< Return to Video

35C3 - Compromising online accounts by cracking voicemail systems

  • 0:00 - 0:18
    35C3 preroll music
  • 0:18 - 0:25
    Herald Angel: We start the next talk. It's
    by Martin Vigo. He stands here. He is a
  • 0:25 - 0:32
    product security lead and researcher and
    he's responsible for mobile security,
  • 0:32 - 0:40
    identity, and authentication. So he helps
    people design and secure systems and
  • 0:40 - 0:47
    applications. And he has worked on stuff
    like breaking password managers or
  • 0:47 - 0:58
    exploiting Apple's FaceTime to create a
    spy... yeah, a spy program. So give him a
  • 0:58 - 1:09
    warm applause for his talk.
    Applause
  • 1:09 - 1:13
    Martin Vigo: Thank you for joining me in
    this talk. I'm super excited to be here.
  • 1:13 - 1:16
    It's actually my second year at the
    conference, so super super excited that
  • 1:16 - 1:20
    the first year I was sitting there, and
    the second year I'm sitting here. This is
  • 1:20 - 1:25
    me, but an introduction was already made.
    Just pointing out that this is me, 9 year
  • 1:25 - 1:33
    old, with an Amstrad CPC 6128. You had
    this machine before? I see only one hand?
  • 1:33 - 1:36
    I think this was sold in Europe, but I was
    playing here La Abadía del crímen, which
  • 1:36 - 1:41
    is the best video game ever written. If
    you guys like abandonware, you should
  • 1:41 - 1:45
    definitely check it out. So like any good
    research we have to start by looking at
  • 1:45 - 1:50
    previous art, right? We can learn a lot
    from researchers that did stuff in the
  • 1:50 - 1:56
    past. And in this case I went all the way
    back to the 80s to understand how freakers
  • 1:56 - 2:00
    of the time, when the hacking thing
    started, we're doing to actually hack into
  • 2:00 - 2:06
    voicemail systems. I condensed everything
    I learned in five different paragraphs of
  • 2:06 - 2:12
    five different essences, that I actually
    got from frac website, which is an amazing
  • 2:12 - 2:17
    resource. So, here from the Hacking
    Telephone Answering Machines, the
  • 2:17 - 2:21
    paragraph that I extracted was that "You
    can just enter all 2-digit combinations
  • 2:21 - 2:25
    until you get the right one", "A more
    sophisticated and fast way to do this is
  • 2:25 - 2:29
    to take advantage of the fact that such
    machines typically do not read two numbers
  • 2:29 - 2:33
    at a time, and discard them, but just look
    for the correct sequence". What is this
  • 2:33 - 2:42
    about? In older voicemail systems if you
    will enter like 1234 for the 2-digit PIN,
  • 2:42 - 2:48
    it will not process 12 and 34 to to verify
    the PIN, but it will also process 23,
  • 2:48 - 2:52
    which is very interesting. In fact, in
    Hacking AT&T Answering Machines, again,
  • 2:52 - 2:57
    this is amazing from their 90s or 80s, we
    actually get the correct sequence to cover
  • 2:57 - 3:01
    the entire 2-digit key space. So, if you
    enter all these, you are basically brute
  • 3:01 - 3:06
    forcing the entire key space, without
    having to enter in the entire thing that
  • 3:06 - 3:12
    covers it. I also learned, from A Tutorial
    of Aspen Voice Mailbox Systems, that in
  • 3:12 - 3:16
    the 80s there was default passwords.
    Surprise, surprise! But also that as
  • 3:16 - 3:22
    humans, we actually have patterns when we
    choose PINs. And so we have the classics:
  • 3:22 - 3:28
    1111, 9999, 1234. And another thing that I
    learned in Hacking Answering Machines in
  • 3:28 - 3:33
    the 90s, was that "There is also the old
    'change the message' secret to make it say
  • 3:33 - 3:37
    something to the effect of this line
    accepts all toll charges so you can bill
  • 3:37 - 3:42
    third party calls to that number". This is
    basically a trick used by inmates to get
  • 3:42 - 3:46
    free calls. Basically, they would record
    in the voicemail a greeting message "yes,
  • 3:46 - 3:50
    yes, yes", so when the automated system
    comes in and asks "Do you want to accept
  • 3:50 - 3:54
    the toll charges from the call from the
    penitentiary, it will go and they will be
  • 3:54 - 4:00
    able to do free calls. So, condensing
    everything and summarizing what what I
  • 4:00 - 4:04
    learned from looking at what previous
    hackers did in the 80s: we know that the
  • 4:04 - 4:09
    voicemail system security looked like...
    there was default PINs, there was common
  • 4:09 - 4:13
    PINs, there was bruteforceable PINs, there
    was efficient bruteforcing because we can
  • 4:13 - 4:17
    enter multiple PINs at the same time, that
    the greeting message is actually an attack
  • 4:17 - 4:21
    vector. So let's play a game. Let's do
    checklist and let's look at the voicemail
  • 4:21 - 4:27
    security today. So, I looked at the
    American carriers because I live in the
  • 4:27 - 4:32
    US, but because I was invited to talk in
    Germany, I took some friends to give me
  • 4:32 - 4:37
    some SIM cards and I actually wanted to
    put about German carriers as well. So,
  • 4:37 - 4:41
    checklist time, default PINs: all American
    carriers do have default PINs and
  • 4:41 - 4:46
    unfortunately they are really not a secret
    because most of them is actually the last
  • 4:46 - 4:51
    digits of your phone number. When it comes
    to German carriers it's actually a much
  • 4:51 - 4:55
    better state, for example Vodaphone it's
    the last 4 digits of the client number
  • 4:55 - 5:00
    which you don't know. I mean, you know as
    the customer, not others, it's a secret.
  • 5:00 - 5:04
    Or if it comes to the CallYa, that is the
    card that I got, it's the last 4 digits of
  • 5:04 - 5:07
    the PUK. For Telekom it's the last 4
    digits of the card number, which is the
  • 5:07 - 5:12
    card you get with the SIM card. For O2,
    unfortunately, there is a default PIN,
  • 5:12 - 5:18
    which is 8705, which is the only PIN you
    can't set, when you choose to set one.
