PHREAKING. Content Phreaking history Bluetooth vulnerabilities Smart phone vulnerabilities Scandal in Greece US State investigation and Report about Chinese.

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Law Office. Law Office Solutions.
Advertisements

Aspire Vertical Markets Manufacturing and Warehouse Solutions.
Aspire Vertical Markets Executive Suite Solution.
Vertical Markets Education, K-12 School. K – 12 Education Solution.
Aspire Vertical Markets Banking, Finance and Insurance.
Aspire Vertical Markets Retail Store. Retail Store Solution.
Unified Communications (UC) Quick Reference Guide USING YOUR UC CLIENT This guide is designed to provide you with a quick overview of the Unified Communications.
Telephone Network Hierarchy Analog Sounds
Telephone Network Security and the Capn Crunch whistle in the 1960s and early 1970s.
Packet Switching vs. Circuit Switching
Telecommunications & Networking
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Introducing The IP550 IP Telephone. Things you should know about an IP Telephone system The IPitomy system has many of the same features of traditional.
Nortel Meridian 1 – Option 11C Family of Definity PBXs
Professor Nigel Linge Computer Networking and Telecommunications Research Group University of Salford.
Lines and Trunks (Ch. 7) PBX (Ch. 9) Key Telephone Systems (Ch. 10) ENGR 475 – Telecommunications Harding University Jonathan White.
Prepared by: Nahed Al-Salah
Voice Over Internet Protocol “VoIP” Muayyed Al Kadhem Abdulkhaleq Al Musaleem.
IP Telephony (Article Presentation) by Samir Goswami Source: Rivier College, CS699 Professional Seminar.
Data Communications Circuit Switching. Switching Networks Long distance transmission is typically done over a network of switched nodes Nodes not concerned.
EE 4272Spring, 2003 Chapter 9: Circuit Switching Switching Networks Circuit-Switching Networks Circuit-Switching Concept  Space-Division Switching  Time-Division.
Aspire Vertical Markets Real Estate Office. Real Estate.
Telecommunication and Networks
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Welcome u How to use your Phone Effectively u Telephone Features u Voice Messaging Features.
BASIC TELECOMMUNICATIONS
Winner Follow Me Presented by Telecom Transborder Services.
ICT at Work Global Communication.
Presented to: BUSINESS NAME December 1,2006. A New Way to Manage Your Business Communications.
Methods of communication
Fall 2008CS 334: Computer Security1 Network Security War Stories Fall 2008.
9/8/20151 Voice Mail Training for State Employees Presented by: Stacy Knickerbocker Telecommunications Specialist DOA/ITSD/NTSB
TDC 461: Basic Telecommunications DePaul University 9 April, 2001 LoriLee M. Sadler.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
By Will Peeden.  Voice over Internet Protocol  A way to make phone calls over the internet.  A way to bypass the standard phone company and their charges.
Aspire Vertical Markets Healthcare Solutions (Doctor’s office and Clinics)
1 Introduction to Communications and Networks ECI Dr. Vincent Siyau.
Signaling. The use of signals for controlling communications  E.g., call setup, connection, connection teardown, and billing Early signaling  Signaling.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
Introducing The IP550 IP Telephone. What to expect from your new IPitomy IP telephone system The IPitomy system has many of the same features of traditional.
Digital Systems. Digital Design  Digital Design is concerned with the design of digital electronic circuits.  Computers,  data communication equipment,
William Stallings Data and Computer Communications Chapter 9 Circuit Switching.
TELEPHONE NETWORK Telephone networks use circuit switching. The telephone network had its beginnings in the late 1800s. The entire network, which is referred.
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Telephony System Public switched telephone network
PSTN SERVICES. Lecture Overview POTS Integrated Services Digital Network Business Services Service Provider services.
EEC4113 Data Communication & Multimedia System Chapter 7: Network Layer by Muhazam Mustapha, October 2011.
©UNT in partnership with TEA1 Telecommunications & Networking Unit Subtitle: Modems.
Telephone Network & Signaling System. 8.2 Telephone Network Major Components LATAs Making a Connection Analog Services Digital Services A Brief History.
Voice Mail -toolkit.html.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Smart Call By S. Alex Raj S.Mahesh.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Purpose  The purpose of the cross box handoff feature is to make the.
Voice over Internet Protocol Presenter: Devesh Patidar Arunjay Singh August 2, 2009.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Unit-4 Telephone system
Using your ENA Connect Phone Polycom IP 650/ Getting to know your IP 650/670 Soft Keys Shortcut to call logs Menu navigation arrows = select X =
Circuit Switched vs. Packet Switched Technology. Old Technology vs. New Technology.
Aria Telecom Solutions Pvt. Ltd.
GSM Gateway ARIA TELECOM SOLUTIONS PVT. LTD..
Presented by: Kevin Regaldo Phillip Dai
Circuit Switching and Telephone Network
Introducing The IP550 IP Telephone
The Hong Kong University of Science and Technology
Lecture 5: TELEPHONE NETWORK
Lecture 5: TELEPHONE NETWORK.
Lecture 3: TELEPHONE NETWORK.
Presentation transcript:

PHREAKING

Content Phreaking history Bluetooth vulnerabilities Smart phone vulnerabilities Scandal in Greece US State investigation and Report about Chinese vendors

Let’s try! Can I have some phone numbers?

