Overview
Syllabus
Intro
Intercoms today
Human curiosity...
Context
Different types of intercoms
Numeric intercoms: simplified architecture
Network architecture with M2M
Different brands market
State Of the Art: tools
GSM and GPRS: authentication
GSM and GPRS: Handover
3G/4G: advantages
Mobile interception: signal attraction A User Equipment connects to the closest Base Station
Jamming is generally basic...
GSM Lab setup: for interception
Intercom setup: configuration
First impressions
Attacker steps to open the door
To trap the intercom
What's next? Let's backdoor it!
Call premium rate numbers
Attack vectors with M2M Intercoms
Bruteforce accounts
Enumerated accounts
Attack scenarios
Reverse look-up directories
Connecting to the M2M network
Traceroute in the M2M virtual network
Conclusion
Security recommendations for M2M solutions
Taught by
Cooper