  • 5:18 - 5:24
    Yeah. So, voicemail security today when it
    comes to common PINs: according to like a
  • 5:24 - 5:28
    fantastic research from Data Genetics,
    this is actually about people choosing
  • 5:28 - 5:34
    PINs for their credit cards, but there was
    a lot of conclusions that I learned from
  • 5:34 - 5:38
    this research and basically, to summarize
    the most important regarding this work, is
  • 5:38 - 5:45
    that for example by trying the top 20 most
    common PINs, you have a 22 percent chance
  • 5:45 - 5:50
    of getting the right one. What this means
    in other words is for every fourth victim
  • 5:50 - 5:54
    that I tried to brute force the PIN from
    their voicemail system, I will get it
  • 5:54 - 5:58
    right every fourth person. There are other
    conclusions that are very interesting
  • 5:58 - 6:09
    like, the PINs mostly start by 19. Who has
    an idea why is that? Birth year, right? Is
  • 6:09 - 6:14
    very common to set as your birth year.
    Most of us were born in the 20th
  • 6:14 - 6:20
    century... to set it as a PIN.
    Bruteforceable PINs. Same thing in Germany
  • 6:20 - 6:25
    and in the US, it accepts 4-digit PINs
    which, we will see later, is just not
  • 6:25 - 6:30
    enough key space. Efficient bruteforcing
    all the carriers accept concatenation of
  • 6:30 - 6:35
    payload. So, in this case I use it to try
    different PINs and I don't even have to
  • 6:35 - 6:39
    wait for error messages. I just use the
    pound as kind of like an enter in a
  • 6:39 - 6:43
    voicemail system and I can try three PINs
    at a time. Usually carriers will hang up
  • 6:43 - 6:47
    when you enter three PINs wrong, for
    security purposes, but we will take
  • 6:47 - 6:52
    advantage of that. So with everything that
    I learned from the 80s, I verified that it
  • 6:52 - 6:57
    was still a problem today. I decided to
    write a tool that allows you to brute
  • 6:57 - 7:02
    force voicemail system fast, cheap,
    easily, efficiently, and undetected. So,
  • 7:02 - 7:08
    fast: I used Twilio... who is familiar
    with Twilio here? Some of you? So a Twilio
  • 7:08 - 7:12
    is basically an online services that
    allows you to programmatically interact
  • 7:12 - 7:15
    with phone calls. You can make phone
    calls, interact with them, and all that.
  • 7:15 - 7:19
    So I use it to launch hundreds and
    hundreds of calls at the same time in
  • 7:19 - 7:24
    order to brute force PINs. It's cheap! The
    entire 4-digit keyspace costs 40 dollars.
  • 7:24 - 7:29
    So if I want to have a 100 percent chance
    of getting your 4-digit PIN, I only have
  • 7:29 - 7:33
    to pay 40 bucks. A 50 percent chance,
    according to the research from Data
  • 7:33 - 7:37
    Genetics, it will cost me five dollars. So
    once every two victims, I will get the
  • 7:37 - 7:41
    PIN. Actually, if I want to take a
    different approach and instead of just
  • 7:41 - 7:47
    trying to brute force only yours, I want
    to brute force the PIN from everyone here,
  • 7:47 - 7:51
    according to Data Genetics, and in this
    case, according to the fact that that is
  • 7:51 - 7:55
    default PINs... I'm not going to ask how
    many of you have O2, now that they know
  • 7:55 - 7:58
    that there is a default PIN to their
    voicemail system. It will be more
  • 7:58 - 8:03
    interesting to actually try a thousand
    phone numbers for that default PIN for O2
  • 8:03 - 8:08
    customers, only for 13 dollars. It's easy:
    fully automated, the tool does everything
  • 8:08 - 8:12
    for you, you just have to provide the
    victim number, the carrier, and couple
  • 8:12 - 8:16
    other parameters and it's efficient! It
    optimizes brute forcing, I use the
  • 8:16 - 8:21
    research from Data Genetics to favor the
    PINs that are most common, and obviously
  • 8:21 - 8:25
    it tries different PINs and all that
    stuff. But the most important here is
  • 8:25 - 8:29
    detection, because think about it. In
    order for me to interact with your
  • 8:29 - 8:33
    voicemail system I need to call you and
    you cannot pick up, because if not, it
  • 8:33 - 8:37
    doesn't go to the voicemail system. So I
    was trying to find ways, because I need
  • 8:37 - 8:42
    to, in the end, make a lot of calls,
    trying different PINs. How can I interact
  • 8:42 - 8:46
    directly with your voicemail? I try call
    flooding like basically doing three calls
  • 8:46 - 8:50
    at a time, because the line gets flooded
    just with three calls, it goes directly to
  • 8:50 - 8:54
    the voicemail, but it wasn't very
    reliable. You can use OSINT techniques, a
  • 8:54 - 8:57
    lot of people likes to tweet that they,
    you know, they go on a trip, they are
  • 8:57 - 9:02
    about to board a plane, so it goes into
    airplane mode, or you go in a remote area,
  • 9:02 - 9:07
    or you are in a movie theater, or at night
    you put in Do Not Disturb. Those are all
  • 9:07 - 9:12
    situations in which calls go directly to
    the voicemail. You can use HLR database to
  • 9:12 - 9:18
    find out if mobile devices are
    disconnected or the SIM cards have been
  • 9:18 - 9:22
    discarded, but they are still assigned to
    an account. And you can use online
  • 9:22 - 9:26
    services like realphonevalidation.com
    which I actually reached out and they
  • 9:26 - 9:30
    provide services that allow you to know if
    a phone is acutally connected to a tower
  • 9:30 - 9:35
    at the moment, so it's basically
    available, so you could use that too. You
  • 9:35 - 9:41
    can also use class 0 SMS, which gives you
    feedback. It's basically a type of SMS
  • 9:41 - 9:46
    that will... it has more priority and will
    basically display on the screen and you'll
  • 9:46 - 9:50
    get the feedback if it was displayed. So,
    that's a nice trick to find out if the
  • 9:50 - 9:55
    phone actually connected to a tower. But
    in reality, I wanted a bullet proof way to
  • 9:55 - 9:59
    do this and in the U.S. I found that there
    is this concept of backdoor voice mail systems.
