<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security &#187; Phone</title>
	<atom:link href="https://blog.m-sec.net/category/phone/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.m-sec.net</link>
	<description>When security is not enough</description>
	<lastBuildDate>Tue, 13 Nov 2012 20:58:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Android 4.2 still vulnerable to SIM Toolkit attack</title>
		<link>https://blog.m-sec.net/2012/android-4-2-stk-attack-vulnerable/</link>
		<comments>https://blog.m-sec.net/2012/android-4-2-stk-attack-vulnerable/#comments</comments>
		<pubDate>Tue, 13 Nov 2012 20:58:39 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[premium]]></category>
		<category><![CDATA[sim toolkit]]></category>
		<category><![CDATA[sms]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=146</guid>
		<description><![CDATA[A couple of hours ago the update to Android 4.2 has been made available. One of the new security features is that it also protects from the premium SMS when an app tries to send them. How Android knows about premium messages is that it reads an XML list where each country has it&#8217;s own [...]]]></description>
			<content:encoded><![CDATA[<p>A couple of hours ago the update to Android 4.2 has been made available. One of the new security features is that it also protects from the premium SMS when an app tries to send them.</p>
<p>How Android knows about premium messages is that it reads an XML list where each country has it&#8217;s own defined premium rate numbers and how many digits those numbers need to have. Below you will find such protection example. I have used a malware app which was sending a message to a 6 digit number. Since in Romania we have 4 digits for premium numbers, the operating system allows it to send the text. As soon as it&#8217;s sent, I get a reply from the network informing me that the destination is not allowed (in Romanian). Then I modified the app to send to 1263 number. This time I got prompted by a dialog saying that I&#8217;m going to be charged for this operation. I even allowed it once and the reply from the mobile network is that I do not have enough credit &#8211; since my balance is zero &#8211; so this time it really was a premium rate number.</p>
<p><iframe src="https://www.youtube.com/embed/nkND9edVszQ?rel=0" frameborder="0" width="560" height="315"></iframe></p>
<p>Another thing I wanted to check was if with this update I am going to be protected against premium SMS SIM Toolkit attack. However, the STK.apk icon was not visible after this update. If you are also in this situation after the Android 4.2 update, you will need to re-enable SIM PIN protection and the issue is solved &#8211; you can see the SIM Toolkit app in the menu.</p>
<p>Now, since the Android 4.2 protects also against the basic regular SMS app when you want to send a text to a premium number by yourself, I could not see any reason for not protecting also against SIM Toolkit attack since the STK.apk is involved. The result?</p>
<p><iframe src="https://www.youtube.com/embed/ky5br8yQ5QQ?rel=0" frameborder="0" width="560" height="315"></iframe></p>
<p>As you can see, the phone sends by itself a text message to a premium rate number, no protection involved from Android. Again I get the same reply from the network saying that I don&#8217;t have enough funds.</p>
<p>So, there it is: you are still vulnerable against SIM Toolkit attack with the new Android 4.2</p>
<div id="tweetbutton146" class="tw_button" style=""><a href="http://twitter.com/share?url=https%3A%2F%2Fblog.m-sec.net%2F2012%2Fandroid-4-2-stk-attack-vulnerable%2F&amp;via=msecnet&amp;text=Android%204.2%20still%20vulnerable%20to%20SIM%20Toolkit%20attack&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=https%3A%2F%2Fblog.m-sec.net%2F2012%2Fandroid-4-2-stk-attack-vulnerable%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('https://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>https://blog.m-sec.net/2012/android-4-2-stk-attack-vulnerable/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>avast Mobile Security is sending SMS without user knowledge</title>
		<link>https://blog.m-sec.net/2012/avast-mobile-security-is-sending-sms-without-user-knowledge/</link>
		<comments>https://blog.m-sec.net/2012/avast-mobile-security-is-sending-sms-without-user-knowledge/#comments</comments>
