<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security &#187; attack</title>
	<atom:link href="http://blog.m-sec.net/tag/attack/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.m-sec.net</link>
	<description>When security is not enough</description>
	<lastBuildDate>Tue, 13 Nov 2012 20:58:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>New GSM vulnerability</title>
		<link>http://blog.m-sec.net/2012/new-gsm-vulnerability/</link>
		<comments>http://blog.m-sec.net/2012/new-gsm-vulnerability/#comments</comments>
		<pubDate>Fri, 17 Aug 2012 16:42:37 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[bogdan alecu]]></category>
		<category><![CDATA[http headers]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=108</guid>
		<description><![CDATA[I know I haven&#8217;t written on my blog for a long time (at least on the English version of it) so here comes an update. I have discovered a new vulnerability in the GSM network and I&#8217;m going to present it at EUSecWest which is held in Amsterdam, Netherlands on September 19/20. The presentation title is &#8220;Using HTTP [...]]]></description>
			<content:encoded><![CDATA[<p>I know I haven&#8217;t written on my blog for a long time (at least on the English version of it) so here comes an update.</p>
<p>I have discovered a new vulnerability in the GSM network and I&#8217;m going to present it at <a title="EUSecWest Bogdan Alecu" href="http://eusecwest.com/speakers.html" target="_blank">EUSecWest</a> which is held in Amsterdam, Netherlands on September 19/20. The presentation title is &#8220;<strong>Using HTTP headers pollution for mobile networks attacks</strong>&#8221; and basically I&#8217;m going to show how you could exploit the operator&#8217;s WAP homepage and perform attacks on a specific MSISDN.</p>
<p>There are also some other interesting talks, mostly on mobile security and let&#8217;s not forget about <a title="Mobile Pwn2Own" href="http://dvlabs.tippingpoint.com/blog/2012/07/20/mobile-pwn2own-2012" target="_blank">Mobile PWN2OWN</a>.</p>
<p>So, if you want to find some new interesting things about mobile security,  then please<a title="EUSecWest registration" href="https://eusecwest.com/register" target="_blank"> register for EUSecWest</a>!</p>
<p>See you in Amsterdam!</p>
<div id="tweetbutton108" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2012%2Fnew-gsm-vulnerability%2F&amp;via=msecnet&amp;text=New%20GSM%20vulnerability&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2012%2Fnew-gsm-vulnerability%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2012/new-gsm-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to protect from SIM Toolkit attack</title>
		<link>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/</link>
		<comments>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/#comments</comments>
		<pubDate>Thu, 22 Dec 2011 13:31:49 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[bogdan alecu]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[sim toolkit]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[STK]]></category>
		<category><![CDATA[text message]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=101</guid>
		<description><![CDATA[After all the media coverage of the subject (quite impressive) a lot of talks started, specially on Niebezpiecznik site from Poland, about how to protect from such attacks. Here are some good ideas: 1. On phones with Android you should remove the STK.apk application &#8211; right, but what if your phone is not rooted? Also [...]]]></description>
			<content:encoded><![CDATA[<p>After all the media coverage of <a title="SIM Toolkit attack Bogdan Alecu" href="http://blog.m-sec.net/2011/sim-toolkit-attack/" target="_blank">the subject</a> (quite impressive) a lot of talks started, specially on <a title="Niebezpiecznik Bogdan Alecu" href="http://niebezpiecznik.pl/post/odebranie-tego-sms-a-bedzie-cie-drogo-kosztowalo/" target="_blank">Niebezpiecznik</a> site from Poland, about how to protect from such attacks. Here are some good ideas:</p>
<p>1. On phones with Android you should remove the STK.apk application &#8211; right, but what if your phone is not rooted? Also since I&#8217;m not much into software / programming, I really doubt this would work because you will indeed not be able to access the SIM Toolkit application from your phone, but that doesn&#8217;t mean that your phone won&#8217;t be able to process STK commands issued by your SIM card</p>
<p>2. On phones with Windows Mobile, remove the HKEY_CLASSES_ROOT\SimToolkit.UI from the registry &#8211; this was something that I spoke of, but again, like the Android case, your SIM card still initiates commands, even though you can&#8217;t access the applications stored</p>
<p>3. Ask your mobile operator to disable premium rate charging &#8211; although somehow it&#8217;s true as your operator can disable calling to such number, it can&#8217;t disable texting <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' />  If you know such carrier, feel free to post a comment.</p>
<p>What else you should keep in mind is that the method used has to be convenient to everybody: people still want to use mobile banking, they still want to be able to check for the available credit from the Toolkit menu, they don&#8217;t want to jailbreak, root or cook their own ROM (this is for smartphones), not everyone holds a smartphone. Pretty tough to find a solution, right?</p>
<p>Well, not quite &#8211; I think the following solution is the most convenient as it takes care of most of the mentioned requirements.</p>
<p>So, in order to somehow<strong> protect from SIM Toolkit crafted SMS attack</strong>, just go to the settings of your messages, select the profile used for SMS and edit the message centre number by removing the last digit from it and save the settings (write down the full number first!). Pretty nice, right? So what have you just done? You have modified the number used by your phone in order to send messages. Yes, you still have access to the toolkit application, but you will not further be able to use any application that requires to send a message and also you will not be able to send any text messages anymore. However, receiving of SMS is not affected. Why to try the hard way &#8211; modify the entire software on your own &#8211; when there is a better and simpler solution? <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p><em>Disclamer: I am NOT responsible in any way for any wrong functionality of your phone, so if you have no idea what you&#8217;re doing, it&#8217;s better to leave it that way.</em></p>
