10 Alexander Kolchanov Kak Nahodit I Lomat Razlichnye GSM Ustroystva Ot Detskih Chasov Do Industrialnyh Kontrollerov
10 Alexander Kolchanov Kak Nahodit I Lomat Razlichnye GSM Ustroystva Ot Detskih Chasov Do Industrialnyh Kontrollerov
10 Alexander Kolchanov Kak Nahodit I Lomat Razlichnye GSM Ustroystva Ot Detskih Chasov Do Industrialnyh Kontrollerov
GSM-devices fanboy
Telecom fanboy
Hacking methods
Plan for this talk
Several examples
Reasons to hack
Detectors
Controller Modem
Connected devices
Mobile network
Modem of alarm
Online configuration tools
Security companies
User’s device
Kaspersky Industrial Cybersecurity Conference 2019
Mobile operators employees
Attack on environment
● Caller ID check
● SMS sender check
● Bruteforce
● Default passwords, stolen passwords
● Lack of authorization
● Online configurators
● Hidden commands and passwords
● Used for required type of ● Can be used for device ● Used in mobile phones
device ● Can be used for anything ● Used in IVR systems
● Ready to be hacked, yeah ● ... ● Abandoned
● Are not sold
● Promotion is important
● Vendors can show information about clients
● Security agencies can show examples of projects
● Some companies show full list of clients
Thank you,
Aleksandr Kolchanov, [email protected]