  • 9:59 - 10:03
    So instead of me calling you, I'm going to
    call one of these services that you guys
  • 10:03 - 10:08
    have listed here for every carrier and
    there I enter the number, in this case the
  • 10:08 - 10:12
    number of the victim from the voicemail I
    want to interact to. And of course it
  • 10:12 - 10:16
    allows you to access to the logging
    prompt. Actually in Germany I find it
  • 10:16 - 10:20
    interesting that you guys have it as a
    service, because in the US it's more a
  • 10:20 - 10:25
    secret that I had to found using Google,
    but here... Basically if I dial your phone
  • 10:25 - 10:28
    number and when it comes to Vodafone
    between the area code and the rest of the
  • 10:28 - 10:34
    number I put 55, or for Telekom 13, or for
    O2 33, I directly go to the voicemail, you
  • 10:34 - 10:37
    won't ring your phone. So I can use that.
    Who was aware of this, that is from
  • 10:37 - 10:42
    Germany? OK, many of you. So that's what I
    thought. Like here it's not really like
  • 10:42 - 10:47
    something you guys care too much about. In
    the U.S. it's actually used a lot for
  • 10:47 - 10:53
    scammers or to leave directly voicemail
    messages from spammers as well. So,
  • 10:53 - 10:57
    voicemailcracker actually takes advantage
    of backdoor numbers, so it allows you to
  • 10:57 - 11:00
    be undetected. I don't need to call you, I
    don't need to wait till you are flying, I
  • 11:00 - 11:04
    can do that. And for example for the U.S.
    it's great, because when I launch that
  • 11:04 - 11:09
    many calls, the line gets flooded even if
    you are offline. But when I use these
  • 11:09 - 11:15
    backdoor voicemail systems, because they
    are meant to be used by everyone, those
  • 11:15 - 11:19
    don't get flooded. So I literally make
    hundreds and hundreds of calls and it
  • 11:19 - 11:25
    never fails.So, but you know like
    carriers, or some of them, add a brute
  • 11:25 - 11:29
    force protections, right? So that you
    can't actually launch brute forcing
  • 11:29 - 11:33
    attacks. And I looked at the German
    carriers and for example Vodafone, I saw
  • 11:33 - 11:38
    that it resets the 6 digit PIN and sends
    it over SMS. So, I guess I can flood your
  • 11:38 - 11:41
    phone with text but who cares, that's not
    a big deal, but I think it's actually a
  • 11:41 - 11:46
    pretty effective measure against
    voicemail... against brute forcing.
  • 11:46 - 11:49
    Telekom blocks the Caller ID from
    accessing the mailbox or even leaving
  • 11:49 - 11:53
    messages. I tried and after six times that
    it's wrong every time, I call it says
  • 11:53 - 11:57
    "Hey, you can't do anything", and it hangs
    up. And for O2 it connects directly to the
  • 11:57 - 12:01
    customer help-line, but someone started
    talking German and my German is not that
  • 12:01 - 12:08
    good. So brute force, I wanted to be able
    to bypass this writing and so if you look
  • 12:08 - 12:13
    at telecom I mentioned that it blocks the
    caller I.D. but it turns out that Twilio
  • 12:13 - 12:17
    you can actually buy caller IDs you can,
    well, you can buy phone numbers, right?
  • 12:17 - 12:23
    and they are really cheap. So it's very
    easy for me to do randomization of caller
  • 12:23 - 12:28
    I.D.s for very very cheap and bypass
    telecom's brute force protection. So
  • 12:28 - 12:33
    voicemailcracker also supports that. It
    supports caller ID randomization. So let's
  • 12:33 - 12:38
    make the first demo. So as you can see
    here on the left is the victim's mobile
  • 12:38 - 12:44
    device, and on the right is the tool. And
    in this case I'm going to use the brute
  • 12:44 - 12:48
    force option. The brute force option
    allows me to basically brute force the
  • 12:48 - 12:52
    pin. It makes hundreds of calls as I
    explain and I'll try to guess it. And
  • 12:52 - 12:55
    there is a number of parameters like the
    victim number, the carrier... the carrier
  • 12:55 - 12:59
    is important because they put their
    specific payloads for every single carrier
  • 12:59 - 13:04
    because all the voicemail systems are
    different, how you interact with them, and
  • 13:04 - 13:07
    in this case are using a backdoor number
    because he's more efficient. And then
  • 13:07 - 13:11
    there is no detection. And in this case I
    did the option of top pin. So this is
  • 13:11 - 13:17
    basically trying the top 20 pins according
    to the research for four digits. So as you
  • 13:17 - 13:22
    can see it's trying actually three pins at
    a time as I mentioned before rather than
  • 13:22 - 13:27
    one. So we have to do a third of the of
    the of the calls, right? And how did you
  • 13:27 - 13:34
    think that I'm detecting if the pin was
    correct or not? Any ideas?
  • 13:34 - 13:40
    Unintelligible suggestion from audience
    M.V.: OK. So the disconnect and hang up.
  • 13:40 - 13:44
    That's what I heard. And that's exactly
    right. If you think about it I can look at
  • 13:44 - 13:48
    the call duration because when I tried
    three pins and it hangs up it's always the
  • 13:48 - 13:54
    same call duration. For T-Mobile in this
    case it's like 18 seconds. So I instruct
  • 13:54 - 13:58
    Twilio to after dialing and putting the
    payload to interact with the voicemail
  • 13:58 - 14:03
    system trying the pins to wait 10 extra
    seconds. So all I got to do, I don't need
  • 14:03 - 14:08
    any sound processing to try to guess what
    the voicemail voice is telling me if it's
  • 14:08 - 14:11
    correct or not. I just use the call
    duration. So if the call duration is ten
  • 14:11 - 14:16
    times longer then I know that's the right
    pin because because it locked in. So as
  • 14:16 - 14:19
    you can see it found out one of those
    three is actually the correct one: in this
  • 14:19 - 14:25
    case it's 1983. So in order to give you
    the exact one because at that time it
  • 14:25 - 14:29
    tried the three of them, now it's trying
    one by one and it may look like it's
  • 14:29 - 14:35
    taking longer than it should for only 20
    pins but remember failing pins is very
  • 14:35 - 14:39
    very quick. It's just that because in the
    top 20 found already the right pin it
  • 14:39 - 14:46
    takes longer than it should, and there you
    go. We got that it's 1983. Awesome. So
  • 14:46 - 14:50
    what is the impact really why am I here
    talking to you at CCC that has such
  • 14:50 - 14:56
    amazing talks, right? And this is really
    the thing about this. No one cares about
  • 14:56 - 15:01
    the voicemail. Probably if I ask here, who
    knows his own voicemail pin?
