Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 17 Telecom abuses. Attacks on Metering 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from.

Similar presentations


Presentation on theme: "Chapter 17 Telecom abuses. Attacks on Metering 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from."— Presentation transcript:

1 Chapter 17 Telecom abuses

2 Attacks on Metering 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from Coin entry signaled by pulses Clip on fraud Stealing cordless phone signal Social engineering Premium phone rate scam

3 Attacks on signaling Phone Phreaking Computer attacks Social Engineering Insecure end systems Message on answering machine including tones Computer viruses PBX Caller ID spoofing VoIP LINUX based Asterick (see Lucky225)

4 Feature Interaction Page 351, insert message into Spanish message. Call back from pay phone get’s charged back to pay phone owner Call forward someone you don’t like to expensive line Conference calls to violate parole checks

5 Mobile phones Mobile Phone Cloning Tumblers Demand for serials numbers created own attacks Protection RF finger printing Call patterns

6 Digital Technology GSM system Architecture Used most everywhere other than US, Canada, Japan and Israel Phones are commodity items, smart cards “bind” to specifics CDMA (leader), TDMA, PCS, iDEN in US http://kropla.com/mobilephones.htm GSM growing 3g next generation UMTS voice

7 Today’s issues Viruses PhoneCams Privacy Cheating

8 Corporate Fraud Cramming Slamming Premium rate numbers as international calls

9 Articles Phone Phreaking counter culture Caller ID spoofing Asterisk GSM A5/2 weakening

10 Past Articles here is some information on A5/1 and A5/2 GSM encryption http://en.wikipedia.org/wiki/A5/1 Caller id spoofing hack: http://www.nata2.org/2006/02/14/caller-id- spoofing-with-php-and-asterisk/ http://www.nata2.org/2006/02/14/caller-id- spoofing-with-php-and-asterisk/ Caller id spoofing through the web: http://www.theregister.co.uk/2004/07/07/hac kers_gut_voip/ http://www.theregister.co.uk/2004/07/07/hac kers_gut_voip/

11 Past Articles Wireless attacks http://www.windowsecurity.com/articles/Wireless_Attacks_Pri mer.html http://www.windowsecurity.com/articles/Wireless_Attacks_Pri mer.html Active cookies protection http://www.scmagazine.com/uk/news/article/544464/research er-develops-active-cookies-bite-cyber-crooks/ http://www.scmagazine.com/uk/news/article/544464/research er-develops-active-cookies-bite-cyber-crooks/ Homeland Security Secure PC http://baltimore.bizjournals.com/baltimore/stories/2006/03/06/d aily25.html?t=printable http://baltimore.bizjournals.com/baltimore/stories/2006/03/06/d aily25.html?t=printable Data Gathering http://www.foxnews.com/story/0,2933,186756,00.html

12 List of Resources Phone Phreaking: http://en.wikipedia.org/wiki/Phreaking http://www.wired.com/news/business/0,1367,36309,00.html http://www.wired.com/news/business/0,1367,36309,00.html Caller ID spoofing http://www.securityfocus.com/news/9822 http://www.schneier.com/blog/archives/2006/03/call er_id_spoof.html http://www.schneier.com/blog/archives/2006/03/call er_id_spoof.html http://www.usatoday.com/money/industries/telecom /2004-09-01-spoof_x.htm http://www.usatoday.com/money/industries/telecom /2004-09-01-spoof_x.htm http://www.spooftel.com/index.htm

13 List of resources Using Asterick http://www.rootsecure.net/?p=reports/callerid_spoof ing http://www.rootsecure.net/?p=reports/callerid_spoof ing http://www.asterisk.org/ Mobile Phone cloning http://www.tech-faq.com/cell-phone-cloning.shtml http://infotech.indiatimes.com/articleshow/1113824. cms http://infotech.indiatimes.com/articleshow/1113824. cms http://www.technicalinfo.net/opinions/opinion003.ht ml http://www.technicalinfo.net/opinions/opinion003.ht ml

14 List of resources GSM cloning http://www.securityfocus.com/news/399 http://www.isaac.cs.berkeley.edu/isaac/gsm.html Phone virus http://news.com.com/Cabir%20mobile%20virus%20 found%20in%20U.S./2100-7349_3-5582302.html http://news.com.com/Cabir%20mobile%20virus%20 found%20in%20U.S./2100-7349_3-5582302.html http://www.f-secure.com/v-descs/blankfont_a.shtml


Download ppt "Chapter 17 Telecom abuses. Attacks on Metering 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from."

Similar presentations


Ads by Google