Term
| What are the 4 Denial of service attacks countered by 3G? |
|
Definition
De-registration spoofing Location update spoofing Camping on afalse base station Camping on a false BTS / MS |
|
|
Term
| What are the two types of attacks on identity catching? |
|
Definition
|
|
Term
| Impersonation of the network has three attacks to it. These are? |
|
Definition
Suppressing encryption between target user and intruder
Suppress encryption between target user and true network
Forcing use of compromised key |
|
|
Term
| What are the three attacks for eavesdropping on user data? |
|
Definition
Suppressing encryption between target user and intruder
Suppressing encryption between target user and true network
Force use of a compromised key |
|
|
Term
| Impersonation of the user attacks (4) |
|
Definition
Compromised authentication vector
Eavesdropped authentication respon se
Hijacking incoming calls (with / without encryption)
Hijacking outgoingcalls (with/without encryption) |
|
|
Term
| Name the four variations of attacks which hijack calls |
|
Definition
Incoming encrypted Outgoing encrypted Incoming non-encrypted Outgoing non-encrypted |
|
|
Term
| Two attacks target the authentication vector, what are these? |
|
Definition
User impersonation with compromised authentication vector
User impersonation through eavesdropped authentication response |
|
|
Term
| Between the user and which two places can you suppress encrypted |
|
Definition
user and real network
user and intruder |
|
|
Term
| What two places can you camp on? |
|
Definition
|
|
Term
| What two types of ID catching can you do? |
|
Definition
|
|
Term
| What two things can you spoof |
|
Definition
location update
De-registration spoofing |
|
|
Term
| The network cannot authenticate messages it receives over the radio interface. Three attacks target this, what are they? |
|
Definition
De-registration spoofing
Location update spoofing
Suppressing encryption between target user and true network |
|
|
Term
| What exploits the fact that the network can ask a user to send its ID in clear text? |
|
Definition
|
|
Term
| What exploits the fact that the MS can send its permanent ID in clea rtext? |
|
Definition
|
|
Term
| The fact that a user has no control over a compromised key means what? |
|
Definition
| A user can be forced to use a compromised cipher key and then eavesdropped on |
|
|
Term
| A user can use an authentication vector several times , what exploits this? |
|
Definition
| User impersonation with eavesdropped authentcation response |
|
|
Term
| Spoofing attacks (both of them) can be prevented in 3g using which measure? |
|
Definition
|
|
Term
| Both catching attacks can be protected by which 3g security measure? |
|
Definition
|
|
Term
| A combination of mandatory cipher mode, message authentication and replay inhibition can be used to stop which attack? |
|
Definition
| Suppressing encryption between the target user and the intruder |
|
|
Term
| Message authentication and replay inhibition can be used to stop which attack? |
|
Definition
| Supressing encryption between the target user and the true network |
|
|
Term
| Integrity protection alone is a protection against which two type of attacks? |
|
Definition
Spoofing attacks
Hijacking attacks |
|
|
Term
| Mandatory cipher mode alone is enough to counter which attack? |
|
Definition
| Catching attacks (active and passive) |
|
|
Term
| Suppressing encryption between the target user and the intruder can be countered by which measures? |
|
Definition
| A combination of mandatory cipher mode, message authentication and replay inhibition |
|
|
Term
| Supressing encryption between the target user and the true network can be countered by which measures? |
|
Definition
| Message authentication and replay inhibition |
|
|
Term
| A compromised key can be stopped by? |
|
Definition
| The presence of a sequence number |
|
|
Term
| The presence of a sequence number can prevent two types of attacks, what are they? |
|
Definition
Authentication vector attacks
Compromised cipher key based attacks |
|
|
Term
| A user impersonation with compromised authentication vecotr and user impersonation through authentication response can be countered by which measure? |
|
Definition
|
|
Term
| Hijacking calls can be prevented by what? |
|
Definition
|
|
Term
| How does de-registration spoofing occur? |
|
Definition
| The intruder spoofs a de-registration request known as IMSI detach, to the network. |
|
|
Term
| What measure can prevent de-registration spoofing? |
|
Definition
| Integrity protection protects against this attack. |
|
|
Term
| What does IMSI stand for? |
|
Definition
| International mobile subscriber identity |
|
|
Term
| Location update spoofing is what? |
|
Definition
| spoofing a location update request saying as if it is the legitimate user, saying it's in a different location. |
|
|
Term
| Camping on a false BTS works by? |
|
Definition
| A user camps on the radio channels of a false base station so it's out of reach |
|
|
Term
| How do you counter de-registration spoofing? |
|
Definition
|
|
Term
| The security architecture does not counteracct false bts, however... |
|
Definition
| The DoS only lasts as long as the attacker is active |
|
|
Term
| Camping on a false BTS /MS is different somehow, what is it? |
|
Definition
| A false BTS/MS can act as a 'repeater' for som etime and relay some reqs. |
|
|
Term
| If a false BTS / MS acts as a repeater what can it do to ruin everything? |
|
Definition
| Not forward or modify your requests. |
|
|
Term
| Camping on a false BTS / MS isn't protected. The fact that it acts like a repeater (MITM) is not solved by 3G. What can possibly help here? |
