SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Department of Computer Science
WiFi-Based	IMSI	Catcher
Piers	O’Hanlon
Ravishankar Borgaonkar
Shakacon,	Honolulu,	12-13th July	2017
Overview
• What	is	an	IMSI?
• Conventional	IMSI	Catchers
• WiFi-based	IMSI	Catcher
• WiFi Network	Authentication	💣
• WiFi Calling	Authentication	💣
• Operator/Vendor/OS	Mitigations
• User	Mitigations
• Demo
What	is	an	IMSI?
• International	Mobile	Subscriber	Identity
• Globally	unique	identifier
• 15	digit	number	(MCountryCode+MNetCode+MSIdNum)
• e.g.	234123456789012
• Allows	for	[mutual]	authentication	of	a	device	to	the	network
• GSM/2G:	Only	using	SIM’s	secret	authentication	Key	(Ki)	
• 3/4G:	Using	Ki and	a	shared	Sequence	Number	(SQN)	
• Stored	in	two	places:
• In	the	‘SIM	Card’	(UICC/USIM)
• IMSI	is	accessible	in	a	read	only	section	of	the	U/SIM
• Secret	key	(Ki)	and	SQN	are	not	directly	readable
• At	the	Operator
• IMSI	indexes	Ki and	SQN	in	Operator’s	Database	(HSS/AuC)
• An	identifier	that	provides	for	tracking	of	devices
• There	are	others	like	WiFi/Bluetooth/NFC	Hardware	address	(e.g.	
MAC),	IMEI,	MSISDN	(Phone	number),	etc.
Conventional	IMSI	Catchers
• Typical	features
• Tracking:	IMSI/IMEI,	Location
• Interception:	Call/SMS/Data
• Operates	on	licensed	Mobile	Bands:	GSM/3G/4G
• Acts	as	a	fake	base	station	to	lure	nearby	mobile	devices
• Passive	- mainly	for	tracking	 (interception	when	no/weak	
ciphering)
• Active	– interception	and	tracking	
• Cost
• Commercial	solutions	expensive	(some	available	on	AliBaba..)
• But	now	possible	with	Laptop+SDR board
• Been	around	since	the	early	1990s
• Patented	in	Europe	in	1993
Techniques	in	Conventional	IMSI	
Catchers	
• Exploits	protocol	flaws	(no	
mutual	authentication..)
• Tracking	&	Interception
• Easily	available	to	buy	online
• Use	of	fake	base	station
• Exploits	architecture	issues	
(Base	station	>	UE..)
• Tracking	&	difficult	to	intercept	
traffic	w.r.t 2G	
• Commercial	products	usually	
downgrades
• Use	of	legitimate	base	station	
also	possible	
2G 3G/4G
http://www.epicos.com/EPCompanyProfileWeb/Content/Ability/EM_GSM.JPG http://edge.alluremedia.com.au/m/g/2016/05/nokia_ultra_compact_network.jpg
Protection	against	IMSI	Catchers
• IMSI-Catcher	detection
• App	based	(on	rooted	Android	devices)
• E.g.	Snoopsnitch,	Darshak
• Survey	based
• E.g.	SeaGlass Project	(U	Washington)
• No	protection	for	commercial	non-rooted	mobile	
devices
• Special	phones
• e.g.	Blackphone	
• Turn	off	cellular	connection	or	use	WiFi platform	for	
secure	calls/data??
WiFi-Based	IMSI	Catcher
• Features
• Tracking:	IMSI,	Location
• No	interception	(yet)
• Operates	in	unlicensed	(ISM)	Bands:	WiFi
• Range	- few	hundred	meters	– can	be	extended…
• Fake	Access	Points
• Redirect/Spoofs	mobile	packet	data	gateway
• Exploits	protocol	&	configuration	weaknesses
• Based	on	two	separate	techniques	[3GPP	TS33.234]
• WiFi Network	Authentication	(‘WLAN	direct	IP	access’)	
• WiFi-Calling	Authentication	(‘WLAN	3GPP	IP	access’)
• Cost
• Low:	Virtually	any	WiFi capable	computer
Mobile	network	Architecture
WiFi Network	attachment
• Unencrypted	WiFi access	points
• Captive	Portal	approaches
• Wireless	Internet	Service	Provider	roaming(WiSPr)	etc
• Normal	Encrypted	WiFi access	points
• Pre-shared	password/credentials
• ‘Auto	Connect’	Encrypted	WiFi APs	(802.1X)
• WiFi key	is	negotiated	without	user	intervention
• Based	on	credentials	in	the	USIM/UICC	(‘SIM	Card’)
• Controlled	by	operator	provided	configuration
• Automatic/pre-installed
• Manual	options
