1 / 14

Chapter 17

Chapter 17. Telecom abuses. Attacks on Metering. 50’s operator listened for coins to hit metal plate Operator had to ask for number you were calling from Coin entry signaled by pulses Clip on fraud Stealing cordless phone signal Social engineering Premium phone rate scam.

Download Presentation

Chapter 17

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 17 Telecom abuses

  2. Attacks on Metering • 50’s operator listened for coins to hit metal plate • Operator had to ask for number you were calling from • Coin entry signaled by pulses • Clip on fraud • Stealing cordless phone signal • Social engineering • Premium phone rate scam

  3. Attacks on signaling • Phone Phreaking • Computer attacks • Social Engineering • Insecure end systems • Message on answering machine including tones • Computer viruses • PBX • Caller ID spoofing • VoIP LINUX based Asterick (see Lucky225)

  4. Feature Interaction • Page 351, insert message into Spanish message. • Call back from pay phone get’s charged back to pay phone owner • Call forward someone you don’t like to expensive line • Conference calls to violate parole checks

  5. Mobile phones • Mobile Phone Cloning • Tumblers • Demand for serials numbers created own attacks • Protection • RF finger printing • Call patterns

  6. Digital Technology • GSM system Architecture • Used most everywhere other than US, Canada, Japan and Israel • Phones are commodity items, smart cards “bind” to specifics • CDMA (leader), TDMA, PCS, iDEN in US • http://kropla.com/mobilephones.htm • GSM growing • 3g next generation • UMTS voice

  7. Today’s issues • Viruses • PhoneCams • Privacy • Cheating

  8. Corporate Fraud • Cramming • Slamming • Premium rate numbers as international calls

  9. Articles • Phone Phreaking counter culture • Caller ID spoofing Asterisk • GSM A5/2 weakening

  10. Past Articles • here is some information on A5/1 and A5/2 GSM encryption  • http://en.wikipedia.org/wiki/A5/1 • Caller id spoofing hack: • http://www.nata2.org/2006/02/14/caller-id-spoofing-with-php-and-asterisk/ • Caller id spoofing through the web: • http://www.theregister.co.uk/2004/07/07/hackers_gut_voip/

  11. Past Articles • Wireless attacks • http://www.windowsecurity.com/articles/Wireless_Attacks_Primer.html • Active cookies protection • http://www.scmagazine.com/uk/news/article/544464/researcher-develops-active-cookies-bite-cyber-crooks/ •  Homeland Security Secure PC • http://baltimore.bizjournals.com/baltimore/stories/2006/03/06/daily25.html?t=printable • Data Gathering • http://www.foxnews.com/story/0,2933,186756,00.html

  12. List of Resources • Phone Phreaking: • http://en.wikipedia.org/wiki/Phreaking • http://www.wired.com/news/business/0,1367,36309,00.html • Caller ID spoofing • http://www.securityfocus.com/news/9822 • http://www.schneier.com/blog/archives/2006/03/caller_id_spoof.html • http://www.usatoday.com/money/industries/telecom/2004-09-01-spoof_x.htm • http://www.spooftel.com/index.htm

  13. List of resources • Using Asterick • http://www.rootsecure.net/?p=reports/callerid_spoofing • http://www.asterisk.org/ • Mobile Phone cloning • http://www.tech-faq.com/cell-phone-cloning.shtml • http://infotech.indiatimes.com/articleshow/1113824.cms • http://www.technicalinfo.net/opinions/opinion003.html

  14. List of resources • GSM cloning • http://www.securityfocus.com/news/399 • http://www.isaac.cs.berkeley.edu/isaac/gsm.html • Phone virus • http://news.com.com/Cabir%20mobile%20virus%20found%20in%20U.S./2100-7349_3-5582302.html • http://www.f-secure.com/v-descs/blankfont_a.shtml

More Related