hacking

Gone are the days of whistling a 2600 Hz tone into your rotary phone. Or the era of using redboxes to get free calls from payphones - where can you find a payphone anymore nowadays? So where have all the phreakers gone? Who even remembers what phone phreaking means, and what the significance of Cap'n Crunch cereal is?

Vietnam, like many developing countries, is a country where wireless infrastructure, cellular networks and wifi, leapfrogged traditional wired networks: telephone, cable TV. Payphones (or "cardphones" which used prepaid cards since coins were inconsistently minted and still not always accepted as legal tender in Vietnam), which became increasingly common in the late 90s, are nearly extinct in Vietnam now due to mobile phones.

Throughout the world, phone systems have been converted from analog to digital. From a phreaking standpoint, it's easier for the phone companies to secure their systems as they don't need to use in-band methods (using the channel for system operators as what's used by customers) of managing their systems. Even the cellular networks are all digital and encrypted now so you can no longer just snoop in on your neighbor's conversations using a special phone (or clone another user's ESN on the old AMPS networks). Unfortunately, this means there is no tone or sound that you can play into your mobile handset in order to get free calls or anything else.

Nowadays, free long distance calling - for decades the big prize for phreakers - is ubiquitous. PBXs are freely downloadable software that anyone can run. And we don't even need physical phones to make phone calls anymore - we have software phones using Voice over IP (VoIP) which can call the plain old telephone system or simply call other softphones on the Internet.

So what does modern phone phreaking mean?

Answer: VoIP hacking, virtual PBX hacking, voicemail hacking (not really phreaking, just unauthorized access of systems), femtocell hacking for the truly adventurous, and GSM decryption for the cryptos with a lot of computing resources.

Caller ID spoofing

Caller ID is a feature that's in all cell phones, and many land lines also have this ability to see the phone number of the person that's calling you. This is how you know to answer your mother's phone call and ignore your girlfriend's, or the other way around. But did you know you could control what number is seen by the called party?

How? Example: One way is to have a real phone company set your forwarding number, which is a fake origin, and then it will be used as your caller ID value when you call out from your (VoIP) phone. Another way is to route calls through your own PBX (Asterisk).

PBX hacking

Back in the day when PBXs were only affordable to large corporations and getting access to one meant you had great resources available to you like calling out to long distance numbers for free. But now there are cheap and even free open source virtual PBX solutions that run on normal PCs running Linux like Asterisk. And of course these can be hacked. If you're running Asterisk you run the risk of remote hackers DoSing your server or hacking the Linux server that's running Asterisk. Once they're on there they can also have their way with the PBX.

Femtocell hacking

Femtocells are stations that are set up to provide buildings or rural areas which have weak signals with access to cellular networks via internet connections. Subscribers can buy femtocells from their phone companies and set them up themselves - and can even take their femtocell with them to a foreign country (yes!) and have access to their home country's phone network without incurring roaming charges. These femtocells, whose manufacturer varies by telco, may be running Linux and may be hackable (rootable) and if so can be used to eavesdrop on calls and SMSs as well as spoof and use credits from subscribers' accounts without authorization. It's like taking over a cell tower. But not all telcos even offer these for sale and it's not enough for you to just get one from a manufacturer.

GSM encryption cracking

In the old days of cell phones you could easily listen in on calls made around you. But since GSM the call traffic is encrypted from the phone to the cell tower. However, it can be possible to crack weak A5/1 GSM encryption using something called COPACOBANA. Or you could probably use Amazon EC2 to affordably and instantly bring up the enormous CPU resources combined with some rainbow tables needed to crack the cipher. Don't assume that your mobile phone calls are secure.

Voicemail hacking

Voicemail (VMB) hacking isn't that new. And not all phone providers even offer voicemail services on their lines. But for those who do it's often easy to get into another subscriber's mailbox. Spoof your caller ID to look like theirs and often you won't be asked for any passcode to enter your voicemail. Other ways are to guess or social engineer the PIN code which you can then use to access the mailbox. Old voicemail systems used to have default codes which you could use to have fun like creating your own VMBs.

See: http://en.wikipedia.org/wiki/News_International_phone_hacking_scandal

Another kind of hacking: mobile phone rooting and modification

Generally, when I use the word "hacking" above it refers to unauthorized access of systems. But sometimes the system you want to "hack" is your own property. Mobile phones today are powerful computers running advanced software based on open source code. But it doesn't mean that the manufacturers want to give you free reign or access to what's inside. Fortunately, hacker communities exist to find holes in our phones which enable them to be "rooted" after which we can control the software running on them and by controlling the software we can control our hardware.

As always, especially in Vietnam, protect your accounts and privacy when online with an encrypted connection to a VPN.

Attachments: 

Vietnam is blessed with free wifi at nearly any cafe even if it doesn't always work as advertised, like most things in Vietnam. Vietnam is also blessed with cafes on nearly every block. So finding a wireless access point to get online is pretty easy for anyone traveling or living in Vietnam.

Hackers can see what websites you're visiting and then log into those websites as you

The problem is security. Many times cafe owners will leave their wifi access points completely open without needing a password to get on. This makes it basically trivial for a hacker to sniff the airwaves and see everything on the network. If you are on such a network you should secure your connection with an SSH tunnel or a VPN.

If they do have a password, they may be using older security schemes like WEP or WPA, rather than WPA2. Without WPA2 or more secure systems that require the network owner setting up an authentication server (too much to ask for any cafe owner) it is also possible to break the encryption.

Security setting: WPA2

For now, insist on at least WPA2. If you're setting up wifi at your house and you don't want people to sniff your traffic, use WPA2 with a long random password and be sure to change the SSID from the default network name provided by the manufacturer. (The reason that using a default SSID is less secure is that rainbow tables exist for these, making password cracking potentially easy.)

Using WPA2 means that it's harder for crackers to guess your network's password and then either use your network connection or sniff your traffic. But if you give out your password, anyone with the password can do the same. With WPA2 it's harder for other people to sniff your traffic, but there are ways (ARP poisoning) around it. You should thus still create an encrypted connection (for normal people I would recommend using a VPN) to an outside server and tunnel your traffic over that connection.

Besides sniffing your traffic, a hacker who steals your cookies can then login to websites which you're currently logged in by pretending to be your computer. So they could post on Facebook as you, send emails as you from Gmail, or worse.

MAC Address Filtering

What else can you do on your home wifi network? Since you usually know what computers you want to allow to access the wifi router, you can set it so only known computers are allowed on the network by using MAC address filtering. The MAC address the hardware address built into your wireless card or in the wireless hardware of a laptop and it's very difficult to lie about what your MAC address is so this will help keep the riff raff out.

Advanced users can install DD-WRT or OpenWRT firmwares onto their wireless access point, thus enabling tons of extra features and the ability for finer grained security controls.

Syndicate content
© 2010-2014 Saigonist.