SS7 Attacks
BlogAuthorTelcoSec
  • SS7 Stack Overview
  • 🔥Thoughts4U
  • SS7 Roaming Agreement
  • SS7 Vulnerabilities (Theory)
    • Subscriber information disclosure
    • Network information disclosure
    • Subscriber traffic interception
    • Fraud
    • Denial of service
  • 😇SMS Attacks
    • Intro
    • SMS Attacks
    • Call and SMS Interception
    • SMS protocol messages
  • Location Disclosure
    • Location Tracking
    • ATI - Any Time Interrogation
    • 🔥Call Setup Messages
  • Documentation
    • SS7 VULNERABILITIES AND ATTACK EXPOSURE REPORT 2018
  • Videos
    • Mobile Self Defense
    • SS7map : mapping vulnerability of the international mobile roaming infrastructure
    • GRX Attacks: Advanced interconnect Attacks
    • Locating mobile phones using SS7
    • Rooting SIM cards
Powered by GitBook
On this page

Was this helpful?

  1. Videos

SS7map : mapping vulnerability of the international mobile roaming infrastructure

PreviousMobile Self DefenseNextGRX Attacks: Advanced interconnect Attacks

Last updated 8 months ago

Was this helpful?

SS7 has been shown repeatedly as an insecure protocol: spoofing, faking, crash through fuzzing, fraud.

The main question of our study is to determine how this insecurity is mitigated by network operator’s action to prevent compromise on both network exposure of infrastructure and privacy compromise of subscribers.

It's why we wanted to come out with SS7map.

The study focuses on addressing the vulnerabilities of the SS7 protocol, which is prone to attacks like spoofing and fraud.

It examines network operators' methods to secure their networks and protect subscribers' privacy.

The SS7map initiative aims to enhance understanding of these security issues.