Sunteți pe pagina 1din 5

ndice

ndice

Prlogo ........................................................................................................11
Introduccin y objetivos ............................................................................13
Captulo I Seguridad en comunicaciones GSM.......................................15
1. Arquitectura de GSM ...............................................................................................15
MS Mobile Station ................................................................................................................ 16
BSS Base Station Subsystem ................................................................................................. 16
NSS Network and Switching Subsystem .............................................................................. 17
,GHQWLFDGRUHVGHODV06 .......................................................................................................... 18
Pila de protocolos ...................................................................................................................... 19
Protocolos MSBTS .............................................................................................................. 19
Protocolos BTSBSC ............................................................................................................. 20
Protocolos BSCMSC ............................................................................................................ 20

2. Nivel fsico ..................................................................................................................21


Descripcin ............................................................................................................................... 21
Modulacin ............................................................................................................................... 22
MAC: subnivel de acceso al medio........................................................................................... 25
%DQGDVGHIUHFXHQFLD*60 ....................................................................................................... 26
)'0$GLYLVLyQGHODEDQGDGHIUHFXHQFLDV ............................................................................. 26
TDMA: multiplexacin en el tiempo ........................................................................................ 32
&DQDOHVItVLFRV\FDQDOHVOyJLFRV .............................................................................................. 34

3. El nivel de Red...........................................................................................................42
Modo idle y modo dedicado...................................................................................................... 42
Nivel RR.................................................................................................................................... 44
Nivel MM .................................................................................................................................. 50
JJJ

Hacking y seguridad en comunicaciones mviles GSM/GPRS/UMTS/LTE

4. Short Messages Services ...........................................................................................53


Arquitectura del servicio ........................................................................................................... 53
Contenido de un SMS ............................................................................................................... 53
WAP Wireless Application Protocol ...................................................................................... 53
MMS Multimedia Messaging Service ................................................................................... 55

5. El interfaz ME-MS....................................................................................................56
6. Aspectos de seguridad contemplados en GSM .......................................................58
6HJXULGDGGHOSURWRFROR*60................................................................................................... 58
$XWHQWLFDFLyQ*60................................................................................................................... 58
&LIUDGRGHODVFRPXQLFDFLRQHV*60 ........................................................................................ 62

7. Ataques contra comunicaciones GSM.....................................................................69


'HELOLGDGHV*60 ...................................................................................................................... 69
,QOWUDFLyQHQODUHGGHORSHUDGRU ............................................................................................. 70
Escucha del canal de radio (sealizacin)................................................................................. 71
Escucha del canal de radio (datos) ............................................................................................ 74
$WDTXHFRQWUDOD6,0SDUDREWHQHU.L FRQDFFHVRItVLFR ....................................................... 75
$WDTXHVFULSWRJUiFRV............................................................................................................... 75
Ataques mediante SMS ............................................................................................................. 85
Suplantacin de usuarios ........................................................................................................... 87
$WDTXHPHGLDQWHHVWDFLyQEDVHIDOVD ......................................................................................... 88
Ataques a la banda Banda Base .............................................................................................. 102

Captulo II GPRS .....................................................................................103


1. Introduccin a GPRS..............................................................................................103
Dominio de conmutacin de circuitos versus dominio de conmutacin de paquetes ............ 104
$UTXLWHFWXUDGH*356 ............................................................................................................. 105
(OWUiFRGHGDWRV*356 ......................................................................................................... 107
('*( ...................................................................................................................................... 108
*3565RXWLQJ$UHD ................................................................................................................ 110
3LODJHQHUDOGHSURWRFRORV*356 .............................................................................................111

2. Nivel Fsico............................................................................................................... 112


TDMA ..................................................................................................................................... 112
Canales lgicos........................................................................................................................ 112
0DSHRGHFDQDOHVOyJLFRVDFDQDOHVItVLFRV............................................................................. 114
JJJ

ndice

,QIRUPDFLyQGHEURDGFDVW ........................................................................................................ 116

3. Nivel RR ................................................................................................................... 117


TBF (Temporary Block Flow) ................................................................................................ 119

4. Nivel LLC ................................................................................................................120


5. Nivel GMM ..............................................................................................................121
3URFHGLPLHQWRVGHOQLYHO*00 .............................................................................................. 122
Coordinacin de los niveles MM*00 .......................................................................... 122
,GHQWLFDGRUHVGH06HQHOQLYHO*00 ................................................................................. 122
(VWDGRV*00 ......................................................................................................................... 123
Seleccin y reseleccin de celda ............................................................................................. 124
3URFHGLPLHQWR*356$WWDFK ................................................................................................... 125
Procedimiento Routing Area Update ...................................................................................... 127

6. Direcciones IP ..........................................................................................................130
Contextos PDP ........................................................................................................................ 130
(OLQWHUID]6*61**61*73 ...................................................................................... 132

7. Aspectos de seguridad de GPRS ............................................................................132


&RQGHQFLDOLGDGGHODLGHQWLGDGGHOXVXDULR .......................................................................... 132
Autenticacin del usuario........................................................................................................ 133
&LIUDGR..................................................................................................................................... 133

8. Ataques .....................................................................................................................136
Ataques activos contra la red core .......................................................................................... 136
Ataques pasivos y semipasivos ............................................................................................... 139
$WDTXHVDFWLYRVPHGLDQWHHVWDFLyQEDVHIDOVD ......................................................................... 141

