SS7 For INFOSEC Paul Coggin
SS7 For INFOSEC Paul Coggin
2018
SS7 for INFOSEC
Paul Coggin
@Paul Coggin
What is SS7
Reference: Signaling System No.7 (SS7/C7) Protocol, Architecture, and Services, Lee Dryburgh, Jeff Hewett, Cisco Press
SS7 Node Types
Signal Transfer Point (STP) – Routes SS7 messages between the SS7 nodes.
STP has access control list filtering capabilities.
Service Switching Point (SSP) – Carrier telephone switch that processes various
end point PSTN services such as voice, fax and modem.
Service Control Point (SCP) – Integrates the SS7 network with the databases
that contain information regarding services such as 800 numbers, mobile
subscribers, calling cards and other services.
Reference: Signaling System No.7 (SS7/C7) Protocol, Architecture, and Services, Lee Dryburgh, Jeff Hewett, Cisco Press
SS7 Network Architecture
STP STP
B-Links
A-Links
A-Links
B-Links
C-Links C-Links
SCP
SCP
B-Links
E-Link(AA-link)
F-Links
SSP SSP
Base Transceiver
Station(BTS) Other
Base Station Other MSC PSTN / SS7
Subsystem(BSS) MSC’s VLR
Reference: Signaling System No.7 (SS7/C7) Protocol, Architecture, and Services, Lee Dryburgh, Jeff Hewett, Cisco Press
SS7 Packet Capture
Reference: https://www.corelatus.com/gth/api/save_to_pcap/index.html
SIGTRAN Packet Capture
Reference: http://labs.p1sec.com/2013/04/04/ss7-traffic-analysis-with-wireshark/
Telecommunications Network Architecture
Server Server
Lawful Video Headend
Policy Provisioning Assurance Billing Web
Intercept IPTV/VOD
Server Servers Servers Server server
NMS
P Your
- Customer online bill payment
Grid Service 10 Gig, Highly Redundant
computer
image
L3VPN-
cannot
PE
PE
be
S
Si
i
DWDM
Cellular Mobile IP
Si
Backhaul
U-PE/
Si
GE Ring Si
PE-AGG
Si
Smart Grid
Edge
Data Service
Voice Service Branch Office Cell Tower
Video Service
Telecommuter Water / Sewer
CE
- In-band
- Out-of-band
Network Protocols SNMP Community
String Dictionary Attack
Telnet\SSH
Dictionary Attack UNIX NetMgt Server
MITM
ARP Poisoning HP OpenView Server
- RouFng, Switching, Redundancy with Spoofing to
Download Router\
Router\Switches\
NetMgt Server
Running NIS v1 Sniffing
Network Mgt Application Enumerate Oracle
TNS Listener to
- Apps, Client/Server Switch Configuration
Ypcat -d <domain>
Identify Default SID’s
Capture SNMP Community
<server IP> passwd Strings and Unencrypted Attempt to Login Using
Build New Router
HW, SW, Apps, RDBMS
Build New Router Login\Passwords, Protocol Default Login\Password
Configuration File to Configuration File to Grab shadow file hashes Further Enumerate
Passwords Further Enumerate
enable further privilege enable further privilege Oracle SID’s to
- Open Source escation Oracle SID’s to
escation Identify User Accts.
Identify Default
Reconfigure DBA System Level
- Commercial Crack Passwords
Inject New Routes
Configure
Device for
Router or Switch Accts\Passwords
Perform Dictionary
Attack
Or Bogus Protocol
- SoK Switch Upload New
Configuration File Packets
Further
Privilege
Voice Soft Switch Network
SS7 SSP
The service provider transport and soft switch vendors commonly provide a EMS for
their solution.
The EMS server commonly is multi-homed with one interface connected directly to the
Internet and a second connected to the management network.
The transport and voice technical staff may have the system installed without the
Internet
protection of a firewall or VPN.
A number of soft switch EMS systems have been hacked using SSH brute force attacks.
In some cases the EMS is installed behind a firewall with ACL’s trusting any inbound
IP connection destined to the SSH service.
