#hidden blog

SS7 Pentesting Toolkit

     The toolkit is build upon the Osmocom SS7 stack and implements some basic MAP messages. At its current state tests against the HLR are ready for use, in future versions tests against VLR, MSC and SMSCwill follow. The tool is written in Erlang; to get it running you will need the Erlang runtime environment. It is developed for version 17.5.


Signalling System No. 7 (SS7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the world’s public switched telephone network (PSTN) telephone calls. It also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other mass market services.








    As you can see in the picture, the demonstrated test cases for the HLR respond to most of the MAP messages regardless the fact that we are not registered as valid provider. The tool is not configured as a serving MSC nor a roaming contractor. Some of the information gathered can be seen as critical, as the MSISD -> IMSI resolution, the over-the-air crypto keys or the ability to create supplementary services e.g. call forwarding.


The messages and test cases are gathered from public SS7 research of the last years (see 1, 2) and check for known weaknesses in the SS7 domain. The tool itself was developed under a cooperation with the Belgium provider Proximus and aims to test the secure configuration of the internal and external SS7 network access. Thanks a lot for giving us the opportunity here, we are convinced that the tool gives the research community but also telecommunication providers a new, important and (especially) open-source-based possibility for SS7 testing.




Get it running


You will need:


Erlang. Get it from your repo or from http://www.erlang.orgRebar. Get it from your repo or from https://github.com/rebar/rebarThe code (;git clone https://github.com/ernw/ss7MAPer The dependenciescd ss7MAPer rebar get-deps Patch the dependenciescd deps/osmo_map patch -p1 < ../../patches/osmo_map.patch cd ../osmo_sccp patch -p1 < ../../patches/osmo_sccp.patch cd ../osmo_ss7 patch -p1 < ../../patches/osmo_ss7.patch Get the deps to build (; This is not as easy as it might sound, I needed to:

Patch the epacp/rebar.config and replace

{port_envs, [ {"DRV_CFLAGS", "-g -Wall $ERL_CFLAGS"}, {"DRV_LDFLAGS", "-lpcap $ERL_LDFLAGS"} ]}. 


with


{port_envs, [ {"CFLAGS", "-g -Wall $ERL_CFLAGS"}, {"LDFLAGS", "-lpcap $ERL_LDFLAGS"} ]}. 


Another dependency is not covered by rebar, so you need to fetch it manually:


cd deps git clone http://cgit.osmocom.org/erlang/signerl/ 


Build the ASN.1 source files:


cd deps/signerl/TCAP/asn_src/ITU make 


Copy the ASN.1 files to osmo_sccp:


cp deps/signerl/TCAP/asn_src/ITU/*rl deps/osmo_sccp/src/ 


Also the osmo libs have dependencies on each other and some other deps are shared, so I created some symlinks:


mkdir deps/osmo_sccp/deps ln -sd ../../osmo_ss7 deps/osmo_sccp/deps/osmo_ss7 ln -sd ../../epcap deps/osmo_sccp/deps/epcap ln -sd ../../pkt deps/osmo_sccp/deps/pkt ln -sd ../../signerl/MAP deps/osmo_sccp/deps/MAP ln -sd ../../signerl/SCCP deps/osmo_sccp/deps/SCCP ln -sd ../../signerl/TCAP deps/osmo_sccp/deps/TCAP mkdir deps/osmo_map/deps ln -sd ../../osmo_ss7 deps/osmo_map/deps/osmo_ss7 ln -sd ../../epcap deps/osmo_map/deps/epcap ln -sd ../../pkt deps/osmo_map/deps/pkt 


And copy some files in place:


cp deps/signerl/SCCP/itu/include/sccp.hrl deps/osmo_sccp/src/ cp deps/signerl/TCAP/include/tcap.hrl deps/osmo_map/src/ Build the coderebar co 




The config file


The config file is split in 4 section, sctp, m3ua, sccp and target.


In the sctp section source and destination ip as well as source and destination port of the SCTP connection are configured.


In the m3ua section all the M3UA parameters, like local and remote point code are configured.


In the sccp section currently only the local (or source) global title needs to be configured.


Last but not least in the targetsection information about the tested environment need to be configured, like the global title of the HLR, or the MSISDN of the tested phone.


Be sure to modify it to your needs.




Running the tool


To run the tool one needs to start a rebar shell:


cd ss7MAPer rebar shell 


Then the SIGTRAN connection needs to be established:


Pid = ss7test_app:start(1, "./configfile"). 


If everything is set up correctly the m3ua connection comes up.


To run the HLR tests, simply enter:


Pid ! {test_hlr}.

Comments

Popular Posts