3
©2017 P1 Security. All rights reserved. ² Training Description 2017 TS-250 IMS Security & attacking telecom infrastructure

P1 Training Description TS-250 v1.0 jbt Access to OpenIMS VM; • Access to scripts developed during the training session; • Training material: Slides copy of the presenter. Pre-requisites

Embed Size (px)

Citation preview

©2017P1Security.Allrightsreserved.

²

TrainingDescription

2017

TS-250IMSSecurity&attackingtelecominfrastructure

©2017P1Security.Allrightsreserved.

TS-250IMSSecurity&attackingtelecominfrastructure

DescriptionofTrainingClass

LearnaboutmoderntelecomandmobilesystemandnetworksinthecontextofIMSandNGNcorenetworks.ThetraineewilllearnalsoaboutthecoreevolutionsofthelegacytelecomnetworksintoIMSnetworksandthereuseofIETF-basedprotocolsinthecontextofIMSalongwithitsmainbenefits.

Duration• Uniqueversion:2days.

Attendeeswillreceive• AccesstoVMrunningAsteriskPBXandsetupforusebetweenmultipleusers;• AccesstoOpenIMSVM;• Accesstoscriptsdevelopedduringthetrainingsession;• Trainingmaterial:Slidescopyofthepresenter.

Pre-requisitesoftrainingclass• Basicknowledgeoftelecom&networkprinciples:

o Whatis2G,3G,4G;o OSInetworklayers;o Basicknowledgeoftelecomtechnologies.

• LaptopwithLinuxinstalledeitherinaVMornative,KaliorUbuntuwithreverseengineeringandhackingtoolsrecommended;

• GoodknowledgeandusageofWireshark;• BasicskillsandusageofLinuxforreverseengineering(strings,knowledgeoftoolsinLinuxfor

reverseengineering).

Coveredinthistraining• IMSIntroduction;• IMSBenefits;• IMSTechnologies;• RootofthetechnologyofIMS;• IMSSecurityArchitecture;• IMS-specificProtocolsstudy:

o SIPIETF;o Diameter;o RTP.

• OverviewofotherprotocolsstillusedinIMS:o GTP-C;o GTP-U;o GTPv2;o GTP’.

• IMSNetworkElementsoverviewandsecurityroles,functions:o HSS;

©2017P1Security.Allrightsreserved.

o CSCFs:I-CSCF,P-CSCF,S-CSCF;o BG/BGCF;o MGCF;o SGW.

• SpecificNetworkElementsinrecentversionofIMScorenetworks:o SDP/SDR;o PCRF.

• SecurityofthedifferentIMSplanes:o Access;o Transport;o Control;o Application.

• IMSCommunicationsecurity;• OpenSourceIMStools;• IMSnetworkelementfingerprinting;• TypicalattacksonIMSinfrastructure;• RoleoflegacyinIMSsecurity:

o interconnectionwithSS7signalingnetworkelement;o H248.

• VulnerabilitiesofsomeVoiceoverIPprotocols:o SIP;o H323.

• AnalysisofNetworkElementandvulnerabilities:o GenericIMSNetworkElementvulnerabilities.

• DiametersecurityasusedwithintheIMSnetwork;• ScenarioofattackofIMSnetwork:

o Radio-based,subscriberrole;o Infrastructure-based,TransmissionorRANvector;o Internal-based,attack.