		<pubDate>Sat, 15 Sep 2012 17:54:45 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[Phone]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[avast]]></category>
		<category><![CDATA[premium rate]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[sms]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=132</guid>
		<description><![CDATA[UPDATE: I have been contacted by Avast to clarify this SMS issue and I&#8217;m working with them to fix this. I think I found the bug and, if proven, it&#8217;s something really funny. I hope I&#8217;ll be able to update you soon as I am leaving to EUSecWest conference. UPDATE2: It was not the bug [...]]]></description>
			<content:encoded><![CDATA[<p>UPDATE: I have been contacted by Avast to clarify this SMS issue and I&#8217;m working with them to fix this. I think I found the bug and, if proven, it&#8217;s something really funny. I hope I&#8217;ll be able to update you soon as I am leaving to EUSecWest conference.</p>
<p>UPDATE2: It was not the bug I was thinking of. After having a few communication messages with Avast, who actually were very helpful, I have to agree with them that <span style="text-decoration: underline;"><strong>this was NOT something they did on purpose</strong></span> &#8211; and I didn&#8217;t think so at all -  and also &#8220;<span style="text-decoration: underline;"><strong>it does not affect a lot of users as it requires special order of tasks to occur</strong></span>&#8220;. Indeed I was able to reproduce the bug by recording my steps and performing them on different devices. Maybe it was bad luck for me to discover these steps, but I am happy that I discovered the bug so that Avast&#8217;s customers will feel safer. Another thing I want to note is that Avast has issued a test update (only available to few until it will go into production), I applied the fix and <span style="text-decoration: underline;">I can confirm the issue is fixed now</span>. Great work Avast! Really fast response and much interest showed in solving the problem.</p>
<p>&nbsp;</p>
<p>A couple of days ago, I have installed on a test Android based phone the <a title="Avast mobile security" href="https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity&amp;feature=search_result#?t=W251bGwsMSwxLDEsImNvbS5hdmFzdC5hbmRyb2lkLm1vYmlsZXNlY3VyaXR5Il0." target="_blank">avast Mobile Securit</a>y solution from Google Play &#8211; the free version. After a few days when this antivirus solution was turning on the WiFi or the mobile data plan by itself, during the night, I chose to uninstall it.</p>
<p>Now something new came to my attention: I was checking my balance on the phone and noticed that 0.12 EUR were missing. Hmm, maybe I have sent a message to some of my Roaming SIM cards. I logged on to my account to check why I have been billed. I noticed that indeed a message was sent to a number outside my country, but after checking the number I realized this number was not mine.</p>
<p>See the below screenshot from my account:</p>
<p><a href="http://blog.m-sec.net/wp-content/uploads/2012/09/avast_sms.png"><img class="alignnone  wp-image-133" title="avast_sms" src="http://blog.m-sec.net/wp-content/uploads/2012/09/avast_sms.png" alt="Avast sends SMS" width="601" height="255" /></a></p>
<p>&nbsp;</p>
<p>So I looked for the country code: this number - <strong>420720001669</strong> &#8211; is from Czech Republic. Searching for this number on the web revealed that avast is actually sending this message. First occurrence from <a title="AVAST SMS" href="http://forum.universfreebox.com/viewtopic.php?t=37978" target="_blank">here</a>:</p>
<blockquote><p>Même problème, je viens de voir sur mon suivi un SMS vers le 420720001669 facturé à 19cts envoyé le 27 aout.</p>
<p>Il me semble que ça coïncide avec l&#8217;installation d&#8217;Avast Anti-Theft qui a l&#8217;autorisation d&#8217;envoyer des SMS. Et comme de par hasard AVAST software est une compagnie Tchèque &#8230;</p></blockquote>
<p>which translated would mean:</p>
<blockquote><p>Same problem, I just saw on my monitor SMS to 420720001669 charged 19cts sent on August 27.</p>
<p>It seems to me that it coincides with the installation of Avast Anti-Theft that has permission to send SMS messages. And as coincidence AVAST Software is a Czech company &#8230;</p></blockquote>