<p>Even with this solution, be careful of one important thing: <span style="text-decoration: underline;">some carriers are charging you even if the message was not actually delivered</span> or you used a wrong message centre! Yes, you read that right: you could still be charged! The best way to test if your network operator does this is by using a prepay SIM with no credit on it, modify the message centre number and send a text message &#8211; your phone will inform you that it could not deliver the SMS. If you get back a message from the network saying that you don&#8217;t have enough funds, that&#8217;s bad: you will be charged anyway so you won&#8217;t be protected. Maybe you should switch to a different carrier?</p>
<p>I&#8217;m not saying that this method is the best, but it&#8217;s something it works in most of the cases. Let me know your findings.</p>
<div id="tweetbutton101" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fhow-to-protect-from-sim-toolkit-attack%2F&amp;via=msecnet&amp;text=How%20to%20protect%20from%20SIM%20Toolkit%20attack&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fhow-to-protect-from-sim-toolkit-attack%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>SIM Toolkit Attack</title>
		<link>http://blog.m-sec.net/2011/sim-toolkit-attack/</link>
		<comments>http://blog.m-sec.net/2011/sim-toolkit-attack/#comments</comments>
		<pubDate>Thu, 17 Nov 2011 18:03:04 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[alecu]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[deepsec]]></category>
		<category><![CDATA[fuzzing]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[recording]]></category>
		<category><![CDATA[sim toolkit]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[video]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=86</guid>
		<description><![CDATA[Hi all, I must say it was a real pleasure to attend the DeepSec 2011 edition. I&#8217;ve met a lot of interesting people and all the talks were great. Since it was my first time I held an international talk with such large audience, I was a little bit excited, but no matter what, I [...]]]></description>
			<content:encoded><![CDATA[<p>Hi all,</p>
<p>I must say it was a real pleasure to attend the <a title="DeepSec website" href="http://deepsec.net/" target="_blank">DeepSec</a> 2011 edition. I&#8217;ve met a lot of interesting people and all the talks were great. Since it was my first time I held an international talk with such large audience, I was a little bit excited, but no matter what, I still consider I did a pretty good job. By now I only got positive feedback <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>To answer some of the frequently asked questions:</p>
<p>1. The attack I showed has nothing to do with knowing the security keys as the response to the command is being sent even if there&#8217;s an error</p>
<p>2. The live demo worked &#8211; too bad I didn&#8217;t have a webcam to show you the target phone</p>
<p>3. There was no planning on who should volunteer for the live demo</p>
<p>4. The number you&#8217;ve seen during the demo is not the real number (only the first 3 digits were) and also wasn&#8217;t charged with 5 EUR &#8211; all it was just for the fun of it <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>5. The quickest way to protect is to change your phone to one that asks for your permission before allowing the SIM card to do something, or switch to another operator that doesn&#8217;t provide SIM cards with Toolkit Application on them &#8211; in Austria it&#8217;s at least one, as well in Romania <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>6. Pay attention to dual-SIM phones: some of them are not showing you the extra-menu belonging to the SIM application, so don&#8217;t get comfortable thinking that you&#8217;re protected</p>
<p>7. I&#8217;m not a hacker / cracker how the media likes to call the security specialists most of the times. My purpose was to make you aware of the danger of just using something like SMS</p>
<p>I was happy that right after the talk I&#8217;ve been contacted by <a title="Research In Motion" href="http://www.rim.com" target="_blank">RIM</a> in order to send them the details to fix this. It&#8217;s good to see that someone pays attention to these details. As long as they agree, I&#8217;ll keep you up to date with how the things are going.</p>
<p>Thank you Lynx, MiKa, Manuela for this opportunity! I&#8217;m pretty sure I&#8217;ll see you next year also <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' />  I also hope that next year there will be more people from Romania in the audience.</p>
<p>Below it&#8217;s a recording of my talk SMS fuzzing, SIM Toolkit Attack &#8211; I hope you&#8217;ll ignore my excitement <img src='http://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /><br />
<iframe src="http://player.vimeo.com/video/32481186" frameborder="0" width="550" height="470"></iframe></p>
<p>The slides from the talk can be found here (<a title="SIM Toolkit Attack slides" href="http://prezi.com/lmmptb0qldfb/sim-toolkit-attack/" target="_blank">click me</a>).</p>
<p>I wait for your feedback!</p>
<div id="tweetbutton86" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack%2F&amp;via=msecnet&amp;text=SIM%20Toolkit%20Attack&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/sim-toolkit-attack/feed/</wfw:commentRss>
		<slash:comments>18</slash:comments>
		</item>
		<item>
		<title>SIM Toolkit Attack on DeepSec 2011</title>
		<link>http://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/</link>
		<comments>http://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/#comments</comments>
		<pubDate>Thu, 08 Sep 2011 15:20:02 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[deepsec]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[STK]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=69</guid>
		<description><![CDATA[This is going to be my talk on DeepSec 2011. You may read more about it in an article on the DeepSec blog. There are a lot of good talks so my suggestion for you is to register for the conference and attend the talks. Tweet]]></description>
			<content:encoded><![CDATA[<p>This is going to be my talk on <a title="DeepSec 2011" href="https://deepsec.net/" target="_blank">DeepSec </a>2011. You may read more about it in an article on the <a title="DeepSec  2011SMS attack" href="http://blog.deepsec.net/?p=435" target="_blank">DeepSec blog.</a> There are a lot of good talks so my suggestion for you is to <a title="DeepSec 2011 registration" href="https://deepsec.net/register.html" target="_blank">register for the conference</a> and attend the talks.</p>
<div id="tweetbutton69" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack-on-deepsec-2011%2F&amp;via=msecnet&amp;text=SIM%20Toolkit%20Attack%20on%20DeepSec%202011&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack-on-deepsec-2011%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
	</channel>
</rss>
