SlideShare une entreprise Scribd logo
1  sur  24
Catching IMSI
Catchers
Geoffrey Vaughan
@mrvaughan
Security Engineer
What you will learn today
1. What IMSI Catchers do and how they work
2. Detection Strategies
3. Hear an exciting tale of adventures in Vegas
4. Learn how to avoid being caught up in an IMSI Catcher
Whoami
• Geoffrey Vaughan @MrVaughan
• Security Engineer @SecurityInnovation
• Appsec pentesting/advisory at all areas of SDLC
• Former High School/Prison/University Teacher
• Occasionally I’m let out of my basement
• Travelled from Toronto to be here with you today
IMSI Catchers / Stingrays
IMSI Catcher:
Can be any rogue cellular device designed to capture cell
phone data or traffic
Often used by police/governments
Stingray - Most popular brand of IMSI Catcher sold to
police/governments made by Harris Corp
IMSI:
International mobile subscriber identity
Your unique cell phone ID.
Privacy constraints:
Strict NDA’s often prevent users from disclosing the device
capabilities or naming the device publically (even in case of
warrants)
IMSI Catcher Specs
• Can intercept 2G, 3G, 4G communication simultaneously as
well as CMDA/GSM networks
• Devices can launch attacks requesting devices connect over
weaker channels (2G)
• Operates in either passive or active mode
• Passive mode – Simply captures all available traffic in the area
• Active mode – Acts as a full duplex proxy forcing all traffic
through the device then onward to a normal cellular tower
How they are used
• Confirming presence of a device in a target’s home prior to a search thereof
• Identifying an individual responsible for sending harassing text messages
• Locating a stolen mobile device as a precursor to searching homes in the vicinity
• Locating specific individuals by driving around a city until a known IMSI is found
• Mounted on airplanes by the United States Marshall Service to sweep entire
cities for a specific mobile device
• To monitor all devices within range of a prison to determine whether prisoners are
using cell phones
• Reportedly at political protests to identify devices of individuals attending
• To monitor activity in the offices of an independent Irish police oversight body
Source: https://citizenlab.org/wp-content/uploads/2016/09/20160818-Report-
Gone_Opaque.pdf
Where they are used
• 1400+ cases confirmed use in Baltimore mapping show
disproportionate use in predominately black neighborhoods'
• http://www.citylab.com/crime/2016/10/racial-disparities-in-police-
stingray-surveillance-mapped/502715/?utm_source=feed
• Thousands of times in Florida since 2007 for crimes as small as
911 hang ups
• http://arstechnica.com/tech-policy/2016/08/Baltimore-police-accused-
of-illegal-mobile-spectrum-use-with-stingrays/
Manual Leak
The Intercept acquired a device manual and published it:
https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail-
how-police-can-spy-on-phones/
Where to buy
• Only sold to governments, police, and military
• Alibaba: Good luck (mostly 2G only), Import laws, buyer
assumes risk
• But for ~1400USD you can build your own:
http://arstechnica.com/security/2015/10/low-cost-imsi-catcher-for-
4glte-networks-track-phones-precise-locations/
• Or hide one in a printer and make it call to say I love you
https://julianoliver.com/output/stealth-cell-tower
How to find and detect an IMSI
Catcher
Current Detection Methods are entirely anomaly based
1. War walk your neighborhood and make note of all Cell Tower
ID’s you find and their locations
2. Repeat this until you are sure you have all known devices
cataloged
3. Constantly monitor your area to see if any new devices are
added
4. Go find the new device
Tools to help you out
OpenCellID.org – Database of mostly user reported cellular tower
devices, their location, and their identifiers
AISMICD – Android IMSI Catcher Detector app. Tool used to collect
cell data. It also reports/syncs with OpenCellID (sometimes).
• https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
Rooted Android Device – Required for AISMICD - Means you need a
dedicated device for detection
Eric Escobar – Detecting Rogue Cell Towers, built a 50$ device to
better triangulate devices (Presented this year)
• https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20pr
esentations/DEFCON-24-Eric-Escobar-Rogue-Cell-Towers-UPDATED.pdf
Story Time
How hostile is it for your devices at
Def Con?
• Def Con = “Most hostile network on earth” ????
• Sure don’t use the hotel Wi Fi but how bad is it for your cell
phones?
• Personal experiment to see if I could find any IMSI Catchers
Setup
• AIMSICD App
• Burner Android Phone
(rooted)
• Next time: Pre-install
opencellid.org data
War Driving the Strip in style
Don’t Freak out!
Pre Def Con War Walk Post Def Con Data
Lots of false positives
• Devices on multiple floors?
• Multiple redundant devices in same location
• Potential issues with GPS accuracy
Still Unknown Devices
Red dots represent devices that I did not see in my preliminary
walk and were not already known to opencellid.org
Caesar’s
• 3 Nights in Caesar’s before
Def Con
• Lots of towers picked up
• Suggest a sort of ‘drive by
attack’
• Also observed a lot of LTE to
GSM downgrade attacks, my
device was hopping networks
quite frequently
Caesar’s
• At least 4 of these devices
were previously not known to
opencellid.org
• There were a couple others
that had only been seen once
before
Defense
• Depends on your personal threat model
• Don’t use your device
• Wi Fi calling with vpn?
• Signal / OpenWhisper app for calling/SMS, although you would
still be tracked
• If all Wireless Carriers published the tower id’s you could at
least know if an id did not match.
• Device spoofing would still be possible
• Pressure Wireless Carriers to implement mutual authentication
between devices
Conclusions
• The devices are very hard to detect, this is part of what makes
them so dangerous
• You rarely know when you are connected to these devices
All data collected is available on my Github Page
https://github.com/MrVaughan/Defcon2016GSMData
Shameless Plug
• CMD+CTRL CTF Saturday
Night
• Accessible web app CTF for
beginners and pros a like
• Lots of challenges to keep
you busy
• Prizes
Thank you
Geoffrey Vaughan
@mrvaughan
@SecurityInnovation