  • 15:01 - 15:05
    laughter
    M.V.: Nice. That's what I was expecting.
  • 15:05 - 15:10
    Probably less hands here. So some of them
    are lying but that's the thing, right? We
  • 15:10 - 15:14
    don't care about the voicemail. We don't
    even use it, which is the crazy thing
  • 15:14 - 15:18
    here. We have we have an open door for
    discussing an issue that we don't even
  • 15:18 - 15:23
    know about or we don't even remember. So
    many people is not familiar with the fact
  • 15:23 - 15:28
    that you can a reset passwords over phone
    call. We are familiar with resetting
  • 15:28 - 15:33
    passwords over e-mail. You get a unique
    link maybe over SMS you get a code that
  • 15:33 - 15:37
    you that you then have to enter in the UI.
    But a lot of people cannot receive SMS, or
  • 15:37 - 15:42
    that's what services claim. So they allow
    you to provide that temporary code over a
  • 15:42 - 15:47
    phone call, and that's exactly what we
    take advantage of, because I ask you what
  • 15:47 - 15:51
    what happens if you don't pick up the
    phone if basically I go to a service,
  • 15:51 - 15:55
    enter your e-mail or your phone number and
    reset a password, and everyone can do
  • 15:55 - 16:02
    that. Anyone can reset it, initiate the
    reset password process, and I know that
  • 16:02 - 16:06
    you are not going to pick up the phone. I
    know that thanks to my tool I got access
  • 16:06 - 16:10
    to your voicemail system. So basically the
    voicemail system will pick up the call and
  • 16:10 - 16:15
    it will start recording, so it will record
    the voice spelling out the code that I
  • 16:15 - 16:23
    need to basically reset your account and
    get access to it. So -- oops! -- and I
  • 16:23 - 16:27
    press play here.
    Static
  • 16:27 - 16:31
    M.V.: Okay, so, what does the attack
    vector look like? You brute force the
  • 16:31 - 16:36
    voicemail system using the tool ideally
    using backdoor numbers. For that
  • 16:36 - 16:39
    particular call -- that is, the call that
    the victim will receive once you initiate
  • 16:39 - 16:42
    the password reset -- that one it cannot
    go through the backdoor number, right?,
  • 16:42 - 16:46
    because it's gonna-- PayPal is gonna
    directly call the victim. So for that one
  • 16:46 - 16:50
    you need to make sure that the victim is
    not connected to a tower through all the
  • 16:50 - 16:54
    methods that I showed before. You start
    the password reset process using the
  • 16:54 - 16:58
    economy feature. You listen to the
    recorded message, secret code and profit.
  • 16:58 - 17:02
    You hijacked that account, and
    Voicemailcracker can do all that for you.
  • 17:02 - 17:10
    Let's compromise Whatsapp. So on the left
    you see my number, right?, with a secret
  • 17:10 - 17:14
    lover group, and a secret group, and all
    that stuff. On the right notice that I'm
  • 17:14 - 17:20
    not even using an actual device. It's an
    android emulator that I installed, an APK.
  • 17:20 - 17:24
    And there is some sound to this, and you
    are gonna see -- so again on your left
  • 17:24 - 17:28
    it's the victims number. On the right is
    an emulator of the attacker. So you'll see
  • 17:28 - 17:34
    that I'm going to use my tool with the
    message payload, with the message option.
  • 17:34 - 17:39
    So in this case what I'm doing is I'm
    setting the victim's phone to airplane
  • 17:39 - 17:44
    mode, simulating that it's now offline for
    some reason, and I detected that. So if
  • 17:44 - 17:51
    you see, WhatsApp allows sends you a text
    to actually register as a WhatsApp user,
  • 17:51 - 17:55
    but if you don't reply in a minute it
    allows you-- it gives you an option to
  • 17:55 - 17:59
    call, to call me, right? And that's
    exactly what I click. So now WhatsApp is
  • 17:59 - 18:04
    basically calling the victim which is
    again in airplane mode, because he went on
  • 18:04 - 18:09
    a remote trip or on a plane, and so I'm
    using Voicemailcracker with the option
  • 18:09 - 18:14
    "message" to automatically retrieve that
    newest message. So the tool is gonna
  • 18:14 - 18:18
    provide me as you can see the last option
    is the pin, because I brute forced it
  • 18:18 - 18:22
    before. So it's going to give me a URL
    with the recording of the newest message,
  • 18:22 - 18:30
    which, hopefully -- it's a recorded demo
    -- hopefully contains actually the code.
  • 18:30 - 18:46
    So let's see... I got the URL.
    Phone alert sound
  • 18:46 - 18:49
    Computerized phone voice: New Message! --
    M.V.: It's interacting with the voicemail
  • 18:49 - 18:51
    system right now.
    Phone voice: -- your verification code is:
  • 18:51 - 19:01
    3 6 5 9 1 5. Your verification code is: 3
    6 5 9 1 5. Your ver--
  • 19:01 - 19:06
    M.V.: And that simple. We just hijacked
    that person's WhatsApp, and I -- here I'm
  • 19:06 - 19:09
    fast forwarding just to show you--
    Applause
  • 19:09 - 19:19
    M.V: --that you get actually that. Thank
    you. I do want to point out that WhatsApp
  • 19:19 - 19:22
    is super secure, it like-- end to end
    encryption all that -- and there is a
  • 19:22 - 19:25
    number of things that you can notice this
    attack. For example you wouldn't be able
  • 19:25 - 19:29
    to see the previous messages that were
    there but you can just hold on and ask
  • 19:29 - 19:33
    people, right? The groups will pop up. So
    you hijacked that WhatsApp account. There
  • 19:33 - 19:38
    is also fingerprinting. But who really
    pays attention to the fingerprinting when
  • 19:38 - 19:43
    someone changes the device, right? So are
    we done? Not yet. Because the truth is,
  • 19:43 - 19:48
    some researchers talked about this in the
    past then and actually services tried to
  • 19:48 - 19:52
    slowly pick up. So that is actually
    something that I found in several
  • 19:52 - 19:57
    services. That is what I call the user
    interaction based protection. So when you
  • 19:57 - 20:01
    received that phone call that provides you
    with the temporary code in reality it's
  • 20:01 - 20:05
    not giving it away. You have to press a
    key. It comes in three different flavors
  • 20:05 - 20:09
    from what I found from my tests. Please
    press any key to hear the code, so when
  • 20:09 - 20:12
    you get the call, you have to press, and
    then it will tell you the code; please
  • 20:12 - 20:16
    press a random key so specifically please
    press 1, please press 2, or please enter
  • 20:16 - 20:20
    the code. PayPal does that, and instead of
    you having to press a key to hear the code
  • 20:20 - 20:24
    when you reset the password you will see a
    four digits code that you have to enter
  • 20:24 - 20:29
    when you receive the call and then it will
    reset the password. So I'm going to get
  • 20:29 - 20:34
    the help from all of you guys. Can we beat
    this currently recommended protection what
  • 20:34 - 20:38
    is nowadays recommended to prevent these
    kind of attacks? And we're going to play a
  • 20:38 - 20:45
    game. I'm going to give you two hints.
