
Mobile Banking Vulnerabilities Through CDMA and GSM Networks
Explore the vulnerabilities of mobile banking through CDMA and GSM networks, including session hijacking, cloning, and rogue base station risks. Learn about authentication methods, SMS and IVR solutions, and potential security threats to mobile subscribers.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Vulnerabilities of Mobile Banking Through CDMA and GSM By Adam Suchocki Mercy College IASP560 Dr. Yoon
CDMA Network and Algorithm Uses ESN and MIN for authentication with BTS and MS FCM Algorithm G(X) = x42 + X35 + X33 + X31 + X27 + X26 + X25 + X22 +X21 + X19 + X18 + X17 + X16 + X10 + X7+ X6 + X5+ X3+X2+ X1+ 1
GSM Network and Algorithm Uses SIM card for authentication with BTS and MS XRES=A3 (RAND, Ki) Kc=A8 (RAND, Ki) RAND encryption method
Banking Network SMS based solution is available for GSM subscribers IVR solution is available to all subscribers Mobile Network can either be CDMA or GSM
Vulnerabilities Session Hijacking Snarfing Bluejacking SIM card cloning ESN / MIN identification
Rogue Base Station Forward link has no authentication Mobiles lock to false outbound Cell phone suppressor Test equipment (ESN readers)
Cloning Replace legit ESN with snarfed ESN Reprogram MIN Extension phones Rewrite phone firmware (Chip in lower left corner is conveniently socketed)
Session Hijacking Overpower base station during legitimate call Use cell phone test mode to match Supervisory Audio Tone (SAT) Flashhook and place another call