hecatae
14th July 2011, 02:15 PM
http://wiki.thc.org/vodafone
the register have got an article on this, but I find the source far more interesting, for example:
7.2. Call Fraud
The femto can be used to place calls or send SMS on somebodies else SIM card. This means the attacker is not charged for the call/sms.
The attack:
1. Catch a target phone with your femto cell.
2. Let the target phone register and authenticate via the vodafone core network.
3. From the femto deny all further traffic between the core network and the MS.
4. On the femto send a request to the vodafone core network to place a call.
5. Vodafone will try to authenticate the phone again. Only forward the authentication request and authentication reponse between the target phone and the core network. Do not forward any call set or other packets between the phone.
The vulnerability:
1.
The Femto cell contains a Mini-RNC/Node-B which is not a real RNC nor a Node-B. It's something inbetween. The mini-RNC can request real encryption keys and authentication vectors for any vodafone UK customer from the vodafone core network (like a real RNC). The vodafone core network still authenticates every single phone (like a Node-B).
The umts_sniffer program can be adapted to demonstrate call fraud.
and want cheap international calls?
7.3. Tunnelling
Carrying your femtocell with you wherever you go and tunnelling it back to the UK can be very handy, and is simple to do.
We will create an OpenVPN tunnel and then route all traffic to/from the femtocell down it. The far end of the tunnel will take care of NATting out to the Internet.
The femtocell will be on it's own private Class C on 192.168.2.0, and the tunnel will use 192.168.1.0.
If your laptop only has one ethernet interface, using a USB to Ether converter such as the EdiMax EU-4206 for the femto 'just works'.
So we now know why Ben wont give up his Sure Signal :D
the register have got an article on this, but I find the source far more interesting, for example:
7.2. Call Fraud
The femto can be used to place calls or send SMS on somebodies else SIM card. This means the attacker is not charged for the call/sms.
The attack:
1. Catch a target phone with your femto cell.
2. Let the target phone register and authenticate via the vodafone core network.
3. From the femto deny all further traffic between the core network and the MS.
4. On the femto send a request to the vodafone core network to place a call.
5. Vodafone will try to authenticate the phone again. Only forward the authentication request and authentication reponse between the target phone and the core network. Do not forward any call set or other packets between the phone.
The vulnerability:
1.
The Femto cell contains a Mini-RNC/Node-B which is not a real RNC nor a Node-B. It's something inbetween. The mini-RNC can request real encryption keys and authentication vectors for any vodafone UK customer from the vodafone core network (like a real RNC). The vodafone core network still authenticates every single phone (like a Node-B).
The umts_sniffer program can be adapted to demonstrate call fraud.
and want cheap international calls?
7.3. Tunnelling
Carrying your femtocell with you wherever you go and tunnelling it back to the UK can be very handy, and is simple to do.
We will create an OpenVPN tunnel and then route all traffic to/from the femtocell down it. The far end of the tunnel will take care of NATting out to the Internet.
The femtocell will be on it's own private Class C on 192.168.2.0, and the tunnel will use 192.168.1.0.
If your laptop only has one ethernet interface, using a USB to Ether converter such as the EdiMax EU-4206 for the femto 'just works'.
So we now know why Ben wont give up his Sure Signal :D