TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

GSM Traffic and Encryption: A5/1 Stream Cipher

BHIS · 2019-11-11 · Read original ↗

ATT&CK techniques detected

3 predictions
T1573.001Symmetric Cryptography
56%
“gsm traffic and encryption : a5 / 1 stream cipher gsm traffic and encryption : a5 / 1 stream cipher ray felch / / disclaimer : be sure to use a faraday bag or cage before transmitting cellular data so you don ’ t accidentally break any laws by illegally transmitting on regulated …”
T1027Obfuscated Files or Information
50%
“implement ciphering in their protocols ( sms data completely exposed ). these vulnerabilities can potentially expose our private sms messages, personal data, and even our gps locations to the public if left unguarded. more research in this area is required to ensure our privacy r…”
T1573.001Symmetric Cryptography
44%
“authentication ) algorithm is ‘ only ’ used to facilitate authenticating that the mobile station ( ms ) has permission to be on the network. - once authenticated, the a8 ( ciphering key generating ) algorithm is ‘ only ’ used to create a unique key ( kc ), that ultimately will be…”

Summary

Ray Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated frequencies. Additionally, […]

The post GSM Traffic and Encryption: A5/1 Stream Cipher appeared first on Black Hills Information Security, Inc..