, Jelly

More information

FIPS Crypto In the IoT. Chris Conlon ICMC17, May 16-19, 2017 Westin Arlington Gateway Washington DC

FIPS Crypto In the IoT. Chris Conlon ICMC17, May 16-19, 2017 Westin Arlington Gateway Washington DC FIPS 140-2 Crypto In the IoT Chris Conlon ICMC17, May 16-19, 2017 Westin Arlington Gateway Washington DC Outline A. B. C. D. E. Intro to wolfssl Overview of wolfcrypt FIPS FIPS 140-2 Challenges in the

More information

ME?

ME? ME? VULNEX: Blog: Twitter: www.vulnex.com www.simonroses.com @simonroses TALK OBJECTIVES Apps are the new Web Peek into current state of Apps security on Markets Bugs will be revealed but not the victims

More information

Instruction How To Use Wifi In Mobile Samsung Galaxy Y Duos

Instruction How To Use Wifi In Mobile Samsung Galaxy Y Duos Instruction How To Use Wifi In Mobile Samsung Galaxy Y Duos Samsung galaxy s duos wifi problem Samsung s7562 wifi ssid network setting Wifi cannot connect samsung 7562 Samsung galaxy gt s7562 wifi stucking

More information

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES

More information

Verizon Samsung Galaxy S3 Jelly Bean 4.2 Update

Verizon Samsung Galaxy S3 Jelly Bean 4.2 Update Verizon Samsung Galaxy S3 Jelly Bean 4.2 Update India Release Date We offer up five new Android 4.4.2 KitKat update release details. The Samsung Galaxy Note 2 Android 4.4.2 KitKat update, an update that

More information

Manual Update Android 4.3 Samsung Galaxy S3

Manual Update Android 4.3 Samsung Galaxy S3 Manual Update Android 4.3 Samsung Galaxy S3 Verizon Wireless How to manually update samsung galaxy s3 gt-i9300, at&t, u.s. cellular, t-mobile, Verizon galaxy s3 gets android 4.3 update - News which will

More information

Sprint Samsung Galaxy S2 Manual Update 4.0 4

Sprint Samsung Galaxy S2 Manual Update 4.0 4 Sprint Samsung Galaxy S2 Manual Update 4.0 4 But it is not working on Android 4.0.3 ICS Samsung Galaxy S2. I have 2 options ~ Media This guide is for Samsung Galaxy S2.,). ColtsWalker step # 3 does not

More information

Verizon Samsung Galaxy S3 Firmware Update Kies Probleme

Verizon Samsung Galaxy S3 Firmware Update Kies Probleme Verizon Samsung Galaxy S3 Firmware Update Kies Probleme Problem: Hi I am hoping you can give me some direction on a problem I'm having I even thought that maybe the Verizon S3 firmware was corrupted, so

More information

Attacking Mobile-Terminated Services in GSM

Attacking Mobile-Terminated Services in GSM Berlin Institute of Technology FG Security in Telecommunications Weiss Attacking Mobile-Terminated Services in GSM TelcoSecDay 2013 Nico Golde, Kevin Redon, Heidelberg, March 12th 2013 nico@sec.t-labs.tu-berlin.de

More information

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.

More information

Effective SS7 protection ITU Workshop on SS7 Security, June 29 th 2016

Effective SS7 protection ITU Workshop on SS7 Security, June 29 th 2016 Effective SS7 protection ITU Workshop on SS7 Security, June 29 th 2016 Luca Melette SRLabs Template v12 Motivation: Operators and their users still vulnerable to SS7 attacks Agenda 3 attack

More information

Sente Use Guide Pdf Samsung Galaxy S3 Mini

Sente Use Guide Pdf Samsung Galaxy S3 Mini Sente Use Guide Pdf Samsung Galaxy S3 Mini Quick Start Find out how to use and troubleshoot your Samsung Galaxy III mini with interactive simulators, how-to guides and support videos. View your User Guide.

More information

NFC Equipped Smartphones

NFC Equipped Smartphones NFC Equipped Smartphones A two-edged sword for library RFID systems VALA Conference 2014 www.sybis.com.au NFC equipped Smartphones NFC Card Emulation Mode Near Field Communications n A form of RFID contactless

More information

DEFCON 26 - Playing with RFID. by Vanhoecke Vinnie

DEFCON 26 - Playing with RFID. by Vanhoecke Vinnie DEFCON 26 - Playing with RFID by Vanhoecke Vinnie 1. Contents 2. Introduction... 3 3. RFID Frequencies... 3 Low frequency... 3 High frequency... 3 Ultra-high frequency... 3 4. MIFARE... 4 MIFARE Classic...