Automatic	configuration
• Some	Android	and	Windows	phones	automatically	
connect	based	on	SIM
• iOS	configures	phone	based	on	inserted	SIM
• Activates	an	operator	specific	.mobileconfig file
• Configures	a	range	of	operator	specific	options
• Including	a	list	of	802.1X	supported	WiFi SSIDs
• Our	analysis	of	iOS9	profiles	showed
• More	than	60	profiles	(44	countries)	for	802.1X	WiFi
• Containing	66	unique	SSIDS	plus	other	config
• =>	Phones	continuously	trying	to	silently	
automatically	authenticate
Manual	Configuration
• Some	Android	devices	require	initial	manual	
config
• After	which	it	automatically	connects
• Instructions	on	operator	websites
• Follow	simple	steps	to	set	up
• Android	provides	various	Carrier	controlled	
mechanisms
• Lollipop	(v5.1	MR1):	UICC	Carrier	Privileges
• Marshmallow	(v6.0):	Carrier	Configuration
• “Privileged	applications	to	provide	carrier-specific	
configuration	to	the	platform”
Automatic	WiFi Authentication
• Port	Based	Network	Access	Control	[IEEE	802.1X]
• Uses	Extensible	Authentication	Protocol	(EAP)	[RFC3748]	
over	LAN	(EAPOL)	over	WiFi
• Based	upon	two	EAP	Methods
• EAP-SIM	[RFC	4186]
• GSM	based	security	- Currently	most	widely	used
• EAP-AKA	[RFC	4187]
• 3G	based	security	- Being	deployed
• Support	in	Android,	iOS,	Windows	Mobile,	and	
Blackberry	devices
• We’ve	reported	the	issue	to	them	all	and	to	operators	&	
GSMA
• No	privacy	bounties	 😕
• Deployed	in	many	countries	– adoption	growing
EAP-SIM/AKA	Identities
• Three	basic	identity	types	for	authentication	
• Permanent-identity	(IMSI)
• Typically	used	initially	after	which	temporary	ids	are	used
• Pseudonym	identity
• A	pseudonym	for	the	IMSI	has	limited	lifetime
• Fast	reauthentication-identity
• Lower	overhead	re-attachment	after	initial	exchange
• Behaviour	affected	by	peer	policy
• “Liberal”	peer	- Current	default
• Responds	to	any	requests	for	permanent	identity
• “Conservative”	peer	– Future	deployment	option
• Only	respond	to	requests	for	permanent	identity	when	no	
Pseudonym	identity	available
EAP-SIM/AKA	transport	
• Basic	EAP	protocol	is	not	encrypted
• Currently	EAP-SIM/AKA	in	EAPOL	is	unencrypted
• Thus	IMSI	is	visible	(to	a	passive	attacker)	when	
permanent	identity	used	for	full	authentication	 😱
• Also	open	to	active	attacks	by	requesting	full	auth 😱
• WiFi Access	keys	not	compromised
• All	content	still	protected
• There	are	encrypted	tunnel	EAP	methods
• EAP-TTLSv0,	EAP-TLS…
• But	support	required	in	both	mobile	OS	and	operator
EAP-SIM/AKA	transport	
• Basic	EAP	protocol	is	not	encrypted
• Currently	EAP-SIM/AKA	in	EAPOL	is	unencrypted
• Thus	IMSI	is	visible	(to	a	passive	attacker)	when	
permanent	identity	used	for	full	authentication	 😱
• Also	open	to	active	attacks	by	requesting	full	auth 😱
• Problem	amplified	due	to	pre-configured	profiles	
• Mobile	devices	are	constantly	checking	for	pre-
configured	SSIDs	and	attempting	authentication
• WiFi Access	keys	not	compromised
• All	content	still	protected
WiFi-Calling	Connection
• Phone	connects	to	Edge	Packet	Data	Gateway	(EPDG)	
over	WiFi
• Voice	calls	over	WiFi
• Phone	connects	on	low/no	signal
• Also	connects	in	Airplane	mode	+	WiFi …
• Connection	to	EPDG	uses	IPsec
• Authenticates	using	Internet	Key	Exchange	Protocol	(IKEv2)
• Supported	on	iOS,	Android,	and	Windows	devices
• WiFi-Calling	available	in	a	number	of	countries
• The	issue	also	been	reported	to	OS	makers	and	Operators
IPsec	brief	overview
• Internet	Protocol	Security
• Confidentiality,	data	integrity,	access	control,	and	data	source	
