contact@p1sec.com

SS7 Security Perimeters and INAT0 NAT0 NAT1 definitions

While P1 Security professional services team are busy deploying Core Network security monitoring with PTM Signaling IDS on SS7, Diameter, GTP, SIP IMS VoLTE, and Radius, one question keeps coming back: the concept of Network Perimeter in SS7. This recurring misunderstood aspect...
Read More…

SS7 Security Perimeters and INAT0 NAT0 NAT1 definitions

While P1 Security professional services team are busy deploying Core Network security monitoring with PTM Signaling IDS on SS7, Diameter, GTP, SIP IMS VoLTE, and Radius, one question keeps coming back: the concept of Network Perimeter in SS7. This recurring misunderstood aspect...
Read More…

P1 Security Vulnerability Knowledge Base reaches vulnerability #1000 (P1VKB#1000)

The number of referenced vulnerabilities in our unique telecom-specific Vulnerability Knowledge Base has just reached #1000. This is a very Important Milestone in P1 Security’s research in critical networks security. P1 Security’s VKB is a rare case of a private...
Read More…

[31C3] SS7map : mapping vulnerability of the international mobile roaming infrastructure at #31C3

Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014. The conference “SS7map : mapping vulnerability of the international mobile roaming...
Read More…

[31C3] SS7map : mapping vulnerability of the international mobile roaming infrastructure at #31C3

Laurent Ghigonis and Alexandre De Oliveira from P1 Security team will be presenting the work done on the global SS7 network at Chaos Computer Conference in Hambourg the 27th Dec 2014. The conference “SS7map : mapping vulnerability of the international mobile roaming...
Read More…

P1 Security research cited by Washington Post

In a recent article, The Washington Post has cited P1 Security’s research on SS7 and GRX, explaining the problems and risks to operators and subscribers linked to interests from various parties including Intelligence Agencies and the global Intelligence Community (IC). This...
Read More…

[Hackito Ergo Sum 2014] Worldwide attacks on SS7/SIGTRAN network

We are pleased to announce that P1 Security was present at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/). Worldwide attacks on SS7/SIGTRAN network from P1Security Download slides here. Abstract: Mobile telecommunication networks are complex and...
Read More…

[Hackito Ergo Sum 2014] Worldwide attacks on SS7/SIGTRAN network

We are pleased to announce that P1 Security was present at the Hackito Ergo Sum 2014 conference in Paris (http://2014.hackitoergosum.org/). Worldwide attacks on SS7/SIGTRAN network from P1Security Download slides here. Abstract: Mobile telecommunication networks are complex and...
Read More…

P1 Security cited by press as leading security improvement in GRX and GPRS networks

P1 Security is being cited for its leading role in advancing security in GRX in press articles and interviews. In security conferences such as Troopers and HITB Malaysia, Philippe Langlois has since 2011 shown several attacks on GRX and GPRS networks. P1 Security will be hosting...
Read More…

Diameter vs SS7 from a security perspective

On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side: From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy...
Read More…

Diameter vs SS7 from a security perspective

On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side: From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy...
Read More…

Rising risk and importance of the vendor backdoors

Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the recent network storage equipment backdoors (HP Keeps Installing Secret Backdoors in Enterprise Storage), the...
Read More…

Rising risk and importance of the vendor backdoors

Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the recent network storage equipment backdoors (HP Keeps Installing Secret Backdoors in Enterprise Storage), the...
Read More…

Rising risk and importance of the vendor backdoors

Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the recent network storage equipment backdoors (HP Keeps Installing Secret Backdoors in Enterprise Storage), the...
Read More…

Huawei reverse engineering: legacy and new network elements surprises

Sometime, reverse engineering for bug hunting reveals some fun stuff. So of course, when you’re dealing with Core Network elements such as Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000, you don’t expect to find these Chinese ASCII arts of an octopus being killed by...
Read More…
12