Captulo III UMTS ..................................................................................149


1. Introduccin a UMTS .............................................................................................149
Arquitectura............................................................................................................................. 149
Protocolos................................................................................................................................ 153
Organizacin jerrquica .......................................................................................................... 155

2. El nivel fsico............................................................................................................156
Esquema de acceso de radio.................................................................................................... 156
Establecimiento de un canal de radio (RRC protocol) ............................................................ 159
&DQDOHVItVLFRVOyJLFRV\GHWUDQVSRUWH .................................................................................. 161
HSPA ....................................................................................................................................... 162
JJJ

Hacking y seguridad en comunicaciones mviles GSM/GPRS/UMTS/LTE

3. El nivel MM .............................................................................................................164
*HVWLyQGHPRYLOLGDG .............................................................................................................. 164
Reglas de medicin ................................................................................................................. 164
Reseleccin de celda Intra-RAT .............................................................................................. 165
5HVHOHFFLyQGHFHOGDLQWHU5$7FDVR*(5$1UTRAN ..................................................... 165
Reseleccin de celda inter-RAT, caso UTRAN*(5$1 ..................................................... 167
Handover ................................................................................................................................. 169

4. Aspectos de seguridad .............................................................................................169


&RQGHQFLDOLGDGGHODLGHQWLGDGGHOXVXDULR .......................................................................... 170
Autenticacin y establecimiento de clave ............................................................................... 172
&LIUDGR..................................................................................................................................... 178
Proteccin de integridad.......................................................................................................... 182
Datos de autenticacin en el paso entre celdas ....................................................................... 184
Datos de autenticacin en el handover .................................................................................... 186

5. Ataques .....................................................................................................................189
Ataque pasivo contra handover ............................................................................................... 189
Ataque activo contra handover................................................................................................ 189
$WDTXHPHGLDQWHHVWDFLyQEDVHIDOVD*60D86,0FRQVRSRUWHSDUDDXWHQWLFDFLyQ*60 ... 190
$WDTXHPHGLDQWHHVWDFLyQEDVHIDOVD*60D86,0VLQVRSRUWHSDUDDXWHQWLFDFLyQ*60 ..... 191
$WDTXHPHGLDQWHHVWDFLyQEDVHIDOVD8076 IHPWRFHOGD ..................................................... 194
2WURVDWDTXHVEDVDGRVHQIHPWRFHOGDV8076 ........................................................................ 196
$WDTXHVPHGLDQWHHVWDFLyQEDVHIDOVD8076 ......................................................................... 198
9LDELOLGDGGHXQDLPSOHPHQWDFLyQSUiFWLFDGHORVDWDTXHVFRQHVWDFLyQEDVHIDOVD* ......... 204

Captulo IV 4G .........................................................................................205
1. Introduccin a 4G ...................................................................................................205
Predecesores y tecnologas candidatas .................................................................................... 206
LTE y LTE-Advanced ............................................................................................................. 207
E-UTRAN ............................................................................................................................... 208
SAE ......................................................................................................................................... 212

2. Seguridad en 4G ......................................................................................................213
Aspectos generales .................................................................................................................. 213
Contexto de seguridad EPS ..................................................................................................... 216
Jerarqua de claves .................................................................................................................. 217
JJJ

ndice

3URFHGLPLHQWRGHDXWHQWLFDFLyQ\HVWDEOHFLPLHQWRGHOFLIUDGR (36$.$ ........................... 218


&RQGHQFLDOLGDGGHODLGHQWLGDGGHOXVXDULR .......................................................................... 219
&RQGHQFLDOLGDGGHORVGDWRVGHVHxDOL]DFLyQ\XVXDULR ........................................................ 219
Integridad ................................................................................................................................ 220
Ataques contra LTE ................................................................................................................. 223

Captulo V Conclusiones y recomendaciones ........................................225


1. Resumen del estado de la seguridad en las comunicaciones mviles 2G/3GUMTS/4G-LTE ............................................................................................................225
2. Recomendaciones para mitigar las vulnerabilidades estudiadas .......................226
&RQJXUDFLyQGHOWHUPLQDOSDUDTXHVyORXWLOLFH*RVXSHULRU ............................................. 226
'HVDUUROORGHVRIWZDUHGHDYLVRGHOPRGRGHFLIUDGRSDUDWHUPLQDOHV ................................... 227
6ROXFLRQHVEDVDGDVHQODGHWHFFLyQGHHVWDFLRQHVEDVHIDOVDV ................................................ 228
6ROXFLRQHVEDVDGDVHQFLIUDGRDWUDYpVGHORVFDQDOHV&6'GH*60 ..................................... 229
6ROXFLRQHVEDVDGDVHQ9R,3FLIUDGR ........................................................................................ 230
Proteccin de las comunicaciones de datos en niveles superiores .......................................... 230
,QVWDODFLyQGHVRIWZDUHGHSURWHFFLyQHQORVGLVSRVLWLYRVKDELOLWDGRVSDUDFRPXQLFDFLRQHVGH
datos mviles........................................................................................................................... 231
Inclusin de los dispositivos con conexin a redes mviles en las polticas de seguridad de las
organizaciones ......................................................................................................................... 232

Referencias................................................................................................233
ndice alfabtico .......................................................................................259
Otros libros de inters..............................................................................267

JJJ

S-ar putea să vă placă și