authentication
• Recovery	from	transmission	errors:	packet	loss,	packet	replay,	and	
packet	forgery
• Authentication
• Authentication	Header	(AH)	- RFC	4302
• Confidentiality
• Encapsulating	Security	Payload	(ESP)	- RFC	4303
• Key	management
• Internet	Key	Exchange	v2	(IKEv2)	- RFC7296
• Two	modes
• Tunnel	- used	for	connection	to	Gateway	(EPDG)
• Transport
Internet	Key	Exchange	(IKEv2)
• Initiates	connection	in	two	phases
• IKE_SA_INIT
• Negotiate	cryptographic	algorithms,	exchange	nonces,	and	do	
a	Diffie-Hellman	exchange	
• IKE_AUTH
• Authenticate	the	previous	messages,	exchange	identities	(e.g.	
IMSI),	and	certificates,	and	establish	the	child	Security	
Association(s)	(SA)
• IKE_AUTH	uses	EAP-AKA
• IMSI	exchange	not	protected	by	a	certificate
• Open	to	Man-In-the-Middle	attacks	on	identity	(IMSI)	 😱
• IPsec	ESP	keys	are	not	compromised
• Call	content	still	safe
Operator/Vendor	Mitigations
• Deprecate	EAP-SIM	in	favour	of	EAP-AKA
• EAP-SIM	is	weaker	as	it	only	uses	GSM	triplets
• Deploy	EAP-AKA/SIM	with	conservative	peer	pseudonym
• Deploy	Certificate	based	approach
• Deploy	certificates	on	suitable	AAA	infrastructure
• Deploy	certificate	protected	tunnelled	EAP-AKA	for	WLAN	access
• E.g.	EAP-TTLS+EAP-AKA	on	802.1X
• Deploy	certificate	protected	IPsec/IKEv2	to	EPDG
• E.g.	EAP-TTLS+EAP-AKA	for	IKE_AUTH,	or	multiple	IKEv2	auth exchange
• (Re)investigate	other	potential	solutions
• IMSI	encryption	– 5G-ENSURE	project	has	proposed	an	‘enabler’
• E.g.	3GPPP	TD	S3-030081	– ‘Certificate-Based	Protection	of	IMSI	
for	EAP-SIM/AKA’
• Standards	bodies	should	re-evaluate	approaches
Mobile	OS	Mitigations
• Support	conservative	peer	for	EAP-AKA/SIM	
with	pseudonym	support
• Emerging	in	some	Oses (e.g.	iOS10)
• iOS10	has	conservative	peer	pseudonym	support	–
due	to	us	 😉
• Certificate	based	approach
• Support	for	EAP-TTLv0	+	EAP-AKA	in	IKEv2	&	EAPOL
• Other	approaches?
• Allow	for	more	user	choice	with	automatic	WiFi
network	access
• Preferably	allow	for	editing	of	all	stored	associations
User	Mitigation
• WiFi Network	Access	Control
• iOS
• Turn	off	‘Auto-Join’	toggle	for	Auto-WiFi networks
• Only	possible	when	network	in	range
• iOS10	may	provide	better	protection	(once	operators	deploy	
support)
• It	has	conservative	peer	pseudonym	support	
• Android
• ‘Forget’	Auto-WiFi profiles
• Depending	on	version	only	possible	when	network	in	range
• WiFi-Calling
• Android/iOS:	Selectively	disable	WiFi-Calling
• Switch	off	WiFi in	untrusted	environments
Summary
• Large	scale	IMSI	exposure	issues
• Poor	privacy	mandates	in	standards
• Widespread	device	pre-configuration	with	no	opt	out
• Need	better	privacy	testing	procedures
• Most	of	the	world’s	smartphones	affected
• Two	techniques	rely	upon	installed	operator	
automatic	configuration	for	these	popular	services
• We’ve	been	working	with	Operators/Vendors/	
OS	companies	to	fix	the	issue
• But	it’s	a	complex	issue
• EAP-AKA	is	now	starting	to	replace	EAP-SIM
Conclusions	&	Future	Work
• Investigating	other	uses	of	EAP-SIM/AKA
• Exploring	use	of	USIM	credentials	in	other	
WiFi based	protocols
• Continuing	work	in	5GENSURE.EU Project
Department of Computer Science
24
5G	ENSURE	receives	funding	from	the	EU	Framework	Programme for	
Research	and	Innovation	H2020	under	grant	agreement	No	671562	|	
Duration	November	2015	– October	2017
The	5G	Infrastructure	Public	Private	
Partnership	(SG	PPP)
5G	Enablers	for	network	and	system	security	and	resilience	
@5GEnsure
5G-ENSURE:	http://www.5gensure.eu
contact@5gensure.eu
Questions…