    This is the first one. So, you probably
  • 20:45 - 20:49
    guys are familiar with this, but Captain
    Crunch. Again we go back today it is we
  • 20:49 - 20:55
    can learn so much from them, use this to
    generate specific sounds at a specific
  • 20:55 - 20:58
    frequency to basically -- you can go and
    read it -- to get free international
  • 20:58 - 21:03
    calls. So he will create that sound and
    the system will process it on the on the
  • 21:03 - 21:07
    line. And the second one is that I
    cheated. When we did the checklist, I
  • 21:07 - 21:12
    actually skipped one , which was the
    greeting message is an attack vector. So I
  • 21:12 - 21:17
    ask you guys how can we bypass the
    protection that requires user interaction
  • 21:17 - 21:20
    in order to get the code recorded on the
    voicemail system?
  • 21:20 - 21:26
    Inaudible suggestion from audience
    M.V.: What was that?... Exactly. Record
  • 21:26 - 21:31
    DTMF tones as the greeting message. We own
    the voice mail system so we can alter the
  • 21:31 - 21:37
    greeting message. So this is exactly how
    it works: We just alter the greeting
  • 21:37 - 21:42
    message we call the DTMF that the system
    is expecting and it works every single
  • 21:42 - 21:48
    time. The best thing of this is what
    really is so awesome about about all of us
  • 21:48 - 21:52
    that really care about technology. We want
    to have a deep understanding because when
  • 21:52 - 21:57
    I was asking people when when you know I
    wanted to show them this I was asking them
  • 21:57 - 22:01
    how does this protection really work. And
    they will say well you have to press a key
  • 22:01 - 22:06
    and then you know it will give you the
    code. But that's not really true. That's
  • 22:06 - 22:09
    what you have to do is to provide a
    specific sound that the system is
  • 22:09 - 22:14
    expecting. That is different than saying
    you have to press a key, because if you
  • 22:14 - 22:19
    say I have to press a key that requires
    physical access. If you say I have to
  • 22:19 - 22:22
    provide a sound, now we know it doesn't
    require physical access. That is why
  • 22:22 - 22:26
    hackers are so cool, because we really
    want to understand what is happening
  • 22:26 - 22:31
    backstage, and we take advantage of that.
    So how does the attack vector look like?
  • 22:31 - 22:34
    Bruteforcing voicemail systems as before.
    So basically we have an extra step which
  • 22:34 - 22:38
    is update the greeting message according
    to the account to be hacked in voicemail.
  • 22:38 - 22:41
    Cracker can do that for you. Let's
    compromise PayPal.
  • 22:41 - 22:47
    Laughter
    M.V.: So on the left side you see that as
  • 22:47 - 22:53
    before I brute force the pin of the voice
    mail. And in this case on the right side
  • 22:53 - 23:01
    I'm going to start a password reset for
    that account. So I do that and I choose
  • 23:01 - 23:06
    "please call me with a temporary code".
    But in this case PayPal works differently
  • 23:06 - 23:10
    because it will show me a four digits code
    that I need to enter when I receive the
  • 23:10 - 23:16
    call in order to reset the password. So
    you see that here I'm using the greeting
  • 23:16 - 23:20
    option. So the greeting is going to allow
    me to enter a payload that I want to
  • 23:20 - 23:26
    record as the greeting message. In this
    case is 6 3 5 3. So I may be very very
  • 23:26 - 23:32
    verbose for this demo. There you see
    the last option use PayPal code and I
  • 23:32 - 23:37
    enter 6 3 5 3. Now the tool is going to
    use the pin to log into the voicemail
  • 23:37 - 23:42
    system, interact with it, change the
    greeting message, record the DTMF tones
  • 23:42 - 23:51
    according to 6 3 5 3 and then it should be
    able to fool the call. In this case I'm
  • 23:51 - 23:56
    asking to call again, because it didn't
    have enough time to do that. And in 3 2 1
  • 23:56 - 24:01
    we should get that we actually compromise
    PayPal's account, and there we go. We can
  • 24:01 - 24:05
    now set our own password.
    Applause
  • 24:05 - 24:15
    M.V.: Thank you. So, I showed you some
    vulnerable servers. Let's go very quick
  • 24:15 - 24:19
    about it because I'm I'm concerned I'm
    running out of time. So, I'm just
  • 24:19 - 24:23
    mentioning Alexa top 100 types of
    services, no favoring anything, but... so
  • 24:23 - 24:28
    for password reset that supports over
    phone call: PayPal, Instagram-- no,
  • 24:28 - 24:35
    Snapchat-- Netflix, Ebay, LinkdIn. I'm
    still on Facebook. What can I say? 2FA for
  • 24:35 - 24:38
    all they major forms so 2FA over phone
    call for Apple, Google, Microsoft,
  • 24:38 - 24:42
    Yahoo... Verification: So basically you
    don't register with a username and
  • 24:42 - 24:47
    password on on WhatsApp or Signal you
    actually use directly the phone number,
  • 24:47 - 24:51
    right? As we saw before and you register
    through a phone call or SMS. So you can
  • 24:51 - 24:55
    compromise this too. Twilio, the own
    service that I use for these is actually
  • 24:55 - 25:01
    really cool because you can own a caller
    I.D. by verifying it by getting a phone
  • 25:01 - 25:05
    call so I can actually own your caller ID
    and make calls on your behalf, send texts,
  • 25:05 - 25:10
    and these all legitimately, right?,
    because you've pressed one. Google Voice,
  • 25:10 - 25:13
    it's actually another interesting service
    because it's used a lot by scammers,
  • 25:13 - 25:17
    right? And this is the same thing: you
    have to verify ownership so you can do
  • 25:17 - 25:22
    those phone calls and you can fool it as
    well with this, but I found I was looking
  • 25:22 - 25:25
    like what other services really take
    advantage of this? And this is super
  • 25:25 - 25:31
    common in San Francisco, where I live. You
    can buzz in people like when they want to
  • 25:31 - 25:35
    enter, right?, they enter your house
    number, and then your phone rings and you
  • 25:35 - 25:39
    press any key to open the door. So we are
    talking about physical security now. And
  • 25:39 - 25:44
    I've seen this in offices as well. They
    all work this way, basically because they
  • 25:44 - 25:48
    want to be able -- for tenants, that you
    know, come and go -- be able to switch
  • 25:48 - 25:53
    that very quickly. So it works just
    through the phone that you buzz people in.
