tetra networks security

26
TETRA Networks Security Tomáš Suchan, Marek Sebera ITDS Consulting

Upload: marek-sebera

Post on 16-Apr-2017

879 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: TETRA Networks Security

TETRA Networks SecurityTomáš Suchan, Marek Sebera

ITDS Consulting

Page 2: TETRA Networks Security

Schedule

● Introduction● What is TETRA● Who does use TETRA● Security options● Dangerous decisions● Demo● Q & A

Page 3: TETRA Networks Security

Introduction - ITDS Consulting

● Tomáš Suchan, Marek Sebera● Based in Prague● https://www.itds-consulting.cz● TETRA, GSM, TETRAPOL, DMR● TETRA Toolkit - Monitoring and forensic tool● GSM Toolkit - Mobile networks security tool

Page 4: TETRA Networks Security

What is TETRA

● TErrestrial Trunked RAdio● Designed by ETSI since 1990● Mission-Critical Digital Radio System● Private / Professional Mobile Radio (PMR) ● DAMM, Sepura, Rohde & Schwarz, EADS, Motorola, …● Transport, Airports, Police/Fire/Ambulance, Army, …● SCADA systems (nuclear plants, power stations, …)

Page 5: TETRA Networks Security
Page 6: TETRA Networks Security
Page 7: TETRA Networks Security

WORLDTETRAUSAGE

Page 8: TETRA Networks Security

TETRA - Czech Republic

Praha, Brno, Liberec, České Budějovice, Chemopetrol Litvínov, Hyundai Nošovice, Pardubice, Přerov, ...

Radio Band:410MHz - 430MHz

Page 9: TETRA Networks Security

Slovak Republic

● TETRAPOL● Project: SITNO - Ministerstvo Vnútra SK● Built in years 1999 - 2008● Working since 2008● Firefighters, Police, Customs, 112 Emergerency

Page 10: TETRA Networks Security

Disclaimer

● Properly secured TETRA network is hard to crack

● We’re talking about unsecured or badly secured networks

Page 11: TETRA Networks Security

TETRA Network Security

● Transport Air-Interface encryption

● SwMI (Infrastructure) Restrict MS by TEI + ISSI combo

● Application End-to-End transport encryption

Page 12: TETRA Networks Security

Attacks on TETRA

Page 13: TETRA Networks Security

Missing Air-Interface Encryption

We can:

● Read text / binary data (SDS)● Decode voice transports (even Group Calls)● Map network structure● Identify users, clients, applications● Intercept (MITM) communication● Fake both directions of data transport

Page 14: TETRA Networks Security

No Air-Interface Encr. , TEI + ISSI registration restricted

We can still do everything, it’s just bit harder :-)

Page 15: TETRA Networks Security

Missing Air-Interface Encryption, added E2E encryption

● Correlate communication groups● Map infrastructure● Scan / Penetrate application endpoints● Communication fuzzing and DoS attacks

Page 16: TETRA Networks Security

Only Air-Interface encrypted

● Obtain auth key for network● ???● PROFIT

Page 17: TETRA Networks Security

Only Air-Interface encrypted (ver 2)

● Build 80-bit TEA (symmetric stream cipher) cracker● Obtain auth key for network● ???● PROFIT

Page 18: TETRA Networks Security

Recommendation

● Encrypt Air-Interface● Use End-to-End encryption● Don’t skimp on security

Page 19: TETRA Networks Security

Tetra Toolkit ® ITDS Consulting

● Requirements○ 4-core 2.5GHz computer, 8GB DDR3○ RTL-SDR USB dongle○ Linux OS

● Attack time < few minutes● Decode voice, text and data communication● Map infrastructure,

Page 20: TETRA Networks Security

Attack Demo

Page 21: TETRA Networks Security

Thanks to our Partners

Page 22: TETRA Networks Security
Page 23: TETRA Networks Security
Page 24: TETRA Networks Security
Page 25: TETRA Networks Security

Questions & Answers

Page 26: TETRA Networks Security

TETRA Networks SecurityThank you !