day 8 Flashcards Preview

Mod 12 > day 8 > Flashcards

Flashcards in day 8 Deck (21):
1

2G systems

GSM and CDMA

2G connections accounted for around 60 percent at the end of 2014

2

2.5G

low-speed packet data delivery system

3

3g

high speed broadband packet system

4

3rd generation partnership project (3GPP)

LTE and LTE advanced

5

3rd generation partnership project 2 (3GPP2)

IS-95 technologies commonly known as CDMA

6

GSM system

subscriber BTS
(BSS)

7

AIR interface (Um)

the air interface is a full-duplex link formed by two simplex radio channels

8

Base Station Subsystem (BSS)

contains the BTS

9

spoof caller ID numbers

many cellular voicemail systems can be assessed using this technique

10

A5 family of encryption algorithms

A5/0: no encryption
A5/1: first encryption
A5/2: weakened encryption
A5/3: replacement for A5/1
A5/4: A5/3 but with a 128-bit key

11

more on A5/1

in 2009, 40 rainbow tables totalling two terabytes were published on the internet.

GSM voice calls and SMS/MMS messages can be decrypted.

12

International Mobile Subscriber Identity (IMSI)

a unique identifier to a mobile subscriber.

the IMSI is stored on the Subscriber Identity Module (SIM) card

13

rogue BTS

because of the lack of mutual authenticaiton in GSM networks, a mobile device could be lured to connect to an attackers' rogue BTS being run from a laptop.

14

femtocells

femtocells are small devices provided by mobile network operators that implement a complete GSM, CDMA, or LTE protocol stack

there have been at least two publicly known femtocell hacks

15

Unlicensed Mobile Access (UMA)

UMA allows mobile carriers to use 802.11 networks to replace the UM Air interface to connect mobile devices to the Network Switching Subsystem

16

WiFi calling attacks

an attacker operating in-line with the communicaitons flow, perhaps through use of ARP cache poisoning or operating as a rogue AP, could capture all information needed to be able to record all incoming/outgoing calls and texts

17

Signalling System 7 (SS7)

a suite of telephony protocols developed in the mid-1970's to set up and tear down most calls on the PSTN worldwide

18

SS7 attacks

by injecting the appropriate SS7 messages, an attacker can perform call interception, reroute calling, intercept SMS messages, device location and tracking, commit financial fraud, or perform a denial of service

19

4G LTE functionality

essentially all of the services-calling, data, control plane, messaging- are standardized onto a single unified backbone. That backbone is IPv4 and will soon be IPV6

20

4G LTE security

earlier 3GPP systems were limited to a handful of algorithms, which could not be easily replaced without significant changes to the network infrastructure and mobile devices

21

more on 4G LTE

to date, there have been no significant open source exploits in the over the air LTE network technology leading to eavesdropping or spoofing, allowing consumers to use this technology with some confidence