Вы находитесь на странице: 1из 40

QUANTUM ENCRYPTION

By
K.KARTHIK
SRI SAI NATH

OVERVIEW

Introduction of Mobile communication


Types of Mobile Communication Services
Vulnerabilities in Mobile Communication
Tools Required
Architecture of GPRS/EDGE
Introduction of the Attack
Result
Countermeasures

INTRODUCTION

MOBILE COMMUNICATION
A Communication network which does not
depend on any physical connection
between two communications.

MOBILE COMMUNICATION
SERVICES
2G
GSM Global System for Mobile
Communications GPRS -- General Packet
Radio Service
EDGE Enhanced Data rates for Global
Evolution
3G
UMTS Universal Mobile Telecommunication
System
HSPA High Speed Packet Access

ARCHITECTURE OF
GPRS/EDGE

VULNERABILITIES
Lack of Mutual Authentication
GEA0 Support
UMTS --> GPRS/EDGE fallback

TOOLS REQUIRED

Laptop
BTS (Base Transceiver station)
GGSN (Gateway GPRS Support Node)
BSC (Base Station Controller)
SSGN (Service GPRS Support Node)
Cell Phone Jammer

LETS BEGIN THE ATTACK

INITIAL SETUP

STEP 1

Cell characterization

STEP 2

2 Attacker starts emitting

STEP 3

3 Victim camps to rogue cell

STEP 4

4
Attacker gets full MitM
control of victims
data communications

FRNDS LET US PERFORM THE ATTACK ON IPHONE

RESULT

PROBLEM IS HOW TO EXTEND THIS ATTACK TO 3G DEVICES

EXTENDING ATTACK TO UMTS

Jam UMTS band

Let us see what we can get from this attack...

ATTACK 1
Sniffing data from phone

What happened?

ATTACK 2
Phising attack against an iPad (http version)

What happened?

ATTACK 3
Phising attack against an iPad (https version)

What happened?

ATTACK 4
Attacker takes over a Windows PC via GPRS/EDGE

What happened?

user / password
remote desktop

ATTACK 5

Attacking a 3G Router in order to control the IP traffic of


, all devices behind it

What happened?

ATTACK 6
Attacking other GPRS/EDGE devices

What happened?

FTP

Defending ourselves
So, what can we do to protect our
mobile data communications?

SOLUTION

COUNTERMEASURES
Configuring Mobile Devices only to 3G and
rejecting GPRS/EDGE services
Encrypt our data communications at
higher layers (https, ssh, IPsec, etc.)

Installing and Configuring firewall software

CONCLUSION
We must protect our GPRS/EDGE
mobile data communications:
Know the vulnerabilities
Evaluate the risks
Take appropriate countermeasures

Вам также может понравиться