Contenu connexe

Tendances

Tendances (9)

Device Hacking
Device HackingDevice Hacking
Device Hacking
 
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
 
Hacking final
Hacking finalHacking final
Hacking final
 
Article Writing
Article WritingArticle Writing
Article Writing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Mk
MkMk
Mk
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 

En vedette

Openbts animal farm david a burgess germany
Openbts animal farm david a burgess germanyOpenbts animal farm david a burgess germany
Openbts animal farm david a burgess germany
Daud Suleiman
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
EC-Council
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
EC-Council
 

En vedette (20)

iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 
Imsi catcher
Imsi catcherImsi catcher
Imsi catcher
 
Hacking Gsm - Secret Keys Revealed
Hacking Gsm - Secret Keys RevealedHacking Gsm - Secret Keys Revealed
Hacking Gsm - Secret Keys Revealed
 
Project Presentation Midyear
Project Presentation MidyearProject Presentation Midyear
Project Presentation Midyear
 
Openbts animal farm david a burgess germany
Openbts animal farm david a burgess germanyOpenbts animal farm david a burgess germany
Openbts animal farm david a burgess germany
 
Catching IMSI Catchers
Catching IMSI CatchersCatching IMSI Catchers
Catching IMSI Catchers
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
 
OpenBTS AirPutih
OpenBTS AirPutihOpenBTS AirPutih
OpenBTS AirPutih
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
Public Health Surveillance Through Collaboration
Public Health Surveillance Through CollaborationPublic Health Surveillance Through Collaboration
Public Health Surveillance Through Collaboration
 
BioSense 2.0
BioSense 2.0BioSense 2.0
BioSense 2.0
 
Evolve: InSTEDD's Global Early Warning and Response System
Evolve: InSTEDD's Global Early Warning and Response SystemEvolve: InSTEDD's Global Early Warning and Response System
Evolve: InSTEDD's Global Early Warning and Response System
 