|
Definition
| Integrity protection of critical message MAY help to prevent some DoS attacks (no specifics) |
|
|
Term
| Passive identity caching is what? |
|
Definition
| Doesn't say in the slides, but it's just seeing who the person is. |
|
|
Term
| How can you prevent passive ID catching? |
|
Definition
TMSI (temporary mobile subscriber identity)
If a TMSI is used rather than a IMSI then the user cannot be tracked to the same ID as it changes |
|
|
Term
| Active Identity caching is what? |
|
Definition
| The same as passive, but you explicitly ask for the permanent ID. |
|
|
Term
| How is active identity caching prevented in 3g? |
|
Definition
| Integrity confidentiality, specifically using an encryption ky shared by a group of users to protect user ID |
|
|
Term
| Suppressing encryption between the target user and the intruder works how? |
|
Definition
| the BTS has been modified and when a service has been initiated an intruder does not enable encryption |
|
|
Term
| What can you do to prevent suppression between the target user and the intruder? |
|
Definition
| Mandatory cipher mode, message authentication and replay inhibition |
|
|
Term
| Suppressing encryption between the target user and the true network is done by what? |
|
Definition
| Modifying the cipher capabilities of the MS to make it appear there's a compatibility issue |
|
|
Term
| What prevents suppressing encryption between the target user and the true network? |
|
Definition
| A mobile station with message authentication and replay inhibitio nallows the network to verify that encryption has not been suppressed |
|
|
Term
| A compromised cipher key is done how? |
|
Definition
| When a call is set-up the user is forced to use a compromised cipher key |
|
|
Term
| What does the presence of a sequence number do to prevent compromised cipher key? |
|
Definition
| Allows the USIM to verify the freshness of the cipher key. |
|
|
Term
| What does the presence of a sequence number NOT do to prevent compromised cipher key? |
|
Definition
| Does not protect against foce use of compromised authentiction vectors which have not yet been used to authenticate the USIM |
|
|
Term
| Describe the attack of eavdropping on user data by suppressing encryption between the target user and the intruder |
|
Definition
The target user is enticed to camp on a fase BTS (big suprise) when the target user or intruder initiates a call the network does not enable encryption by spoofing the cipher mode command
The attacker then sets up his own connection with genuine network using his own subscription. The attack may then subsequently eavesdropping on the transmitted user data (it implies that he this is a MITM attack) |
|
|
Term
| How does suppression of encryption between target user and true network work? |
|
Definition
| The network can decide to establish an un-enciphered connection if the false BTS / MS modifies the ciphering capabilities of the MS to make it seem like there's a geniune incompatibility issue |
|
|
Term
| How does an intruder eavesdrop forcing the use of a compromised cipher key |
|
Definition
| Target user is enticed to camp on the false BTS/MS (oh my god, that's a first). When a service is tried to set up, the false BTS / MS forces the use of a compromised cipher key on the mobile user while it builds up a connection with the genuine network using its own subscription |
|
|
Term
| how does user impersonation with compromised auth vector work? |
|
Definition
| Intruder possesses a compromised auth vector which is intended to be used by the network to auth a legit user. The intruder uses the data to impersonate the target user towards the network and the other party. |
|
|
Term
| How does user impersonation through eavesdropped auth response work? |
|
Definition
| The inrtuder eavesdrops on the auth response and then reuses it later on |
|
|
Term
| If encryption is disabled how do you hijack outgoing calls? |
|
Definition
| user initiates the call setup procedure, intruder modifies the signaling elements such that for the serving network it appears as if the target user wants to set up a mobile originated call. After auth, intruder cuts the connection with the target user and uses the conn to make fradulent target user's subsription. |
|
|
Term
| Hijacking outgoing calls in networks with encryption enabled? |
|
Definition
| The user initiates the call setup procedure, intruder modifies the signalling elements such that for the serving network it appears as if the target user wants to set up a mobile originated call. The intruder has to suppress encryption by modification of the message in which the MS informs the network of its ciphering capabilities. After auth, intruder cuts the conn with the target user and uses the conn to make fraudulent target user's subsc. |
|
|
Term
| How does hijacking incoming calls in networks with encryption disabled work? |
|
Definition
Taret user on the false base station gets a phonecall from the associate of the intruder.
Intruder acts as a relay until auth and call set-up has been done.
Intruder releases target user and subsequently uses the connection to answer the call made by his associate. |
|
|
Term
| How does hijacking incoming calls in networks with encryption enabled work? |
|
Definition
Taret user on the false base station gets a phonecall from the associate of the intruder.
Intruder acts as a relay until auth and call set-up has been done. Also have to suppress encryption.
Intruder releases target user and subsequently uses the connection to answer the call made by his associate. |
|
|