{"id":368,"date":"2017-01-18T13:41:29","date_gmt":"2017-01-18T13:41:29","guid":{"rendered":"http:\/\/www.inguardians.com\/?p=53"},"modified":"2018-11-30T21:09:07","modified_gmt":"2018-11-30T21:09:07","slug":"somebody-is-securing-samsung-wireless-network-extenders","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/blog\/somebody-is-securing-samsung-wireless-network-extenders\/","title":{"rendered":"Somebody Is Securing Samsung Wireless Network Extenders"},"content":{"rendered":"
Original Post Author: Don C. Weber [Twitter: @cutaway<\/a>] Black Hat USA 2013 will include a presentation by Tom Ritter and Doug DePerry titled: “I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell.”<\/a> This should be a very interesting talk and I cannot wait to watch the video. Recently, Jay Radcliffe (@jradcliffe02<\/a>) and I had the same \u201cFemtocell Interception\u201d idea for a recent assessment involving devices that leverage a cellular back-haul for connectivity to field devices. We figured that with some work we could monitor the network traffic flowing through the Femtocell device and potentially even act as one of the devices on the cellular network. Our primary goal would be to validate network security such as a Virtual Private Network (VPN) connection or, in the absence of one, to determine if we could intercept and potentially inject our own data onto this network.<\/p>\n In order to accomplish this we were provided with a pair of Verizon Femtocell devices. We figured that these devices would be based on some type of embedded Linux and, with a little work we would be able to gain access to the operating system as an administrator. Verizon sent the Verizon Wireless Network Extender (Extender) which is really just a Samsung SCS-2U01 (as seen in Figure 0x00). Now, to be clear, our goal was to have a working Extender to conduct our other testing. The Extenders we received from Verizon would be the only devices we would get. Thus, it wasn’t an option to perform destructive testing that could upset the integrity of the devices. We needed the Extenders to connect to the Verizon network and function normally for the testing of our actual assessment targets.<\/p>\n
\nOriginal Date Published: 03 June 2013<\/p>\n