Categories
Linux Security

mkcert – Simple Localhost Certs

Using Mkcert to generate valid SSL certificates on your local machine for development

Categories
GSM Mobile Networks RF Security SIM Cards

16 in 1 Magic SIM Card Revisited

Quick look at cheap “Magic SIM Cards”, what they do, how they do it, and the amazing graphics they use.

Categories
Kamailio Security Voice over IP

Kamailio Bytes – SIP over TLS (SIPS)

Using Transport Layer Security (TLS) to protect SIP traffic from modification / manipulation and guarantee message authenticity.

Categories
EPC EUTRAN LTE Security Voice over IP

VoLTE / IMS – P-CSCF Assignment

How the P-CSCF address is assigned to a UE in Protocol Configuration Options (PCO) during bearer establishment.

Categories
EPC EUTRAN LTE Security Voice over IP

Using Wireshark to peer inside IPsec ESP VoLTE data from the P-CSCF

Viewing the payload of an Encapsulated Security Payload in Wireshark.

Categories
Security Software

Reverse Engineering Samsung Sysdump Utils to Unlock IMS Debug & TCPdump on Samsung Phones

Reverse Engineering the Samsung Sysdump app to unlock IMS Debug and TCPdump functions

Categories
EPC EUTRAN LTE Mobile Networks Security Software Voice over IP

VoLTE/IMS Debugging on Samsung Handsets using Sysdump & Samsung IMS Logger

Unlocking the built in IMS Debugging tool in Samsung’s Sysdump Utility

Categories
EPC EUTRAN LTE Python RFCs & Standards Security Software

PyHSS Update – MongoDB Backend & SQN Resync

Feature Update on PyHSS the Python Home Subscriber Server

Categories
EPC EUTRAN GSM LTE Mobile Networks RFCs & Standards Security SIM Cards

Querying Auth Credentials from USIM/SIM cards

Using osmo-sim-auth to query USIM/SIM cards authentication mechanism.

Categories
EPC EUTRAN LTE Mobile Networks RF Security SIM Cards

HSS & USIM Authentication in LTE/NR (4G & 5G)

Exploring the how and why of Authentication in LTE & NR networks.

Categories
EPC EUTRAN LTE Mobile Networks Security SIM Cards

Roll your own USIMs for Private LTE Networks

Adventures in getting USIMs to use on private LTE networks.

Categories
Kamailio Security Voice over IP

Kamailio Use Case – SIP Honeypot with SQL Database

Creating a Kamailio based SIP Honeypot

Categories
Kamailio Security Software Voice over IP

Kamailio Bytes – Geoip2

Using GeoIP2 module to trace source of traffic and use that for routing in Kamailio

Categories
Australian Telco Security

SMS Security – Banks

The other day I got an SMS from my bank, one of the big 4 Australian Banks. BANKNAME Alert: Block placed on card ending in XXXX, for suspicious transaction at ‘THING NICK PURCHASED ONLINE’ for $29.00 at 13:56. If genuine, reply ‘Yes’. If Fraud, reply ‘No’. SMS from bank They’d detected possible fraud on my […]

Categories
LTE Mobile Networks RF RFCs & Standards Security SIM Cards

LTE (4G) – EUTRAN – Key Distribution and Hierarchy

We’ve talked a bit in the past few posts about keys, K and all it’s derivatives, such as Kenc, Kint, etc. Each of these is derived from our single secret key K, known only to the HSS and the USIM. To minimise the load on the HSS, the HSS transfers some of the key management […]

Categories
LTE Mobile Networks RF RFCs & Standards Security

LTE (4G) – Ciphering & Integrity of Messages

We’ve already touched on how subscribers are authenticated to the network, how the network is authenticated to subscribers. Those functions are done “in the clear” meaning anyone listening can get a copy of the data transmitted, and responses could be spoofed or faked. To prevent this, we want to ensure the data is ciphered (encrypted) […]

Categories
EPC LTE Mobile Networks RF RFCs & Standards Security SIM Cards

LTE (4G) – Authenticating the Network

How LTE Subscriber authenticate the network

Categories
LTE Mobile Networks RF RFCs & Standards Security SIM Cards

LTE (4G) – USIM Basics

Contents of a USIM, fields & their meanings and basics of EUTRAN authentication.

Categories
Kamailio Security Voice over IP

Kamailio Bytes – HTable

Hash Tables (HTable) – Lightning fast small databases used in Kamailio for anything you can imagine.

Categories
RFCs & Standards Security Voice over IP

SIP Extensions – RFC4474

Who is calling?