<p>Second result from <a title="Avast SMS" href="http://foros.orange.es/showthread.php?31265-SMS-que-aparece-en-mi-lista-de-llamadas" target="_blank">here</a></p>
<blockquote><p>Buenos días, esta mañana al consultar mi lista de llamadas me aparece lo siguiente:</p>
<p>24/08/2012 420720001669 ENVÍO SMS 08:12:02 1 MENSAJE</p>
<p>A esa hora no he enviado ningún SMS me pueden decir a q corresponde dicha numeración? El SMS tiene un coste de 60 cent.</p></blockquote>
<p>.. and translated:</p>
<blockquote><p>Good morning, this morning to check my call list I get the following:</p>
<p>08/24/2012 8:12:02 420 720 001 669 1 MESSAGE SENDING SMS</p>
<p>At this time I have not sent any SMS I can say that numbering corresponds aq? The SMS is charged at 60 cent.</p>
<p>Thank you.</p></blockquote>
<p>There was even a result from Google Play store, but couldn&#8217;t find in full so here is the screenshot along with the translation:</p>
<p>September 4, 2012 &#8211; &#8230; took a printout of the operator found to send an SMS to number 420720001669, struck on the forums that this number was Avast &#8230;</p>
<p><a href="http://blog.m-sec.net/wp-content/uploads/2012/09/avast_gplay_sms.png"><img class="alignnone size-full wp-image-136" title="avast_gplay_sms" src="http://blog.m-sec.net/wp-content/uploads/2012/09/avast_gplay_sms.png" alt="" width="516" height="121" /></a></p>
<p>To me it&#8217;s pretty clear that it&#8217;s <strong>Avast</strong> fault for this. There was only one message sent from my number, but I haven&#8217;t used their software for more than 3 days so I can&#8217;t say for sure if the message is sent each week for example. I&#8217;ll try to contact them and see what they have to say about this.</p>
<p>However, this is something that it shouldn&#8217;t happen at all.</p>
<p>In case you have noticed this behavior also, please leave a comment here.</p>
<p>&nbsp;</p>
<div id="tweetbutton132" class="tw_button" style=""><a href="http://twitter.com/share?url=https%3A%2F%2Fblog.m-sec.net%2F2012%2Favast-mobile-security-is-sending-sms-without-user-knowledge%2F&amp;via=msecnet&amp;text=avast%20Mobile%20Security%20is%20sending%20SMS%20without%20user%20knowledge&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=https%3A%2F%2Fblog.m-sec.net%2F2012%2Favast-mobile-security-is-sending-sms-without-user-knowledge%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('https://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>https://blog.m-sec.net/2012/avast-mobile-security-is-sending-sms-without-user-knowledge/feed/</wfw:commentRss>
		<slash:comments>13</slash:comments>
		</item>
		<item>
		<title>SIM Toolkit Attack</title>
		<link>https://blog.m-sec.net/2011/sim-toolkit-attack/</link>
		<comments>https://blog.m-sec.net/2011/sim-toolkit-attack/#comments</comments>
		<pubDate>Thu, 17 Nov 2011 18:03:04 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[alecu]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[deepsec]]></category>
		<category><![CDATA[fuzzing]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[recording]]></category>
		<category><![CDATA[sim toolkit]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[video]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=86</guid>
		<description><![CDATA[Hi all, I must say it was a real pleasure to attend the DeepSec 2011 edition. I&#8217;ve met a lot of interesting people and all the talks were great. Since it was my first time I held an international talk with such large audience, I was a little bit excited, but no matter what, I [...]]]></description>
			<content:encoded><![CDATA[<p>Hi all,</p>
<p>I must say it was a real pleasure to attend the <a title="DeepSec website" href="http://deepsec.net/" target="_blank">DeepSec</a> 2011 edition. I&#8217;ve met a lot of interesting people and all the talks were great. Since it was my first time I held an international talk with such large audience, I was a little bit excited, but no matter what, I still consider I did a pretty good job. By now I only got positive feedback <img src='https://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>To answer some of the frequently asked questions:</p>
<p>1. The attack I showed has nothing to do with knowing the security keys as the response to the command is being sent even if there&#8217;s an error</p>
<p>2. The live demo worked &#8211; too bad I didn&#8217;t have a webcam to show you the target phone</p>