Term and reasons What is “phreaking”? Phone and freak Why it developed? Long distance calls One and only operator in U.S. Signaling vs. traffic, control plane vs. data plane

Simplest methods Switch hook vs. DTMF (Dual-tone multi-frequency signaling)

2600 Hz AT&T automatic switches Tone dialing In-band signaling Different SF (single-frequency) tones had different control meaning Originally planned to be used internally between remote switches 2600 Hz meant to remote (long distance) switch that call is over (off- hook), but transparently go through in local switch Means long distance carrier remained seized Joe Engressia, blind, perfect-pitch 7-year old boy (1957) found the signal John "Captain Crunch“ Draper found a free whistle to make the same sound After resetting the line, short 2600 Hz whistles can route you to another long distance number

Cap’n’Crunch Whistle

MF (Multi-frequency) Tones Most common signaling used MF 1964 Bell System Technical Journal Published an article about technical details of long distance signaling frequencies used Medium level knowledge in electronics was enough to recreate circuits Blue boxes Esquire Magazine published a story “Secrets of the Little Blue Box” Provided a popular description of using “blue box” technology including enough technical details that others satrted being interested Steve Wozniak More details one year later: "How to Build a 'Phone Phreaks' box" in Ramparts Magazine

Blue Box Generates the same tones were used communication (control calls) between telecom switches

Rainbow Boxes Black box Provided a free call to the caller, but device was connected to receiver (called) party “The F relay was used to detect a ring trip, and when activated, switched the called telephone from the ringing supply to the audio path. The D relay was used to start and stop the metering of the telephone call. The trick was to activate the F relay but not the D relay.” ack_box_%28phreaking%29 Red box Indicates to the network that coin is dropped to the payphone so call can be initiated In US: Automated Coin Toll Service

BBS-s and Information Sharing Bulletin Board System, accessed by personal computers and modems During these times hard discussion was ongoing to split AT&T into small pieces 1984 AT&T breakup

Toll Fraud Small companies emerged to handle long distance market calls Complex process: dial a local access number, enter calling card number (6-7 digits) enter area code and phone number To find a valid card number was almost possible by hand (call to a BBS for example) It was impossible or terribly expensive to trace these hacks by the small companies

Diverters Call forwarding features was not part of business exchanges (until 1993) Small businesses switched on their call answering diverters to use telecom operators service (it is a call to another equipment) Some diverters gave you a dial tone after recording was stopped Phreakers needed to find these problematic services Cost was covered by small businesses These voice mail boxes and bridges could be used as a communication channel for several phreaks until they were discovered

As a Summary “Many of today’s hacks work because the traditional phone system was built on the premise that only large, monopolistic phone companies would be using it, and they would all play by the same rules. But the network isn't the telcos' private sandbox anymore; it can be manipulated and controlled by anybody who understands basic computer networking.” ml ml

Greece Scandal Vodafone Greece use Ericsson equipment Seemed around 100 mobile phone numbers of politicians (also the prime minister) were tapped Started before the 2004 Olympics, until March 2005 The phone calls in question were "conference called" to 14 other lines with prepaid cards (Prepaid cards were located in the area of Ilissia (coincidentally around the American embassy). Calls seem to have been recorded. Vodafone informed the government right away, scandal (partly political) issued on 2006.

Greece Scandal Rouge software was detected after another (SMS sending issue) was investigated by Ericsson employees etappi_1.html etappi_1.html

Bluetooth Vulnerabilities Bluetooth worm Sends a marketing message or a program seems useful Reverse SMS “Bluesnarfing” Get access to a mobile using bluetooth connection Get information, any kind of data, address books, sms-s, chats, etc. Also able to crash a phone “Bluebugging” Able to send commands and control the whole phone behavior Change mobile to “listener” or spy device Pairing is needed A possible option to sniff the data traffic when it's pairing with another device

Lucky and social hacking Defcon story about Lucky225 Vonage as a telecom provider: "We give people a temporary phone number before we verify it with the phone company, and verification takes a couple of weeks. Somebody could pick the White House number and pretend to be the president.“

Yet the problem is inbound signaling Today telecom networks do not use inbound signaling Control plane and data plane separation is a must Yet possible to hack control plane but far more expensive device is needed Application level signaling can be done inbound Citibank card registration process

Smart Phones Vulnerabilities Installed applications can take over controlling your phone Too many software version, different bugs in different software levels No firewall on devices Forced install/uninstall

Security Issue Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE

Security Reports of H & ZTE U.S. National Security Report about Chinese Telecommunications Companies Huawei and ZTE “In particular, to the extent these companies are influenced by the state, or provide Chinese intelligence services access to telecommunication networks, the opportunity exists for further economic and foreign espionage by a foreign nation-state already known to be a major perpetrator of cyber espionage.”

Executive Summary “Neither company was willing to provide sufficient evidence to ameliorate the Committee’s concerns. Neither company was forthcoming with detailed information about its formal relationships or regulatory interaction with Chinese authorities. Neither company provided specific details about the precise role of each company’s Chinese Communist Party Committee. Furthermore, neither company provided detailed information about its operations in the United States. Huawei, in particular, failed to provide thorough information about its corporate structure, history, ownership, operations, financial arrangements, or management. Most importantly, neither company provided sufficient internal documentation or other evidence to support the limited answers they did provide to Committee investigators.”

Recommendations

Asterisk – (asterisk.org)