Update13 1.4.2019

Novinky

Hlavní stránka


News -

Alert - Operation :

+ Dělení podle roků 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008

- Aktualizace jednotlivých operací

+ New Operation:

Operation Oceansalt

OperationShaheen

Operation ShadowHammer

Operation SaboTor


First aid

+ Sekce obsahuje veškeré informace a nástroje pro první pomoc od odvirování systému až po jeho reinstalaci.


Škola

+ Nová sekce, která nahradí sekci "Tutoriály" bude tu vše, co je v sekci "Tutoriál".


Školení

+ Seznam školení, které obsahuje tento web.


Sylaby

+ Obsahuje seznam veškerých sylabů na webu.


Calendar

+ Nová sekce obsahující všechny články, které budou postupně rozdělovány podle času, datumu atd.

2019  2018 


CyberWar

+ Sekce bude obsahovat informace o Cyber bojích v sítích mezi velmocemi.

+ Sekce obsahuje video ze seriálu "CyberWar" o jednotlivých útocích, které byly probírány na webu a v televizích.


Bugtraq Database

+ Nová sekce obsahující všechny bugy pro rok 2019


Správce systému

+ Sekce zabývající se informacemi o profesi "Správce systému".

Požadavky  Certifikáty  Tutoriály  Školení  Sylaby  Online kurzy  Weby


Exploit

+ Nová sekce zaměřující se na aktualizovaný seznam exploitů a jejich rozdělení podle kategorií.

Remote 

Web App 

Local&Privilege Escalation 

DoS & PoC 

ShellCode


Jsem hacknut

+ Nové sekce

Jsem oběť hackerů 

Byl jsem Hacknut 

Osobní počítače 

Mobil 

Online služby 

Routery


Změny

ZeroDay - Změněn odkaz na novou stránku, která obsahuje všechny hrozby a jejich popis.

Threats - Grafická úprava a odstraněn problém  s tabulkou.


Chyby

Opraveno několik chyb


Aktualizace

Exploit

Remote  - Aktualizace pro rok 2019/2018

Web App  - Aktualizace pro rok 2019/2018

Local&Privilege Escalation  - Aktualizace pro rok 2019/2018

DoS & PoC  - Aktualizace pro rok 2019/2018

ShellCode - Aktualizace pro rok 2019/2018


Počítačový útok

29.3.19

BTS resource depletion attack

LTE Attack

Every commercial eNB has a maximum capacity of active user connections based on their hardware and software specifications. The purpose of the BTS resource depletion attack is to deplete this capacity of the active RRC Connections, thereby preventing other users from connecting to the target eNB.

29.3.19

Blind DoS attack

LTE Attack

Unlike the aforementioned attack that denies multiple users in an eNB, the Blind DoS attack denies a targeted UE by establishing RRC Connections spoofed as the victim UE. 1) Attack model: The attacker performs the attack within the area covered by the victim’s serving eNB. The attacker also knows the victim’s S-TMSI that can be obtained in three ways

29.3.19

Remote de-registration attack

LTE Attack

During our experiments, we discovered that operational MMEs have several implementation flaws that cause them to unnecessarily de-register the victim UE without notification. The detailed attack scenario is as below. 1) Adversary model: An adversary should be able to send malicious NAS messages to the MME in which the victim UE is registered. Typically, an MME manages a number of eNBs which are distributed throughout large geographical regions.

29.3.19

SMS phishing attack

LTE Attack

1) Adversary model: In this scenario, the adversary sends an SMS message to victim UE1 by spoofing the message sender using the phone number of victim UE2. To this end, the adversary knows the S-TMSI of UE2 to spoof the sender. The phone number of UE1, to which the actual SMS message is sent, is also known. In addition, we assume that the target LTE network provides the SMS through the NAS layer. 2) Attack procedure: ➀ The adversary starts by establishing a spoofed RRC Connection using the S-TMSI of UE2

29.3.19

ATTACKS EXPLOITING UE: AKA BYPASS ATTACK

LTE Attack

1) Adversary model: The adversary is located sufficiently close to the victim UE to trigger handover from an existing eNB to the adversary’s rogue LTE network. To this end, the rogue LTE network transmits an LTE signal with higher transmission power than commercial eNBs. Additionally, the adversary would have to know the list of Tracking Areas (TAs) to masquerade the rogue LTE network as a commercial one. A valid TA Code (TAC) can easily be captured in two ways

29.3.19

Attacks exploiting eNB

LTE Attack

In the case of a BTS resource depletion attack, it is impossible for an eNB to distinguish the adversary’s RRC Connection requests from benign RRC connection requests. A possible mitigation to this attack could be to reduce the inactivity timer value to allow an RRC Connection that is unresponsive to the Authentication request to expire.

29.3.19

Attacks exploiting MME and UE

LTE Attack

As discussed in Section V, both the Remote de-register attack and SMS phishing attack are rooted from incorrect implementation of the operational MMEs. Thus, these MMEs should be carefully implemented by strictly following the 3GPP standard. The AKA bypass attack is also rooted in the UE handling the mandatory security procedure incorrectly. Therefore, the UE should not proceed with any control plane procedures before completing the mandatory security procedure successfully.

29.3.19

MitM attack

LTE Attack

Many previous studies,  employed a rogue BTS in a 2G/3G network. However, the Man in the Middle (MitM) attack in LTE networks received less attention . Rupprecht et al. showed that an LTE dongle could be used for eavesdropping and tampering if the dongle incorrectly allows null integrity to both the control and data plane. Hussain et al. demonstrated an Authentication relay attack to eavesdrop a victim UE’s data communication if the carrier uses null encryption to the data plane.

29.3.19

DoS attack

LTE Attack

Previous studies introduced DoS attacks that exploit vulnerabilities in LTE control plane procedures. Shaik et al. presented DoS attacks using plain reject messages (NAS TAU reject, Service reject and Attach reject). Raza et al. demonstrated two types of DoS attacks that were able to detach a user from the network: the first uses a plain NAS Detach request message and the other uses Paging with the user’s IMSI. Both studies showed that certain unprotected plain messages may cause denial of service to users.


Techblog