Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 17 Telecom abuses. Attacks on Metering 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from.

Similar presentations


Presentation on theme: "Chapter 17 Telecom abuses. Attacks on Metering 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from."— Presentation transcript:

1 Chapter 17 Telecom abuses

2 Attacks on Metering 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from Coin entry signaled by pulses Clip on fraud Stealing cordless phone signal Social engineering Premium phone rate scam

3 Attacks on signaling Phone Phreaking Computer attacks Social Engineering Insecure end systems Message on answering machine including tones Computer viruses PBX Caller ID spoofing VoIP LINUX based Asterick (see Lucky225)

4 Feature Interaction Page 351, insert message into Spanish message. Call back from pay phone get’s charged back to pay phone owner Call forward someone you don’t like to expensive line Conference calls to violate parole checks

5 Mobile phones Mobile Phone Cloning Tumblers Demand for serials numbers created own attacks Protection RF finger printing Call patterns

6 Digital Technology GSM system Architecture Used most everywhere other than US, Canada, Japan and Israel Phones are commodity items, smart cards “bind” to specifics CDMA (leader), TDMA, PCS, iDEN in US GSM growing 3g next generation UMTS voice

7 Today’s issues Viruses PhoneCams Privacy Cheating

8 Corporate Fraud Cramming Slamming Premium rate numbers as international calls

9 Articles Phone Phreaking counter culture Caller ID spoofing Asterisk GSM A5/2 weakening

10 Past Articles here is some information on A5/1 and A5/2 GSM encryption Caller id spoofing hack: spoofing-with-php-and-asterisk/ spoofing-with-php-and-asterisk/ Caller id spoofing through the web: kers_gut_voip/ kers_gut_voip/

11 Past Articles Wireless attacks mer.html mer.html Active cookies protection er-develops-active-cookies-bite-cyber-crooks/ er-develops-active-cookies-bite-cyber-crooks/ Homeland Security Secure PC aily25.html?t=printable aily25.html?t=printable Data Gathering

12 List of Resources Phone Phreaking: Caller ID spoofing er_id_spoof.html er_id_spoof.html / spoof_x.htm / spoof_x.htm

13 List of resources Using Asterick ing ing Mobile Phone cloning cms cms ml ml

14 List of resources GSM cloning Phone virus found%20in%20U.S./ _ html found%20in%20U.S./ _ html


Download ppt "Chapter 17 Telecom abuses. Attacks on Metering 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from."

Similar presentations


Ads by Google