  • 25:53 - 25:57
    But my favorite is consent, because when
    we think about consent we think about
  • 25:57 - 26:01
    lawyers and we think about signing papers
    and we think about all of these difficult
  • 26:01 - 26:08
    things. And I find out about these
    location smart service that is not anymore
  • 26:08 - 26:15
    there and you will see why... But this was
    recently in the news because, basically
  • 26:15 - 26:20
    Brian Krebs wrote a really great article
    about it. But I'm going to let you hear
  • 26:20 - 26:23
    then their YouTube channel, how Location
    Smart works.
  • 26:23 - 26:30
    LS vid speaker 1: The screen that you're
    showing, that you're seeing right now is a
  • 26:30 - 26:37
    demo that we have on our Web site it's at
    location smart.com/pride, and I've entered
  • 26:37 - 26:43
    my name, my email, my mobile phone number,
    and it's again going to get my permission
  • 26:43 - 26:48
    by calling my phone, and then it'll
    locate. So let's go ahead and, I clicked
  • 26:48 - 26:55
    the box to say yes I agree, click the
    locate, and the screen now shows that it's
  • 26:55 - 26:58
    going to call my device to get my
    permission.
  • 26:58 - 27:04
    vid speaker's phone vibrates, sounds like an airhorn in video
    LS vid speaker 2: Heh, that's a nice ring
  • 27:04 - 27:06
    tone --
    M.V.: No, it's not--
  • 27:06 - 27:10
    LS vid speaker 1's phone: To log into
    Location Smart Services, press 1 or say
  • 27:10 - 27:17
    'Yes'. To repeat, press 2 or say 'Repeat'.
    LSVS1: Yes
  • 27:17 - 27:22
    Phone: Congratulations. You have been
    opted in to Location Smart Services.
  • 27:22 - 27:23
    Goodbye
    M.V.: So as you see, this service, this
  • 27:23 - 27:30
    Web site had a free demo, had a free demo
    that allow you to put out a phone number
  • 27:30 - 27:34
    -- yours, of course -- and you will get a
    phone call and then you will give
  • 27:34 - 27:38
    permission by pressing one. So someone
    could locate you and keep tracking -- I
  • 27:38 - 27:48
    mean, I checked with them -- for up to 30
    days, real time. So now you know why they
  • 27:48 - 27:52
    don't exist anymore!
    Applause
  • 27:52 - 28:01
    M.V.: Open source..
    More Applause
  • 28:01 - 28:05
    M.V: Open source. So, and this was with
    the permission of the carriers. This was
  • 28:05 - 28:12
    not some fishy thing. This was actually a
    service. So I wanted to release code,
  • 28:12 - 28:15
    because I want you guys to verify that
    what I mentioned is true and have code to
  • 28:15 - 28:20
    hopefully help push the industry forward
    to make a voice mail systems more secure,
  • 28:20 - 28:25
    right?. We want to push carriers to do so.
    A but I didn't want to provide on tool
  • 28:25 - 28:30
    that works out of the box and anyone can
    very easily as we saw like just start to
  • 28:30 - 28:33
    bruteforce pins, especially because I saw
    that there is so many people with the
  • 28:33 - 28:37
    default PINs out there. So I just removed
    the brute forcing, so the tool allows you
  • 28:37 - 28:41
    to test it on your own. You can test, you
    know, you can test the greeting message
  • 28:41 - 28:45
    you can test the retreiving messages
    compromising the services and all that. So
  • 28:45 - 28:48
    the tool allows you to test on your own
    device. I won't give you code to brute
  • 28:48 - 28:54
    force someone else's device. And feel free
    to go to my github repo. So now like all
  • 28:54 - 28:59
    the talks comes the recommendations, but I
    know what you guys are thinking, right?
  • 28:59 - 29:03
    When someone comes with all this paranoia
    and stuff you still think "yeah but you
  • 29:03 - 29:07
    know still like no one is gonna come after
    me. I don't have anything to hide" or
  • 29:07 - 29:11
    anything like that. So I wanted to give
    you reasons why you should still care
  • 29:11 - 29:17
    about this, and why we need to do better.
    Because do carriers set default PINs? Yes,
  • 29:17 - 29:23
    we saw that. Is testing for default pins
    cheap, fast, undetected, and automatable?
  • 29:23 - 29:29
    Yes it is. Is updating reading the message
    automatable? Yes it is. Is retrieving you
  • 29:29 - 29:35
    the newest message automatable? Yes it is.
    Is there speech to text description, so
  • 29:35 - 29:39
    that I can get the sound that I played
    before with the code and get it in text?
  • 29:39 - 29:46
    Yeah. Twilio gives you that as well. So
    can the account compromise process be
  • 29:46 - 29:50
    automatable? Of course you can use
    selenium if you want to automate the UI.