More information

Sprint Samsung Galaxy S3 Jelly Bean Manual

Sprint Samsung Galaxy S3 Jelly Bean Manual Sprint Samsung Galaxy S3 Jelly Bean Manual Update India Date Date The Samsung Galaxy Note 3 Lollipop update is finally making some progress faster processor, and brand new software that included Android

More information

Manual For Verizon Samsung Galaxy S Iii Mini Review Uk Sim Smartphone

Manual For Verizon Samsung Galaxy S Iii Mini Review Uk Sim Smartphone Manual For Verizon Samsung Galaxy S Iii Mini Review Uk Sim Smartphone Samsung I8190 Galaxy S III mini - user opinions and reviews card so large, like the size of a credit card. then cut it into mini sim,

More information

Breaking and Securing Mobile Apps

Breaking and Securing Mobile Apps Breaking and Securing Mobile Apps Aditya Gupta @adi1391 adi@attify.com +91-9538295259 Who Am I? The Mobile Security Guy Attify Security Architecture, Auditing, Trainings etc. Ex Rediff.com Security Lead

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision B McAfee Next Generation Firewall 5.7.3 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

HOLISTIC COMMUNICATIONS SECURITY

HOLISTIC COMMUNICATIONS SECURITY HOLISTIC COMMUNICATIONS SECURITY BLACK TIGER COUNTERING CYBER TERRORISM HOLISTIC COMMUNICATIONS SOLUTION LACSMI is leading vendor in telecommunications since 1992 promoting set of security solutions worldwide

More information

Can You Remove Sim Card Verizon Iphone 4s

Can You Remove Sim Card Verizon Iphone 4s Can You Remove Sim Card Verizon Iphone 4s Learn what to do if you see an "Invalid SIM" or "No SIM Card installed" alert Remove the SIM card and make sure that it's a valid SIM that your carrier You can

More information

Identity and Client Security for Remote Access Virtual Credential Container

Identity and Client Security for Remote Access Virtual Credential Container Identity and Client Security for Remote Access Virtual Credential Container Yukio Tsuruoka NTT Information Sharing Platform Laboratories Contents About NTT Background Outline Client security Use case:

More information

Manual Android Galaxy S3 India Release Date

Manual Android Galaxy S3 India Release Date Manual Android 4.1 2 Galaxy S3 India Release Date Here's how to update Android on your smartphone or tablet. iphone 7 UK release date, specs & new features rumours update button, its wierd but its true,

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Outline. Spanner Mo/va/on. Tom Anderson

Outline. Spanner Mo/va/on. Tom Anderson Spanner Mo/va/on Tom Anderson Outline Last week: Chubby: coordina/on service BigTable: scalable storage of structured data GFS: large- scale storage for bulk data Today/Friday: Lessons from GFS/BigTable

More information

Manual Update Android 4.3 Samsung Galaxy S3

Manual Update Android 4.3 Samsung Galaxy S3 Manual Update Android 4.3 Samsung Galaxy S3 Release Date In India I9300XXUGNH4 Android 4.3 firmware released for Galaxy S3.Samsung Build date: 18 August wish to install I9300XXUGNH4 Android 4.3 on Galaxy

More information

Manual Android 4.3 Galaxy S3 Verizon Official Update

Manual Android 4.3 Galaxy S3 Verizon Official Update Manual Android 4.3 Galaxy S3 Verizon Official Update Here's an updated tutorial for rooting all Galaxy S3 models including AT&T, T-Mobile, (It will not work on Verizon S3 as it has a locked bootloader.)

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Sept 21, 2012 VERSION: 12.09R21.01 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible

More information

Care & Feeding of Programmers: Addressing App Sec Gaps using HTTP Headers. Sunny Wear OWASP Tampa Chapter December

Care & Feeding of Programmers: Addressing App Sec Gaps using HTTP Headers. Sunny Wear OWASP Tampa Chapter December Care & Feeding of Programmers: Addressing App Sec Gaps using HTTP Headers Sunny Wear OWASP Tampa Chapter December Mee@ng 1 About the Speaker Informa@on Security Architect Areas of exper@se: Applica@on,

More information

User Manual For Verizon Droid Razr Maxx Hd Release Date

User Manual For Verizon Droid Razr Maxx Hd Release Date User Manual For Verizon Droid Razr Maxx Hd Release Date The smartphone has been rumored for months, but today an official Verizon twitter account leaked the photo well ahead of the DROID Turbo release

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Sep 19, 2013 Copyright 2013, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform... 1 Related

More information

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings. Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM

More information

INSTITUTO DE MATEMÁTICA E ESTATÍSTICA UNIVERSIDADE DE SÃO PAULO. GSM Security. MAC Computação Móvel

INSTITUTO DE MATEMÁTICA E ESTATÍSTICA UNIVERSIDADE DE SÃO PAULO. GSM Security. MAC Computação Móvel INSTITUTO DE MATEMÁTICA E ESTATÍSTICA UNIVERSIDADE DE SÃO PAULO GSM Security MAC 5743 - Computação Móvel Damian Matuszewski NR USP 7956955 dimatusz@gmail.com 12/07/2012 Abstract: GSM is the most common

