I have a friend who says that he can take down anyones mobile data connection and one day he did it while I was in the tram with him. Is it possible that someone can DDOS your mobile data connection, or hijack it or something?
-
1compare http://security.stackexchange.com/questions/143599/can-someone-take-my-wi-fi-signal-down/143608#143608 – Marcus Müller Dec 04 '16 at 13:20
2 Answers
I already answered this for WiFi.
Please read my cleaned-up version of this if you're less interested in how WiFi and cellular networks compare here, but in only the attack surface.
A lot of the things said there still apply here, I'll reduce the list to the ones that also apply to GSM/other mobile network standards:
- Physical layer attacks: Simply jam the frequency spectrum with your own signal. That signal might just be noise, but it might also be a
WiFinetwork base station of your own under heavy load, with the nodes in thatWiFimobile network being configured not to play nice with others. (depending on theWiFimobile terminal chipset, that can be extremely easy) Spectrum can only be used once!
Tool: noise source (e.g. Gunn Diode, SDR device), or normal AP- Electromagnetic sledgehammer: EMI gun. Take microwave oven oscillator, attach directive antenna, pray you don't cook someone's (your) brain, and point in the rough direction of the access point. Poof!
Tool: Microwave oven, some sheet metal, lack of regard for other people's property and own health, or extended RF knowledge- MAC and Network layer attacks: Especially for networks using
WEPA5/1 (noone should be using this anymore, but sadly...) it's easy toforge what is called deauthentication packets – and thus, to throw out stations from your WiFi.decrypt GSM calls and fake base station knowledge Tool:Aircrack-NG'sSDR+software base station, or hardware base station, or modified phones.aireplay
- Targetted jamming: As opposed to simply occupying the channel with noise or your own
WiFimobile network, you can also build a device that listens for typical WiFi packet's beginnings (preambles), and then, just shortly, interferes. Or just sends fake preambles periodically, or especially when it's silent. That way, you can corrupt selected packets, or fake channel occupancy.
Tool: Commodity off-the shelf SDR- authentication attacks: at some point, even "proper" clients for your
WiFimobile network need to register with theWiFimobile network. That mechanism can of course be forced to its knees by simply sending hundreds of authentication requests every second, from randomly generatedMAC addresseshardware IDs/IMEIs, or even from MAC addresses of clients you know (by observation) exist. There's no solution to the problem for theAPbase station – either it succumbs to the overload ofauthnetwork registrationpacketsrequests, or it starts blocking out legitimate users.
Tool:your network carda cheap mobile phone under your hardware control, 10 lines of bash scripting- Man-in-the-Middling /
access pointbase station spoofing:With anything short of WPA(2)-Enterprise, nothing proves that the access point calling itself "Toduas AP" is actually your Access Point.You might have heard of "Stingrays". If not, google is your friend. Simply operating a slightly higher-poweredaccess pointbase station with the same ID string and, if necessary at all, a fakedAP MAC address (trivial, since just a setting)operator identity, will "pull" clients away from youraccess pointreal network. Of course, if the spoofingAccess Pointbase station doesn't know thepasswordsecret keys of the network operator(only necessary if >2G), users might quickly notice (or they don't); however, noticing things don't work is nice, but doesn't help them.
Tool: arandom normal access pointany implementation of a base station. They're not expensive.
You have to realize that it's a privilege, not a right, to have your WiFi use a channel. WiFi happens in the so-called ISM bands (Industrial, Scientific, Medical usage), where operators of transmitters don't have to have an explicit license. That means it's OK for everyone to use that spectrum, as long as they don't intentionally harm other devices and are not easily damaged by interference.
So, it's absolutely legal for someone to operate a high-definition digital camera stream that occupies the whole WiFi channel. That will effectively shut down your WiFi.
Of course, it's illegal to interfere with mobile network operation. Illegality doesn't mean impossibility or a high probability of legal consequences for the attacker.
If you need something that no-one can mess with, wireless is, by definition, not the way to go.
- 5,863
- 2
- 17
- 28
(Cleaned up version of my answer that demonstrates what of the WiFi attacks apply to mobile networks, too):
- Physical layer attacks: Simply jam the frequency spectrum with your
own signal. That signal might just be noise, but it might also be a
network base station of your own under heavy load, with the nodes in that mobile network being
configured not to play nice with others. (depending on the mobile terminal
chipset, that can be extremely easy) Spectrum can only be used once!
Tool: noise source (e.g. Gunn Diode, [SDR device][1]), or normal AP - Electromagnetic sledgehammer: EMI gun. Take microwave oven
oscillator, attach directive antenna, pray you don't cook someone's
(your) brain, and point in the rough direction of the access point.
Poof!
Tool: Microwave oven, some sheet metal, lack of regard for other people's property and own health, or extended RF knowledge - MAC and Network layer attacks: Especially for networks using A5/1 (noone should
be using this anymore, but sadly...) it's easy to decrypt GSM calls and fake base station knowledge
Tool: SDR+software base station, or hardware base station, or modified phones. Targetted jamming: As opposed to simply occupying the channel with noise or your own mobile network, you can also build a device that listens for typical WiFi packet's beginnings (preambles), and then, just shortly, interferes. Or just sends fake preambles periodically, or especially when it's silent. That way, you can corrupt selected packets, or fake channel occupancy. - authentication attacks: at some point, even "proper" clients for your mobile network need to register with
the mobile network. That mechanism can of course be forced to its knees by
simply sending hundreds of authentication requests every second, from
randomly generated hardware IDs/IMEIs, or even from MAC addresses of
clients you know (by observation) exist. There's no solution to the
problem for the base station – either it succumbs to the overload of network registration requests, or it starts blocking out legitimate users.
Tool: one or a couple cheap mobile phone under your hardware control, 10 lines of bash scripting - Man-in-the-Middling / base station spoofing: You might have heard of "Stingrays". If not, google is your friend. Simply operating a slightly higher-powered base station with the same ID string and, if necessary at all, a faked operator identity, will
"pull" clients away from your real network. Of course, if the spoofing base station doesn't know the secret keys of the network operator(only necessary if >2G), users might quickly notice (or
they don't); however, noticing things don't work is nice, but
doesn't help them.
Tool: a any implementation of a base station. They're not expensive.
- 5,863
- 2
- 17
- 28