<p>3. There was no planning on who should volunteer for the live demo</p>
<p>4. The number you&#8217;ve seen during the demo is not the real number (only the first 3 digits were) and also wasn&#8217;t charged with 5 EUR &#8211; all it was just for the fun of it <img src='https://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>5. The quickest way to protect is to change your phone to one that asks for your permission before allowing the SIM card to do something, or switch to another operator that doesn&#8217;t provide SIM cards with Toolkit Application on them &#8211; in Austria it&#8217;s at least one, as well in Romania <img src='https://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>6. Pay attention to dual-SIM phones: some of them are not showing you the extra-menu belonging to the SIM application, so don&#8217;t get comfortable thinking that you&#8217;re protected</p>
<p>7. I&#8217;m not a hacker / cracker how the media likes to call the security specialists most of the times. My purpose was to make you aware of the danger of just using something like SMS</p>
<p>I was happy that right after the talk I&#8217;ve been contacted by <a title="Research In Motion" href="http://www.rim.com" target="_blank">RIM</a> in order to send them the details to fix this. It&#8217;s good to see that someone pays attention to these details. As long as they agree, I&#8217;ll keep you up to date with how the things are going.</p>
<p>Thank you Lynx, MiKa, Manuela for this opportunity! I&#8217;m pretty sure I&#8217;ll see you next year also <img src='https://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' />  I also hope that next year there will be more people from Romania in the audience.</p>
<p>Below it&#8217;s a recording of my talk SMS fuzzing, SIM Toolkit Attack &#8211; I hope you&#8217;ll ignore my excitement <img src='https://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /><br />
<iframe src="http://player.vimeo.com/video/32481186" frameborder="0" width="550" height="470"></iframe></p>
<p>The slides from the talk can be found here (<a title="SIM Toolkit Attack slides" href="http://prezi.com/lmmptb0qldfb/sim-toolkit-attack/" target="_blank">click me</a>).</p>
<p>I wait for your feedback!</p>
<div id="tweetbutton86" class="tw_button" style=""><a href="http://twitter.com/share?url=https%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack%2F&amp;via=msecnet&amp;text=SIM%20Toolkit%20Attack&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=https%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('https://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>https://blog.m-sec.net/2011/sim-toolkit-attack/feed/</wfw:commentRss>
		<slash:comments>18</slash:comments>
		</item>
		<item>
		<title>The new aphonous</title>
		<link>https://blog.m-sec.net/2011/the-new-aphonous/</link>
		<comments>https://blog.m-sec.net/2011/the-new-aphonous/#comments</comments>
		<pubDate>Sun, 16 Oct 2011 03:28:41 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[Phone]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=74</guid>
		<description><![CDATA[Personally I don&#8217;t like iPhone &#8211; paying a lot of money for something that&#8217;s supposed to be a phone &#8211; and watching the presentation of the new model has underlined my believes. I agree, it&#8217;s a phone with powerful hardware, but that&#8217;s it. I have a quote in my mind for this (I don&#8217;t know [...]]]></description>
			<content:encoded><![CDATA[<p>Personally I don&#8217;t like iPhone &#8211; paying a lot of money for something that&#8217;s supposed to be a phone &#8211; and watching the presentation of the new model has underlined my believes. I agree, it&#8217;s a phone with powerful hardware, but that&#8217;s it. I have a quote in my mind for this (I don&#8217;t know where I heard it):  &#8220;a computer is as powerful as the software it uses&#8221;. You could have the latest hardware equipped computer, if you install DOS on it then it&#8217;s worthless. The same thing goes with the &#8220;smart&#8221;-phones. So what iPhone has a function to control it by voice, called Siri &#8211; it&#8217;s just software! If tomorrow someone releases the same software for other types of phones, would it mean that I could possibly have an iPhone? <img src='https://blog.m-sec.net/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>With no further comments, the new GlaDOSiri is here:<br />
