Ho un amico che dice che può prendere qualsiasi connessione dati mobile e un giorno lo ha fatto mentre ero in tram con lui. È possibile che qualcuno possa DDOS la tua connessione dati mobile, o dirottarla o qualcosa del genere?
Ho un amico che dice che può prendere qualsiasi connessione dati mobile e un giorno lo ha fatto mentre ero in tram con lui. È possibile che qualcuno possa DDOS la tua connessione dati mobile, o dirottarla o qualcosa del genere?
Ho già risposto questo per WiFi.
Leggi la mia versione pulita di questo se sei meno interessato a come WiFi e reti cellulari si confrontano qui, ma solo nella superficie di attacco.Molte delle cose dette qui rimangono valide, ridurrò la lista a quelle che si applicano anche agli standard GSM / altri standard di rete mobile:
- Physical layer attacks: Simply jam the frequency spectrum with your own signal. That signal might just be noise, but it might also be a
WiFinetwork base station of your own under heavy load, with the nodes in thatWiFimobile network being configured not to play nice with others. (depending on theWiFimobile terminal chipset, that can be extremely easy) Spectrum can only be used once!
Tool: noise source (e.g. Gunn Diode, SDR device), or normal AP- Electromagnetic sledgehammer: EMI gun. Take microwave oven oscillator, attach directive antenna, pray you don't cook someone's (your) brain, and point in the rough direction of the access point. Poof!
Tool: Microwave oven, some sheet metal, lack of regard for other people's property and own health, or extended RF knowledge- MAC and Network layer attacks: Especially for networks using
WEPA5/1 (noone should be using this anymore, but sadly...) it's easy toforge what is called deauthentication packets – and thus, to throw out stations from your WiFi.decrypt GSM calls and fake base station knowledge Tool:Aircrack-NG'sSDR+software base station, or hardware base station, or modified phones.aireplay
- Targetted jamming: As opposed to simply occupying the channel with noise or your own
WiFimobile network, you can also build a device that listens for typical WiFi packet's beginnings (preambles), and then, just shortly, interferes. Or just sends fake preambles periodically, or especially when it's silent. That way, you can corrupt selected packets, or fake channel occupancy.
Tool: Commodity off-the shelf SDR- authentication attacks: at some point, even "proper" clients for your
WiFimobile network need to register with theWiFimobile network. That mechanism can of course be forced to its knees by simply sending hundreds of authentication requests every second, from randomly generatedMAC addresseshardware IDs/IMEIs, or even from MAC addresses of clients you know (by observation) exist. There's no solution to the problem for theAPbase station – either it succumbs to the overload ofauthnetwork registrationpacketsrequests, or it starts blocking out legitimate users.
Tool:your network carda cheap mobile phone under your hardware control, 10 lines of bash scripting- Man-in-the-Middling /
access pointbase station spoofing:With anything short of WPA(2)-Enterprise, nothing proves that the access point calling itself "Toduas AP" is actually your Access Point.You might have heard of "Stingrays". If not, google is your friend. Simply operating a slightly higher-poweredaccess pointbase station with the same ID string and, if necessary at all, a fakedAP MAC address (trivial, since just a setting)operator identity, will "pull" clients away from youraccess pointreal network. Of course, if the spoofingAccess Pointbase station doesn't know thepasswordsecret keys of the network operator(only necessary if >2G), users might quickly notice (or they don't); however, noticing things don't work is nice, but doesn't help them.
Tool: arandom normal access pointany implementation of a base station. They're not expensive.
You have to realize that it's a privilege, not a right, to have your WiFi use a channel. WiFi happens in the so-called ISM bands (Industrial, Scientific, Medical usage), where operators of transmitters don't have to have an explicit license. That means it's OK for everyone to use that spectrum, as long as they don't intentionally harm other devices and are not easily damaged by interference.
So, it's absolutely legal for someone to operate a high-definition digital camera stream that occupies the whole WiFi channel. That will effectively shut down your WiFi.
Ovviamente, è illegale interferire con le operazioni della rete mobile. Illegalità non significa impossibilità o alta probabilità di conseguenze legali per l'aggressore.
If you need something that no-one can mess with, wireless is, by definition, not the way to go.
(versione ripulita di la mia risposta che dimostra cosa si applica agli attacchi WiFi anche per le reti mobili ) :
Leggi altre domande sui tag mobile denial-of-service cellular