  • 29:50 - 29:56
    Or you can use a Web proxy and look at the
    APIs and do it yourself. So it is only a
  • 29:56 - 30:01
    matter of time that someone actually does
    all these steps that I showed you step by
  • 30:01 - 30:05
    step and just makes it all straight and
    starts to go over phone numbers trying the
  • 30:05 - 30:10
    default PINs, and just automatically
    compromising services like WhatsApp like
  • 30:10 - 30:16
    PayPal and all that. You can do basically,
    not a worm, but, you know, you can
  • 30:16 - 30:21
    compromise a lot of devices without doing
    anything. Recommendations for online
  • 30:21 - 30:25
    services. Don't use automated calls for
    security purposes. if not possible detect
  • 30:25 - 30:28
    answering machines and fail. I mean this
    is not very accurate and you can still
  • 30:28 - 30:34
    trick it. Require user interaction before
    providing the secret. I just show you how
  • 30:34 - 30:40
    to bypass that, but that's with hope that
    carriers ban DTMF tones from the greeting
  • 30:40 - 30:44
    message. I don't see why that should be
    supported, right? Recommendations for
  • 30:44 - 30:48
    carriers. The most important thing: Ban
    DTMF tones from the greeting message,
  • 30:48 - 30:53
    eliminate backdoor mobile services, or at
    least a give no access to the login
  • 30:53 - 30:57
    prompt, right? There is no reason why you
    should be able to access your voicemail
  • 30:57 - 31:02
    directly to leave a message. But then I
    can access the login prompt by pressing
  • 31:02 - 31:06
    star. Voicemail disabled by default. This
    is very important and can only be
  • 31:06 - 31:10
    activated from the actual phone, or
    online maybe with a special code. Oh great
  • 31:10 - 31:16
    I have time for questions. No default
    pins. Learn from the German carriers:
  • 31:16 - 31:19
    don't allow common pins, detect and
    prevent brute force attempts, don't
  • 31:19 - 31:24
    process multiple pins at once.
    Recommendations for you which, is in the
  • 31:24 - 31:28
    end, very important here. disable the
    voice mail if you don't use it. I found
  • 31:28 - 31:32
    though that some carriers you're still
    through the backdoor voicemail numbers you
  • 31:32 - 31:37
    are unable to activate it again. So kind
    of sucks. So I guess use the longest
  • 31:37 - 31:42
    possible random pin. Don't provide phone
    numbers to online services unless
  • 31:42 - 31:46
    required, or is the only way to get 2FA.
    2FA is more important. Use a virtual
  • 31:46 - 31:50
    number to prevent OSINT like a Google
    Voice number so no one can you know learn
  • 31:50 - 31:55
    about your phone number digits by
    resetting the password or do SIM swapping.
  • 31:55 - 32:00
    Use 2FA apps only. And I always like to
    finish my talk with ones like that kind of
  • 32:00 - 32:04
    summarizes everything. Automated phone
    calls are a common solution for password
  • 32:04 - 32:07
    reset, 2FA, verification, and other
    services. These can be compromised by
  • 32:07 - 32:11
    leveraging old weaknesses and current
    technology to exploit the weakest link
  • 32:11 - 32:15
    voicemail systems. Thank you so much.
    Danke Schön, CCC!
  • 32:15 - 32:33
    Applause
    Herald Angel: Thank you, Martin. We have
  • 32:33 - 32:37
    time for questions, so if you have any
    questions or if someone in the Internet
  • 32:37 - 32:45
    has questions just go to these
    microphones. Where is the microphone?
  • 32:45 - 32:50
    You've got it. Yes. You were black and the
    microphone too. So maybe you start and we
  • 32:50 - 32:56
    take the question from the Internet.
    Q: Yes I have a question. You mentioned
  • 32:56 - 33:03
    that the phone needed to be offline. Would
    a call like a sim teen's call to the phone
  • 33:03 - 33:11
    that it would be in what is called in
    english - besetzt?- like occupied so let's
  • 33:11 - 33:20
    say I already called the victim. So the
    caller gets, yeah, the line's occupied
  • 33:20 - 33:22
    that would then go to voicemail, wouldn't
    it?
  • 33:22 - 33:26
    M.V.: So that's a great question. I think
    the question is if you are on a call and
  • 33:26 - 33:31
    someone else calls you, so your attack
    will be: I somehow make up a story to keep
  • 33:31 - 33:35
    the person on the phone call while I
    launch other calls... that will work. I
  • 33:35 - 33:39
    tried that but the problem is usually to
    force, I mean that will not be too big of
  • 33:39 - 33:42
    a deal I guess but it supports two calls
    right. They will warn you all there is
  • 33:42 - 33:46
    another incoming call. But I guess you
    could keep doing more. So that's what I
  • 33:46 - 33:51
    meant a partly with a call flooding. In
    that case what I tried was just launching
  • 33:51 - 33:54
    all of them at the same time. And if the
    person picks up I don't care but it's
  • 33:54 - 33:57
    somewhat related to what you mentioned and
    that's definitely possible.
  • 33:57 - 33:59
    Questioner: Okay. Thank you.
    M.V.: Yeah.
  • 33:59 - 34:04
    Herald: Question from the internet please
    Signal Angel: Does this work with the
  • 34:04 - 34:08
    phone calls that start talking
    immediately, will the new code being
  • 34:08 - 34:12
    recorded then?
    M.V.: if I understood the question
  • 34:12 - 34:16
    correctly it's that when the voicemail
    picks up like basically the automated
  • 34:16 - 34:21
    system that spits out the code already
    started to talk. I believe that's the
  • 34:21 - 34:23
    question.
    Herald: We don't know it's from the
  • 34:23 - 34:27
    Internet.
    M.V.: OK so if that is the question I
  • 34:27 - 34:31
    found actually that, because usually
    greeting messages last like 15 seconds so
  • 34:31 - 34:35
    by the time it starts recording you
    already finish the recording that gives
  • 34:35 - 34:39
    you the code, but you own the greeting
    message so you make it as short as one
  • 34:39 - 34:44
    second. And I never found a problem with
    that. You actually recorded DTMF tones for
  • 34:44 - 34:48
    like two seconds.
    Herald: Ladies first let me take your
  • 34:48 - 34:55
    question.
    Q: You talked about how you learned all of
  • 34:55 - 35:08
    that through reading e-zines. How are they
    called, and how do I find them?
  • 35:08 - 35:11
    M.V: That's the best question I've ever
    heard and it deserves an applause,
  • 35:11 - 35:16
    seriously. I like that because you also
    want to learn about it. So that's that's
  • 35:16 - 35:20
    really fantastic. So the Phrack Web site
    is the best resource you can get. I guess
  • 35:20 - 35:27
    everyone will agree here. So you just look
    up google for phrack magazine and there is
  • 35:27 - 35:32
    a lot a lot of interesting stuff that we
    can learn there still today.