<iframe src="http://www.youtube.com/embed/aTg00wIijNY?hd=1" frameborder="0" width="560" height="315"></iframe></p>
<div id="tweetbutton74" class="tw_button" style=""><a href="http://twitter.com/share?url=https%3A%2F%2Fblog.m-sec.net%2F2011%2Fthe-new-aphonous%2F&amp;via=msecnet&amp;text=The%20new%20aphonous&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=https%3A%2F%2Fblog.m-sec.net%2F2011%2Fthe-new-aphonous%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('https://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>https://blog.m-sec.net/2011/the-new-aphonous/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIM Toolkit Attack on DeepSec 2011</title>
		<link>https://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/</link>
		<comments>https://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/#comments</comments>
		<pubDate>Thu, 08 Sep 2011 15:20:02 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[deepsec]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[STK]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=69</guid>
		<description><![CDATA[This is going to be my talk on DeepSec 2011. You may read more about it in an article on the DeepSec blog. There are a lot of good talks so my suggestion for you is to register for the conference and attend the talks. Tweet]]></description>
			<content:encoded><![CDATA[<p>This is going to be my talk on <a title="DeepSec 2011" href="https://deepsec.net/" target="_blank">DeepSec </a>2011. You may read more about it in an article on the <a title="DeepSec  2011SMS attack" href="http://blog.deepsec.net/?p=435" target="_blank">DeepSec blog.</a> There are a lot of good talks so my suggestion for you is to <a title="DeepSec 2011 registration" href="https://deepsec.net/register.html" target="_blank">register for the conference</a> and attend the talks.</p>
<div id="tweetbutton69" class="tw_button" style=""><a href="http://twitter.com/share?url=https%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack-on-deepsec-2011%2F&amp;via=msecnet&amp;text=SIM%20Toolkit%20Attack%20on%20DeepSec%202011&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=https%3A%2F%2Fblog.m-sec.net%2F2011%2Fsim-toolkit-attack-on-deepsec-2011%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('https://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>https://blog.m-sec.net/2011/sim-toolkit-attack-on-deepsec-2011/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>GPRS is broken</title>
		<link>https://blog.m-sec.net/2011/gprs-is-broken/</link>
		<comments>https://blog.m-sec.net/2011/gprs-is-broken/#comments</comments>
		<pubDate>Fri, 12 Aug 2011 19:14:25 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[edge]]></category>
		<category><![CDATA[gprs]]></category>
		<category><![CDATA[gsm security]]></category>
		<category><![CDATA[intercept]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=43</guid>
		<description><![CDATA[Researcher Karsten Nohl has recently presented at Chaos Communication Camp 2011 a way of intercepting GPRS traffic. What that means is that now you can read the traffic that your neighbor is doing on his phone, at least if he uses GPRS/EDGE. &#160; &#160; &#160; &#160; &#160; Along with Luca Melette, Karsten was able to [...]]]></description>
			<content:encoded><![CDATA[<p>Researcher Karsten Nohl has recently presented at Chaos Communication Camp 2011 a way of intercepting GPRS traffic. What that means is that now you can read the traffic that your neighbor is doing on his phone, at least if he uses GPRS/EDGE.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>

<a href="https://blog.m-sec.net/wp-content/gallery/gsm/karsten_nohl_gprs.png" title="Karsten Nohl presenting GPRS intercept" class="shutterset_singlepic20" >
	<img class="ngg-singlepic" src="https://blog.m-sec.net/wp-content/gallery/cache/20__320x240_karsten_nohl_gprs.png" alt="Karsten Nohl - Gprs Intercept" title="Karsten Nohl - Gprs Intercept" />
</a>

<p>Along with Luca Melette, Karsten was able to decrypt the GPRS data by using a modified phone, loaded with OsmocomBB baseband software. What&#8217;s interesting is that, during the research, they discovered some operators that do not use encryption at all because it would be easier to block content like VoIP, Skype and so on.<br />