Weitere ähnliche Inhalte

Was ist angesagt?

iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection SystemLuca Bongiorni
 
Attacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsAttacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsPositiveTechnologies
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guideMorg
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTEmanish_sapra
 
Basic GSM Call Flows
Basic GSM Call FlowsBasic GSM Call Flows
Basic GSM Call Flowsemyl97
 
SS7: Locate. Track. Manipulate.
SS7: Locate. Track. Manipulate.SS7: Locate. Track. Manipulate.
SS7: Locate. Track. Manipulate.3G4G
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBVikas Shokeen
 
How to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetHow to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetPositive Hack Days
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkP1Security
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core ElementsKent Loh
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
VoWiFi testing challenges
VoWiFi testing challengesVoWiFi testing challenges
VoWiFi testing challengesDave Crossley
 
Radius vs. Tacacs+
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+Netwax Lab
 

Was ist angesagt? (20)

Attach flow & srb
Attach flow & srbAttach flow & srb
Attach flow & srb
 
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
Attacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsAttacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOs
 
Best practices-lte-call-flow-guide
Best practices-lte-call-flow-guideBest practices-lte-call-flow-guide
Best practices-lte-call-flow-guide
 
IMS Signaling Details
IMS Signaling DetailsIMS Signaling Details
IMS Signaling Details
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTE
 
Basic GSM Call Flows
Basic GSM Call FlowsBasic GSM Call Flows
Basic GSM Call Flows
 
SS7: Locate. Track. Manipulate.
SS7: Locate. Track. Manipulate.SS7: Locate. Track. Manipulate.
SS7: Locate. Track. Manipulate.
 
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFBSRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
SRVCC (Single Radio Voice Call Continuity) in VoLTE & Comparison with CSFB
 
How to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the PlanetHow to Intercept a Conversation Held on the Other Side of the Planet
How to Intercept a Conversation Held on the Other Side of the Planet
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
Worldwide attacks on SS7 network
Worldwide attacks on SS7 networkWorldwide attacks on SS7 network
Worldwide attacks on SS7 network
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
VoWiFi testing challenges
VoWiFi testing challengesVoWiFi testing challenges
VoWiFi testing challenges
 
Radius vs. Tacacs+
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+
 

Ähnlich wie WiFi-Based IMSI Catcher

WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf
D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdfD2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf
D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdff2po1
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.NextMark Diodati
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Blueinfy Solutions
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMike Brannon
 