More information

Privacy through Pseudonymity in Mobile Telephony Systems

Privacy through Pseudonymity in Mobile Telephony Systems Privacy through Pseudonymity in Mobile Telephony Systems Myrto Arapinis 1 Loretta Mancini 2 Eike Ritter 2 Mark Ryan 2 1 School of Informatics, University of Edinburgh 2 School of Computer Science, University

More information

Leviathan redux. John L. Manferdelli Intel Science and Technology Center for Secure Compu;ng UC, Berkeley

Leviathan redux. John L. Manferdelli Intel Science and Technology Center for Secure Compu;ng UC, Berkeley Leviathan redux John L. Manferdelli Intel Science and Technology Center for Secure Compu;ng UC, Berkeley Joint work with Tom Roeder (Google), Fred Schneider (Cornell) And Kevin Walsh of Mt Holyoke College

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

Legacy Crypto Never Dies (Why won't DES just die???)

Legacy Crypto Never Dies (Why won't DES just die???) Legacy Crypto Never Dies (Why won't DES just die???) David Hulton DefCon 2012 Recap 100% break of MSCHAPv2 Provides mutual authentication with a password Specifically focused on usage

More information

EasyCrypt passes an independent security audit

EasyCrypt passes an independent security audit July 24, 2017 EasyCrypt passes an independent security audit EasyCrypt, a Swiss-based email encryption and privacy service, announced that it has passed an independent security audit. The audit was sponsored

More information

Verizon Manual Apn Settings For Straight Talk Iphone Mms

Verizon Manual Apn Settings For Straight Talk Iphone Mms Verizon Manual Apn Settings For Straight Talk Iphone Mms Fix issue that cannot send or recieve MMS on straight talk. Again, for user name and password leave it in blank If you have an iphone or ipad: Setup

More information

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng Basic concepts in cryptography systems Secret cryptography Public cryptography 1 2 Encryption/Decryption Cryptanalysis

More information

How to hack your way out of home detention!

How to hack your way out of home detention! How to hack your way out of home detention! About me! William @Amm0nRa Turner! @Assurance! About presentation! Acquire a home detention tracking system! Get a BladeRF SDR! Use open source GSM software

More information

Computer Security CS 526

Computer Security CS 526 Computer Security CS 526 Topic 4 Cryptography: Semantic Security, Block Ciphers and Encryption Modes CS555 Topic 4 1 Readings for This Lecture Required reading from wikipedia Block Cipher Ciphertext Indistinguishability

More information

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng Cryptography Basics IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Outline Basic concepts in cryptography systems Secret key cryptography Public key cryptography Hash functions 2 Encryption/Decryption

More information

Sprint Samsung Galaxy S3 Jelly Bean Manual Update Verizon Release Date

Sprint Samsung Galaxy S3 Jelly Bean Manual Update Verizon Release Date Sprint Samsung Galaxy S3 Jelly Bean Manual Update Verizon Release Date A new Samsung Galaxy S3 Android 4.4.4 KitKat update has been confirmed just as including the popular GT-I9300 variant, were left behind

More information

Poten&al Denial- of- Service Threat Assessment for Cogni&ve Radios

Poten&al Denial- of- Service Threat Assessment for Cogni&ve Radios oten&al Denial- of- Service Threat Assessment for Cogni&ve Radios Timothy X Brown*, Amita Sethi + *, + Interdisciplinary Telecommunica&ons *Electrical, Computer, and Energy Engineering University of Colorado,

More information

How I Learned to Stop Worrying and Love the Internet of Things

How I Learned to Stop Worrying and Love the Internet of Things SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity

More information

Don t blink or how to create secure software. Bozhidar Bozhanov, LogSentinel

Don t blink or how to create secure software. Bozhidar Bozhanov, LogSentinel Don t blink or how to create secure software Bozhidar Bozhanov, CEO @ LogSentinel About me Senior software engineer and architect Founder & CEO @ LogSentinel Former IT and e-gov advisor to the deputy prime

More information

Samsung Galaxy S4 Schematics Music From Itunes

Samsung Galaxy S4 Schematics Music From Itunes Samsung Galaxy S4 Schematics Music From Itunes Onto Hey guys, Mike here and In this short video I'm going to show you how to sync your itunes content with the Samsung Galaxy S4, or in other words I'll

More information

Htc Verizon Use Manual For Samsung Galaxy S3 User's

Htc Verizon Use Manual For Samsung Galaxy S3 User's Htc Verizon Use Manual For Samsung Galaxy S3 User's Find out how to use and troubleshoot your Samsung Galaxy S III with interactive simulators, View your User Guide Manage your device in My Verizon. If

More information

Security Philosophy. Humans have difficulty understanding risk

Security Philosophy. Humans have difficulty understanding risk Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision B McAfee Next Generation Firewall 5.7.4 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information