If you want to read the slides, here they are: <a title="GPRS intercept" href="http://events.ccc.de/camp/2011/Fahrplan/attachments/1868_110810.SRLabs-Camp-GRPS_Intercept.pdf" target="_blank">click</a><br />
My advice: set you phone to use 3G as a preferred network, not only because of the GPRS issue, but due to other GSM security issues.</p>
<p>UPDATE: See the videos here: <a title="Chaos Computer Camp 2011 video" href="http://wipkip.nikhef.nl/events/CCC/camp2011/video/" target="_blank">CCC 2011 videos</a></p>
<div id="tweetbutton43" class="tw_button" style=""><a href="http://twitter.com/share?url=https%3A%2F%2Fblog.m-sec.net%2F2011%2Fgprs-is-broken%2F&amp;via=msecnet&amp;text=GPRS%20is%20broken&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=https%3A%2F%2Fblog.m-sec.net%2F2011%2Fgprs-is-broken%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('https://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>https://blog.m-sec.net/2011/gprs-is-broken/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Understanding SIM communication</title>
		<link>https://blog.m-sec.net/2011/understanding-sim-communication/</link>
		<comments>https://blog.m-sec.net/2011/understanding-sim-communication/#comments</comments>
		<pubDate>Fri, 22 Jul 2011 09:15:29 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Phone]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=12</guid>
		<description><![CDATA[Have you ever wondered what is happening when you phone starts, how the phone interacts with your SIM card? Well, now you can easily see the messages that are exchanged between your phone and the SIM by using Android emulator. First of all, download the Android SDK for Linux. Extract the archive then go to [...]]]></description>
			<content:encoded><![CDATA[<p>Have you ever wondered what is happening when you phone starts, how the phone interacts with your SIM card? Well, now you can easily see the messages that are exchanged between your phone and the SIM by using Android emulator.</p>
<p>First of all, <a title="Android SDK" href="http://developer.android.com/sdk/index.html" target="_blank">download the Android SDK</a> for Linux. Extract the archive then go to the &#8220;tools&#8221; directory on the newly extracted directory. Launch the SDK Manager by entering &#8220;./android&#8221;. Here you&#8217;ll have to choose Available packages and from the right panel open Android repository. Select the SDK platform that you want and Install it. Now we should create two virtual phones based on this SDK. Go to Virtual Devices, choose New. On the new window set a Name for your device, a Target (the SDK package installed previously) and a size for your virtual SD card. Repeat the steps to create a second device.</p>
<p>Have a look:</p>
<p><iframe src="http://player.vimeo.com/video/26774970?title=0&amp;byline=0&amp;portrait=0" frameborder="0" width="400" height="300"></iframe></p>
<p>Why two phones? Because we need to place some calls in order to better understand AT messages exchanged between phone and SIM.</p>
<p>Now you should start the first phone and then open another terminal window.  You&#8217;ll have to go where Android SDK was extracted, &#8220;platform-tools&#8221; folder and type &#8220;./ adb shell&#8221;. This way you&#8217;ll enter into debug mode. In order to see the AT messages type &#8220;logcat -b radio&#8221;. You can now open the second phone. In order to place calls between the phones, each one has a unique number &#8211; found in the title bar of the phone window.</p>
<p>To better visualize these things, a video is necessary:</p>
<p><iframe src="http://player.vimeo.com/video/26775898?title=0&amp;byline=0&amp;portrait=0" frameborder="0" width="400" height="300"></iframe></p>
<p>Of course you can try the AT commands that you see by connecting a USB GSM modem and minicom (or HyperTerminal in Windows). Enjoy!</p>
<div id="tweetbutton12" class="tw_button" style=""><a href="http://twitter.com/share?url=https%3A%2F%2Fblog.m-sec.net%2F2011%2Funderstanding-sim-communication%2F&amp;via=msecnet&amp;text=Understanding%20SIM%20communication&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=https%3A%2F%2Fblog.m-sec.net%2F2011%2Funderstanding-sim-communication%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('https://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>https://blog.m-sec.net/2011/understanding-sim-communication/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