Management EMS
Network
Internet Voice Transport Network
Backup EMS
Soft
Switch /
SS7 SSP
Backup
Soft Switch /
SS7 SSP
Network Management Architecture for a Service Provider
Use to Pivot to SS7 Infrastructure
OSS Provisioning
Remote VPN NOC OSS
NetMgt User \ Vendor AAA
Reports
Database SQL
SS7 Firewalls
• Cellusys
• Fortis Communications
• Configure STP to filter SS7 messages
Other Recommendations
• Audit the SS7, SIP, mobile wireless infrastructure in the telco voice networks
- Treat these networks similar to legacy ICS\SCADA networks when testing
- Penetration test
- Look for vendor backdoor remote access with static passwords (reused
EVERYWHERE)
• Utilize Signal or other for personal secure communications
• Replace SMS 2FA with alternative solutions
• Secure Visualization and Instrumentation
References
Signaling System No.7 (SS7/C7) Protocol, Architecture, and Services, Lee Dryburgh, Jeff Hewett, Cisco Press
Security of Public and IP Telephone Networks, A Security Assessment of SS7, SIGTRAN and VoIP Protocols, Sengar
Voice Over IP Fundamentals, Cisco Press
https://www.cisco.com/c/dam/global/en_ae/assets/ciscoexposaudi2008/assets/transport-and-applications-forss7--signaling-franktuhus.pdf
https://docstore.mik.ua/univercd/cc/td/doc/product/tel_pswt/vco_prod/ss7_fund/ss7fun03.pdf
https://www.slideshare.net/janardhanreddy30/ss7-tutorial
http://secuinside.com/archive/2015/2015-2-7.pdf
www.blackhat.com/presentations/bh-usa-06/BH-US-06-Waldron.pdf
http://blogs.blackberry.com/2016/04/how-to-protect-yourself-from-ss7-and-other-cellular-network-vulnerabilities/
http://www.fiercetelecom.com/telecom/verizon-seeks-fcc-permission-to-shutter-more-legacy-ss7-voice-switches-cites-ongoing-ip
https://www.wired.com/2017/05/fix-ss7-two-factor-authentication-bank-accounts/
https://www.theguardian.com/technology/2016/apr/19/ss7-hack-explained-mobile-phone-vulnerability-snooping-texts-calls
https://koolspan.com/ss7-mobile-network-vulnerabilities/
http://resources.infosecinstitute.com/ss7-protocol-how-hackers-might-find-you/
http://www.computerworld.com/article/3058020/security/hackers-only-need-your-phone-number-to-eavesdrop-on-calls-read-texts-track-
you.html
https://www.adaptivemobile.com/press-centre/press-releases/adaptivemobile-launches-ss7-protection
http://blogs.blackberry.com/2014/12/how-to-defeat-ss7-surveillance-of-calls-texts/
http://www.itproportal.com/2016/06/13/ss7-protocol-critical-mobile-network-security/
https://blog.kaspersky.com/hacking-cellular-networks/10633/
https://www.v3.co.uk/v3-uk/news/3009585/cybercriminals-use-ss7-telco-flaw-to-steal-from-bank-accounts
https://www.engagespark.com/blog/telcos-aggregators-ss7-grey-routes/
https://www.scmagazineuk.com/ss7-vulnerability-defeats-whatsapp-encryption-researchers-claim/article/530945/
http://www.centurylink.com/wholesale/pcat/ccsacss7.html
https://www.corelatus.com/gth/api/save_to_pcap/index.html
https://github.com/SigPloiter/SigPloit/wiki/3--How-to-use-the-SS7-module
https://www.cellusys.com/2016/03/19/subscriber-identity-disclosure-how-an-attacker-can-obtain-imsi-of-a-subscriber/
https://www.itu.int/en/ITU-T/Workshops-and-Seminars/201606/Documents/Abstracts_and_Presentations/S2P1_Luca_Melette.pdf
http://labs.p1sec.com/2013/04/04/ss7-traffic-analysis-with-wireshark/
https://www.blackhat.com/presentations/bh-europe-07/Langlois/Presentation/bh-eu-07-langlois-ppt-apr19.pdf
http://k4linux.com/2016/06/how-to-hack-facebook-account-with-phone-number-ss7.html
https://insinuator.net/2016/02/ss7maper-a-ss7-pen-testing-toolkit/
References
https://www.cyberscoop.com/finally-happened-criminals-exploit-ss7-vulnerabilities-prompting-concerns-2fa/
https://www.schneier.com/blog/archives/2014/12/ss7_vulnerabili.html
https://fedotov.co/ss7-hack-tutorial-software/
https://fedotov.co/ss7-mobile-phone-hacking-2/
https://www.blackhat.com/presentations/bh-europe-07/Langlois/Presentation/bh-eu-07-langlois-ppt-apr19.pdf
http://k4linux.com/2016/06/how-to-hack-facebook-account-with-phone-number-ss7.html
https://insinuator.net/2016/02/ss7maper-a-ss7-pen-testing-toolkit/
http://securityaffairs.co/wordpress/28397/hacking/surveillance-solutions.html
http://labs.p1sec.com/2012/12/02/sim-man-in-the-middle/
http://www.openss7.org
http://www.cellusys.com/2015/10/20/8-ss7-vulnerabilities-you-need-to-know-about/
https://thehackernews.com/2016/07/two-factor-authentication.html
http://blogs.blackberry.com/2016/01/how-ss7-flaw-gives-hackers-easy-access-to-your-private-phone-calls-what-you-can-do-about-it-white-
paper/
https://www.kaspersky.com/blog/hacking-cellular-networks/10633/
http://www.communicationsapplications.com/topics/communicationsapplications/articles/431871-hackers-bank-ss7-insecurity.htm?