2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_roomNCC Group
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkMartin Vigo
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iPrecisely
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursDilum Bandara
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Priyanka Aash
 
Outsmarting the Smart City
Outsmarting the Smart CityOutsmarting the Smart City
Outsmarting the Smart CityPriyanka Aash
 

Ähnlich wie WiFi-Based IMSI Catcher (20)

OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf
D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdfD2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf
D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room2012 12-04 --ncc_group_-_mobile_threat_war_room
2012 12-04 --ncc_group_-_mobile_threat_war_room
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdk
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
Outsmarting the Smart City: DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUN...
 
Outsmarting the Smart City
Outsmarting the Smart CityOutsmarting the Smart City
Outsmarting the Smart City
 

Mehr von Shakacon

Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assemblyShakacon
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can youShakacon
 
Cloud forensics putting the bits back together
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back togetherShakacon
 
Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEShakacon
 
Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Shakacon
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerShakacon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeShakacon
 
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server:  A Dive into Attacker InfrastructureHoney, I Stole Your C2 Server:  A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker InfrastructureShakacon
 
Dock ir incident response in a containerized, immutable, continually deploy...
Dock ir   incident response in a containerized, immutable, continually deploy...Dock ir   incident response in a containerized, immutable, continually deploy...
Dock ir incident response in a containerized, immutable, continually deploy...Shakacon
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelShakacon
 
Silent Protest: A Wearable Protest Network
Silent Protest:  A Wearable Protest NetworkSilent Protest:  A Wearable Protest Network
Silent Protest: A Wearable Protest NetworkShakacon
 
Sad Panda Analysts: Devolving Malware
Sad Panda Analysts:  Devolving MalwareSad Panda Analysts:  Devolving Malware
Sad Panda Analysts: Devolving MalwareShakacon
 
reductio [ad absurdum]
reductio [ad absurdum]reductio [ad absurdum]
reductio [ad absurdum]Shakacon
 
XFLTReat: a new dimension in tunnelling
XFLTReat:  a new dimension in tunnellingXFLTReat:  a new dimension in tunnelling
XFLTReat: a new dimension in tunnellingShakacon
 
Windows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresWindows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresShakacon
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...Shakacon
 
The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamShakacon
 
Swift Reversing by Ryan Stortz
Swift Reversing by Ryan StortzSwift Reversing by Ryan Stortz
Swift Reversing by Ryan StortzShakacon
 

Mehr von Shakacon (20)

Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assembly
 
Macdoored
MacdooredMacdoored
Macdoored
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can you
 
Cloud forensics putting the bits back together
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back together
 
Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCE
 
Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
 
Shamoon
ShamoonShamoon
Shamoon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts Bytecode
 
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server:  A Dive into Attacker InfrastructureHoney, I Stole Your C2 Server:  A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
 
Dock ir incident response in a containerized, immutable, continually deploy...
Dock ir   incident response in a containerized, immutable, continually deploy...Dock ir   incident response in a containerized, immutable, continually deploy...
Dock ir incident response in a containerized, immutable, continually deploy...
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
 
Silent Protest: A Wearable Protest Network
Silent Protest:  A Wearable Protest NetworkSilent Protest:  A Wearable Protest Network
Silent Protest: A Wearable Protest Network
 
Sad Panda Analysts: Devolving Malware
Sad Panda Analysts:  Devolving MalwareSad Panda Analysts:  Devolving Malware
Sad Panda Analysts: Devolving Malware
 
reductio [ad absurdum]
reductio [ad absurdum]reductio [ad absurdum]
reductio [ad absurdum]
 
XFLTReat: a new dimension in tunnelling
XFLTReat:  a new dimension in tunnellingXFLTReat:  a new dimension in tunnelling
XFLTReat: a new dimension in tunnelling
 
Windows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresWindows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul Rascagneres
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
 
The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant Ollam
 
Swift Reversing by Ryan Stortz
Swift Reversing by Ryan StortzSwift Reversing by Ryan Stortz
Swift Reversing by Ryan Stortz
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

WiFi-Based IMSI Catcher