Top Banner
TETRA Networks Security Tomáš Suchan, Marek Sebera ITDS Consulting
26

TETRA Networks Security

Apr 16, 2017

Download

Technology

Marek Sebera
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TETRA Networks Security

TETRA Networks SecurityTomáš Suchan, Marek Sebera

ITDS Consulting

Page 2: TETRA Networks Security

Schedule

● Introduction● What is TETRA● Who does use TETRA● Security options● Dangerous decisions● Demo● Q & A

Page 3: TETRA Networks Security

Introduction - ITDS Consulting

● Tomáš Suchan, Marek Sebera● Based in Prague● https://www.itds-consulting.cz● TETRA, GSM, TETRAPOL, DMR● TETRA Toolkit - Monitoring and forensic tool● GSM Toolkit - Mobile networks security tool

Page 4: TETRA Networks Security

What is TETRA

● TErrestrial Trunked RAdio● Designed by ETSI since 1990● Mission-Critical Digital Radio System● Private / Professional Mobile Radio (PMR) ● DAMM, Sepura, Rohde & Schwarz, EADS, Motorola, …● Transport, Airports, Police/Fire/Ambulance, Army, …● SCADA systems (nuclear plants, power stations, …)

Page 5: TETRA Networks Security
Page 6: TETRA Networks Security
Page 7: TETRA Networks Security

WORLDTETRAUSAGE

Page 8: TETRA Networks Security

TETRA - Czech Republic

Praha, Brno, Liberec, České Budějovice, Chemopetrol Litvínov, Hyundai Nošovice, Pardubice, Přerov, ...

Radio Band:410MHz - 430MHz

Page 9: TETRA Networks Security

Slovak Republic

● TETRAPOL● Project: SITNO - Ministerstvo Vnútra SK● Built in years 1999 - 2008● Working since 2008● Firefighters, Police, Customs, 112 Emergerency

Page 10: TETRA Networks Security

Disclaimer

● Properly secured TETRA network is hard to crack

● We’re talking about unsecured or badly secured networks

Page 11: TETRA Networks Security

TETRA Network Security

● Transport Air-Interface encryption

● SwMI (Infrastructure) Restrict MS by TEI + ISSI combo

● Application End-to-End transport encryption

Page 12: TETRA Networks Security

Attacks on TETRA

Page 13: TETRA Networks Security

Missing Air-Interface Encryption

We can:

● Read text / binary data (SDS)● Decode voice transports (even Group Calls)● Map network structure● Identify users, clients, applications● Intercept (MITM) communication● Fake both directions of data transport

Page 14: TETRA Networks Security

No Air-Interface Encr. , TEI + ISSI registration restricted

We can still do everything, it’s just bit harder :-)

Page 15: TETRA Networks Security

Missing Air-Interface Encryption, added E2E encryption

● Correlate communication groups● Map infrastructure● Scan / Penetrate application endpoints● Communication fuzzing and DoS attacks

Page 16: TETRA Networks Security

Only Air-Interface encrypted

● Obtain auth key for network● ???● PROFIT

Page 17: TETRA Networks Security

Only Air-Interface encrypted (ver 2)

● Build 80-bit TEA (symmetric stream cipher) cracker● Obtain auth key for network● ???● PROFIT

Page 18: TETRA Networks Security

Recommendation

● Encrypt Air-Interface● Use End-to-End encryption● Don’t skimp on security

Page 19: TETRA Networks Security

Tetra Toolkit ® ITDS Consulting

● Requirements○ 4-core 2.5GHz computer, 8GB DDR3○ RTL-SDR USB dongle○ Linux OS

● Attack time < few minutes● Decode voice, text and data communication● Map infrastructure,

Page 20: TETRA Networks Security

Attack Demo

Page 21: TETRA Networks Security

Thanks to our Partners

Page 22: TETRA Networks Security
Page 23: TETRA Networks Security
Page 24: TETRA Networks Security
Page 25: TETRA Networks Security

Questions & Answers

Page 26: TETRA Networks Security

TETRA Networks SecurityThank you !