Abstract
With the emergence of widely available hardware and software tools for GSM hacking, the security of cellular networks is threatened even by script kiddies. In this paper we present four different attacks in GSM networks, using commodity hardware as well as open source and freely available software tools. All attacks are performed using a common DVB-T TV tuner, which is used as a sniffer for the GSM radio interface, as well as an Arduino combined with a GSM shield that is used as a software programmable mobile phone. The attacks target both mobile users and the network, ranging from sniffing the signaling traffic to tracking and performing denial of service to the subscribers. Despite the script kiddie style of the attacks, their consequences are critical and threaten the normal operation of the cellular networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ericsson mobility report, June 2014. http://www.ericsson.com/res/docs/2014/ericsson-mobility-report-june-2014.pdf
Xenakis, C.: Malicious actions against the GPRS technology. Comput. Virol. 2(2), 121–133 (2006)
3GPP TS 03.6 (V7.9.0), GPRS Service Description, Stage 2, September 2002
3GPP TS 04.01 V8.0.0 – Mobile Station - Base Station System (MS - BSS) interface; General aspects and principles, March 2000. http://www.3gpp.org/ftp/Specs/html-info/37801.htm
The mobile economy, GSMA (2014)
Arduino: The Open Source Electronics Platform. http://arduino.cc
The osmocombb project – open source gsm baseband software implementation. http://bb.osmocom.org/
Xenakis, C., Ntantogian, C.: An advanced persistent threat in 3G networks: attacking the home network from roaming networks. Comput. Secur. 40(1), 84–94 (2014)
3GPP TS 27.007 V11.5.0 (2012-12), 3rd Generation Partnership Project, Technical Specification Group Core Network and Terminals, AT command set for User Equipment (UE) (Release 11)
Simtrace. http://bb.osmocom.org/trac/wiki/SIMtrace
Golde, N., Redon, K., Seifert, J.-P.: Let me answer that for you: exploiting broadcast information in cellular networks. In: 22nd USENIX Conference on Security, Washington DC, USA, August 2013
Kune, D.F., Koelndorfer, J., Hopper, N., Kim, Y.: Location leaks on the GSM air interface. In: Network and Distributed System Security Symposium (NDSS), San Diego, California, USA (2012)
Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P.D., La Porta, T.F.: On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: ACM Conference on Computer and Communications Security, pp. 223–234 (2009)
Arapinis, M., Mancini, L.I., Ritter, E., Ryan, M.: Privacy through pseudonymity in mobile telephony systems. In: 21st Network and Distributed System Security Symposium (NDSS), California, USA (2014)
Nohl, K.: Attacking Phone Privacy. BlackHat, USA, Las Vegas (2010)
http://www.theregister.co.uk/2012/01/11/phone_tracking_expert/
Lee, P.P.C., Bu, T., Woo, T.Y.C.: On the detection of signaling DoS attacks on 3G/WiMax wireless networks. Comput. Netw. 53(15), 2601–2616 (2009)
Xenakis, C., Ntantogian, C.: Attacking the baseband modem of mobile phones to breach the users’ privacy and network security. In: 7th International Conference on Cyber Conflict (CyCon 2015), Tallinn, Estonia, May 2015
Acknowledgements
This research has been funded by the European Commission as part of the SMART-NRG project (FP7-PEOPLE-2013-IAPP Grant number 612294).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ntantogian, C., Valtas, G., Kapetanakis, N., Lalagiannis, F., Karopoulos, G., Xenakis, C. (2015). Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software. In: Fischer-Hübner, S., Lambrinoudakis, C., López, J. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2015. Lecture Notes in Computer Science(), vol 9264. Springer, Cham. https://doi.org/10.1007/978-3-319-22906-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-22906-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22905-8
Online ISBN: 978-3-319-22906-5
eBook Packages: Computer ScienceComputer Science (R0)