Big Data in Public Health
Big Data in Public HealthBig Data in Public Health
Big Data in Public Health
 
BioSense Program Going Forward: HIMSS10 Conference
BioSense Program Going Forward: HIMSS10 ConferenceBioSense Program Going Forward: HIMSS10 Conference
BioSense Program Going Forward: HIMSS10 Conference
 
Social Media for the Meta-Leader
Social Media for the Meta-LeaderSocial Media for the Meta-Leader
Social Media for the Meta-Leader
 
precisionFDA
precisionFDAprecisionFDA
precisionFDA
 
Geohash: Integration of Disparate Geospatial Data
Geohash: Integration of Disparate Geospatial DataGeohash: Integration of Disparate Geospatial Data
Geohash: Integration of Disparate Geospatial Data
 

Similaire à Catching imsi catchers

Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
alxdvs
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 

Similaire à Catching imsi catchers (20)

Personal Data Security in a Digital World
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
 
Most promising cyber forensic solution providers from india forn sec solut...
Most promising cyber forensic solution providers  from india   forn sec solut...Most promising cyber forensic solution providers  from india   forn sec solut...
Most promising cyber forensic solution providers from india forn sec solut...
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Android forensics
Android forensicsAndroid forensics
Android forensics
 
Android phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audioAndroid phone identifiers and eavesdropping audio
Android phone identifiers and eavesdropping audio
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Dernier