utm_content=53980928&utm_medium=social&utm_source=twitter
https://en.wikipedia.org/wiki/Signalling_System_No._7
https://www.sans.org/reading-room/whitepapers/critical/fall-ss7--critical-security-controls-help-36225
https://www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw/
https://securityintelligence.com/ss7-vulnerability-isnt-a-flaw-it-was-designed-that-way/
http://www.cellusys.com/tcap-handshaking-ss7-security/introduction-to-ss7-and-security/
https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-
cell-calls-and-read-your-texts/?noredirect=on&utm_term=.01131f2bc2b8
http://www.telecomspace.com/forum/telecom/ss7
http://www.telecomspace.com/ss7.html
https://wiki.wireshark.org/CaptureSetup/SS7
https://hitcon.org/2015/CMT/download/day1-d-r0.pdf
http://labs.p1sec.com/2014/12/28/ss7map-country-risk-ratings/
https://resources.infosecinstitute.com/ss7-protocol-how-hackers-might-find-you/#gref
https://www.ptsecurity.com/upload/ptcom/SS7_WP_A4.ENG.0036.01.DEC.28.2014.pdf
https://play.google.com/store/apps/details?id=de.srlabs.snoopsnitch
https://arxiv.org/pdf/1510.07563.pdf
References
https://blog.securegroup.com/vulnerabilities-in-ss7-expose-all-networks-to-attacks-why-you-should-be-concerned
http://blog.ptsecurity.com/2014/08/cell-phone-tapping-how-it-is-done-and.html
http://blog.ptsecurity.com/2014/08/cell-phone-tapping-how-it-is-done-and.html
http://energy.sandia.gov/wp-content/gallery/uploads/sand_2005_2846p.pdf
https://blog.drhack.net/whatsapp-telegram-hacking-demo-live-ss7-vulnerability/2/
http://www.riverpublishers.com/journal_read_html_article.php?j=JICTS/5/1/2
https://www.cisco.com/c/dam/global/en_ae/assets/ciscoexposaudi2008/assets/transport-and-applications-forss7--signaling-franktuhus.pdf
http://netdude.sourceforge.net/
https://www.colasoft.com/packet_builder/
https://scapy.net/
https://n0where.net/build-gsm-base-station/
http://hackaday.com/2015/11/11/getting-started-with-gnu-radio/?
utm_content=bufferb488a&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
https://www.blackhat.com/docs/eu-15/materials/eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths-wp.pdf
http://resources.infosecinstitute.com/mobile-phone-tracking/
http://www.rs-online.com/designspark/electronics/eng/blog/running-a-gsm-network-on-the-raspberry-pi-2
https://github.com/yosriayed/GSM-scanner
http://resources.infosecinstitute.com/introduction-to-gsm-security/
http://discourse.criticalengineering.org/t/howto-gsm-base-station-with-the-beaglebone-black-debian-gnu-linux-and-a-usrp/56
http://www.insinuator.net/tag/gtp/
http://hackaday.com/2014/07/05/a-gsm-base-station-with-software-defined-radio/
http://imall.iteadstudio.com/im140318007.html
http://www.ptsecurity.com/download/Vulnerabilities_of_Mobile_Internet.pdf
http://blog.ptsecurity.com/2015/02/the-research-mobile-internet-traffic.html
https://www.schneier.com/blog/archives/2015/08/ss7_phone-switc.html
https://www.schneier.com/academic/archives/1999/12/attack_trees.html
MPLS VPN Security, Michael H. Behringer, Monique J. Morrow, Cisco Press
ISP Essentials, Barry Raveendran Greene, Philip Smith, Cisco Press
Router Security Strategies – Securing IP Network Traffic Planes, Gregg Schudel, David J. Smith, Cisco Press
LAN Switch Security – What Hackers Know About Your Switches, Eric Vyncke, Christopher Paggen, Cisco Press
Hijacking Label Switch Networks in the Cloud, Paul Coggin
Bending and Twisting Networks, Paul Coggin
Digital Energy – BPT, Paul Coggin
Questions?
@PaulCoggin
SS7 Link Types
• Bridge links (B links) – Connect STPs from different areas to create SS7
network backbone
• Full associated links ( F links) – In a large city SSPs and SCPs may connect
directly together using F links
Reference: Signaling System No.7 (SS7/C7) Protocol, Architecture, and Services, Lee Dryburgh, Jeff Hewett, Cisco Press
OSI Model vs. SS7 Protocol Stack
OSI Model SS7 Signaling Point Functions SS7 Level
7 Application TCAP
6 Presentation
TCAP ISUP TUP 4
5 Session