View
217
Download
4
Category
Preview:
Citation preview
©2017P1Security.Allrightsreserved.
²
TrainingDescription
2017
TS-250IMSSecurity&attackingtelecominfrastructure
©2017P1Security.Allrightsreserved.
TS-250IMSSecurity&attackingtelecominfrastructure
DescriptionofTrainingClass
LearnaboutmoderntelecomandmobilesystemandnetworksinthecontextofIMSandNGNcorenetworks.ThetraineewilllearnalsoaboutthecoreevolutionsofthelegacytelecomnetworksintoIMSnetworksandthereuseofIETF-basedprotocolsinthecontextofIMSalongwithitsmainbenefits.
Duration• Uniqueversion:2days.
Attendeeswillreceive• AccesstoVMrunningAsteriskPBXandsetupforusebetweenmultipleusers;• AccesstoOpenIMSVM;• Accesstoscriptsdevelopedduringthetrainingsession;• Trainingmaterial:Slidescopyofthepresenter.
Pre-requisitesoftrainingclass• Basicknowledgeoftelecom&networkprinciples:
o Whatis2G,3G,4G;o OSInetworklayers;o Basicknowledgeoftelecomtechnologies.
• LaptopwithLinuxinstalledeitherinaVMornative,KaliorUbuntuwithreverseengineeringandhackingtoolsrecommended;
• GoodknowledgeandusageofWireshark;• BasicskillsandusageofLinuxforreverseengineering(strings,knowledgeoftoolsinLinuxfor
reverseengineering).
Coveredinthistraining• IMSIntroduction;• IMSBenefits;• IMSTechnologies;• RootofthetechnologyofIMS;• IMSSecurityArchitecture;• IMS-specificProtocolsstudy:
o SIPIETF;o Diameter;o RTP.
• OverviewofotherprotocolsstillusedinIMS:o GTP-C;o GTP-U;o GTPv2;o GTP’.
• IMSNetworkElementsoverviewandsecurityroles,functions:o HSS;
©2017P1Security.Allrightsreserved.
o CSCFs:I-CSCF,P-CSCF,S-CSCF;o BG/BGCF;o MGCF;o SGW.
• SpecificNetworkElementsinrecentversionofIMScorenetworks:o SDP/SDR;o PCRF.
• SecurityofthedifferentIMSplanes:o Access;o Transport;o Control;o Application.
• IMSCommunicationsecurity;• OpenSourceIMStools;• IMSnetworkelementfingerprinting;• TypicalattacksonIMSinfrastructure;• RoleoflegacyinIMSsecurity:
o interconnectionwithSS7signalingnetworkelement;o H248.
• VulnerabilitiesofsomeVoiceoverIPprotocols:o SIP;o H323.
• AnalysisofNetworkElementandvulnerabilities:o GenericIMSNetworkElementvulnerabilities.
• DiametersecurityasusedwithintheIMSnetwork;• ScenarioofattackofIMSnetwork:
o Radio-based,subscriberrole;o Infrastructure-based,TransmissionorRANvector;o Internal-based,attack.
Recommended