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

Catching imsi catchers

  • 2. What you will learn today 1. What IMSI Catchers do and how they work 2. Detection Strategies 3. Hear an exciting tale of adventures in Vegas 4. Learn how to avoid being caught up in an IMSI Catcher
  • 3. Whoami • Geoffrey Vaughan @MrVaughan • Security Engineer @SecurityInnovation • Appsec pentesting/advisory at all areas of SDLC • Former High School/Prison/University Teacher • Occasionally I’m let out of my basement • Travelled from Toronto to be here with you today
  • 4. IMSI Catchers / Stingrays IMSI Catcher: Can be any rogue cellular device designed to capture cell phone data or traffic Often used by police/governments Stingray - Most popular brand of IMSI Catcher sold to police/governments made by Harris Corp IMSI: International mobile subscriber identity Your unique cell phone ID. Privacy constraints: Strict NDA’s often prevent users from disclosing the device capabilities or naming the device publically (even in case of warrants)
  • 5.
  • 6. IMSI Catcher Specs • Can intercept 2G, 3G, 4G communication simultaneously as well as CMDA/GSM networks • Devices can launch attacks requesting devices connect over weaker channels (2G) • Operates in either passive or active mode • Passive mode – Simply captures all available traffic in the area • Active mode – Acts as a full duplex proxy forcing all traffic through the device then onward to a normal cellular tower
  • 7. How they are used • Confirming presence of a device in a target’s home prior to a search thereof • Identifying an individual responsible for sending harassing text messages • Locating a stolen mobile device as a precursor to searching homes in the vicinity • Locating specific individuals by driving around a city until a known IMSI is found • Mounted on airplanes by the United States Marshall Service to sweep entire cities for a specific mobile device • To monitor all devices within range of a prison to determine whether prisoners are using cell phones • Reportedly at political protests to identify devices of individuals attending • To monitor activity in the offices of an independent Irish police oversight body Source: https://citizenlab.org/wp-content/uploads/2016/09/20160818-Report- Gone_Opaque.pdf
  • 8. Where they are used • 1400+ cases confirmed use in Baltimore mapping show disproportionate use in predominately black neighborhoods' • http://www.citylab.com/crime/2016/10/racial-disparities-in-police- stingray-surveillance-mapped/502715/?utm_source=feed • Thousands of times in Florida since 2007 for crimes as small as 911 hang ups • http://arstechnica.com/tech-policy/2016/08/Baltimore-police-accused- of-illegal-mobile-spectrum-use-with-stingrays/
  • 9. Manual Leak The Intercept acquired a device manual and published it: https://theintercept.com/2016/09/12/long-secret-stingray-manuals-detail- how-police-can-spy-on-phones/
  • 10. Where to buy • Only sold to governments, police, and military • Alibaba: Good luck (mostly 2G only), Import laws, buyer assumes risk • But for ~1400USD you can build your own: http://arstechnica.com/security/2015/10/low-cost-imsi-catcher-for- 4glte-networks-track-phones-precise-locations/ • Or hide one in a printer and make it call to say I love you https://julianoliver.com/output/stealth-cell-tower
  • 11. How to find and detect an IMSI Catcher Current Detection Methods are entirely anomaly based 1. War walk your neighborhood and make note of all Cell Tower ID’s you find and their locations 2. Repeat this until you are sure you have all known devices cataloged 3. Constantly monitor your area to see if any new devices are added 4. Go find the new device
  • 12. Tools to help you out OpenCellID.org – Database of mostly user reported cellular tower devices, their location, and their identifiers AISMICD – Android IMSI Catcher Detector app. Tool used to collect cell data. It also reports/syncs with OpenCellID (sometimes). • https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector Rooted Android Device – Required for AISMICD - Means you need a dedicated device for detection Eric Escobar – Detecting Rogue Cell Towers, built a 50$ device to better triangulate devices (Presented this year) • https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20pr esentations/DEFCON-24-Eric-Escobar-Rogue-Cell-Towers-UPDATED.pdf
  • 14. How hostile is it for your devices at Def Con? • Def Con = “Most hostile network on earth” ???? • Sure don’t use the hotel Wi Fi but how bad is it for your cell phones? • Personal experiment to see if I could find any IMSI Catchers
  • 15. Setup • AIMSICD App • Burner Android Phone (rooted) • Next time: Pre-install opencellid.org data War Driving the Strip in style
  • 16. Don’t Freak out! Pre Def Con War Walk Post Def Con Data
  • 17. Lots of false positives • Devices on multiple floors? • Multiple redundant devices in same location • Potential issues with GPS accuracy
  • 18. Still Unknown Devices Red dots represent devices that I did not see in my preliminary walk and were not already known to opencellid.org
  • 19. Caesar’s • 3 Nights in Caesar’s before Def Con • Lots of towers picked up • Suggest a sort of ‘drive by attack’ • Also observed a lot of LTE to GSM downgrade attacks, my device was hopping networks quite frequently
  • 20. Caesar’s • At least 4 of these devices were previously not known to opencellid.org • There were a couple others that had only been seen once before
  • 21. Defense • Depends on your personal threat model • Don’t use your device • Wi Fi calling with vpn? • Signal / OpenWhisper app for calling/SMS, although you would still be tracked • If all Wireless Carriers published the tower id’s you could at least know if an id did not match. • Device spoofing would still be possible • Pressure Wireless Carriers to implement mutual authentication between devices
  • 22. Conclusions • The devices are very hard to detect, this is part of what makes them so dangerous • You rarely know when you are connected to these devices All data collected is available on my Github Page https://github.com/MrVaughan/Defcon2016GSMData
  • 23. Shameless Plug • CMD+CTRL CTF Saturday Night • Accessible web app CTF for beginners and pros a like • Lots of challenges to keep you busy • Prizes

Notes de l'éditeur

  1. -Talk about 911 impact -Detecting presence -Can break some of the weaker crypto algorithms used in cellular networks
  2. About Citizen lab: Intersection of Information and Communication Technologies (ICTs), human rights, and global security ‘Cyberwar’ All of these are sourced in Citizen Labs paper
  3. They are used in Other EU Countries as well as Canada, It is tough getting confirmed uses as it often takes years for the information to trickle out of court cases and information requests Montreal Reporters
  4. I have it on my calendar to build one in January (first chance I’ll get)
  5. Looking at your phone right now you have no idea if it is connected to a real cell phone tower or an IMSI catcher
  6. There are a couple other similar presentations in the last year or 2. Can you trust the data in openCellId ? -If I were XXX -
  7. Multiple antenna’s