  • 35:32 - 35:36
    Q: Are there any others?
    M.V.: Yeah I mean you can then follow the
  • 35:36 - 35:42
    classic. I mean I like Twitter to get my
    security news because it's very concise so
  • 35:42 - 35:47
    I kind of get like you know the 140
    characters version.. if I'm interested
  • 35:47 - 35:52
    then I will read it. So I think you can
    google for like top security people to
  • 35:52 - 35:58
    follow. Brian Krebs is great. It depends
    also on your technical depth. There is
  • 35:58 - 36:04
    different people for that. And if not just
    you know specialized blogs in magazines.
  • 36:04 - 36:07
    Q: All right. Thanks.
    M.V.: Thank you.
  • 36:07 - 36:11
    Herald: And your question please.
    Q: Hi. And so for me the solution is
  • 36:11 - 36:15
    obvious: I just turn off my voicemail. But
    thinking about some relatives which are
  • 36:15 - 36:19
    maybe too lazy or don't really care and
    still use two factor authentication. I was
  • 36:19 - 36:24
    thinking about could I easily adapt your
    script to automatically turn off voice
  • 36:24 - 36:38
    boxes or generate random pins?
    M.V.: You can automate it to turn off the pin. Like
  • 36:38 - 36:42
    for example on Vodaphone I don't know why
    that allows you to turn off the pin. To turn
  • 36:42 - 36:47
    off the voicemail... I don't... I haven't
    tested that. I think you may have to call
  • 36:47 - 36:52
    the IT department but you know what. It
    would be really great to do that. It would
  • 36:52 - 36:56
    be really awesome. Great question. I guess
    if you can turn it off then you can turn
  • 36:56 - 37:00
    it on as well. Yeah.
    Herald: Your question please.
  • 37:00 - 37:03
    Q: Did Twilio ban you or did they find out
    what you did?
  • 37:03 - 37:10
    M.V.:I got some emails I got some emails
    but they were really cool. I have to say
  • 37:10 - 37:14
    that. I explained to them what I was
    coming from, I gave them my identity...
  • 37:14 - 37:18
    like I wasn't hiding anything. Actually I
    had to pay quite some money and because of
  • 37:18 - 37:22
    all the calls that I was doing while I was
    doing the research, so I do think hide my
  • 37:22 - 37:27
    identity at all. So, they did detect tact
    that I was doing many calls and stuff like
  • 37:27 - 37:32
    that. So there is I guess at the high
    volumes there is some detection, but
  • 37:32 - 37:36
    Twilio is not the only service. So again
    you can switch between services, space it
  • 37:36 - 37:40
    out, change caller I.D.s, a number of
    things.
  • 37:40 - 37:46
    Herald: And one more question here.
    Q: Hi. You talked about being undetected
  • 37:46 - 37:50
    when making all these calls by going
    directly to these direct access numbers.
  • 37:50 - 37:56
    In Germany it's very common that if
    someone calls your voicemail you get an
  • 37:56 - 38:00
    SMS text even if they don't leave a
    message. But I suspect there's some kind
  • 38:00 - 38:05
    of undocumented API to actually turn that
    off through the menus. Have you looked
  • 38:05 - 38:09
    into that?
    M.V.: No I haven't looked into that
  • 38:09 - 38:14
    specifically. The question is that usually
    in Germany for the carriers you'll get an
  • 38:14 - 38:18
    SMS when you when you get a call. I
    wonder... the test that I did on the
  • 38:18 - 38:22
    German carriers, I was getting a text if I
    was leaving a message, not if someone was
  • 38:22 - 38:26
    calling there. I guess you are talking
    about a missed call, that kind of
  • 38:26 - 38:32
    notification. I'm not sure about it. What
    I do want to point out is remember that a
  • 38:32 - 38:36
    you can do these while the person is
    offline maybe on a long trip so you can
  • 38:36 - 38:41
    time it, and that will be a good probation
    I guess to just not launch at any, you
  • 38:41 - 38:44
    know, at any point in time, but you can
    just always time it, and by the time the
  • 38:44 - 38:48
    person gets a million text it's too late.
    Q: Thanks.
  • 38:48 - 38:50
    M.V.: Yeah.
    Herald: One more question over here
  • 38:50 - 38:55
    please.
    Q: Thank you. On apple phones you can
  • 38:55 - 39:01
    activate with some care the, what they
    call visual voicemail. Would that prevent
  • 39:01 - 39:05
    your attack to work, or..?
    M.V.: No there is actually, I believe he
  • 39:05 - 39:12
    was an Australian researcher, that looked
    into the visual voicemail and he was able
  • 39:12 - 39:17
    to find that in reality uses the IMAP, If
    I remember correctly, protocol, and for
  • 39:17 - 39:23
    some carriers he was able to to launch
    brute force attacks because the
  • 39:23 - 39:28
    authentication wasn't with the same pin as
    you get when you dial in. But he found at
  • 39:28 - 39:35
    least one carrier in Australia I believe
    that was vulnerable through visual
  • 39:35 - 39:38
    voice mail protocol. And I check for
    German carriers. I did that, I actually
  • 39:38 - 39:43
    follow the steps that he did, to see if
    that was worth mentioned in here. I didn't
  • 39:43 - 39:49
    find it to be vulnerable, but that doesn't
    mean that that's not the case.
  • 39:49 - 39:54
    Herald: One more last question.
    Q: Thank you for the talk. What is your
  • 39:54 - 39:58
    recommendation to American carriers to
    protect themselves against this attack?
  • 39:58 - 40:03
    M.V.: I put a slight slide there. Like for
    me I guess the most important thing is
  • 40:03 - 40:08
    really look at what some German carriers
    are doing I really like that in the recent
  • 40:08 - 40:13
    past where it sends it to you over SMS as
    soon as it detects that someone dialed,
  • 40:13 - 40:18
    tried six times the wrong pin. I mean if
    you have physical access to a locked
  • 40:18 - 40:23
    device you could claim that if someone has
    the preview turned on the device you could
  • 40:23 - 40:27
    still see the pin, you know when you get
    it so. But then it wouldn't be like a
  • 40:27 - 40:34
    remote attack anymore, so definitely
    detect brute forcing and shut down. I mean
  • 40:34 - 40:38
    we know that with the caller I.D. is not
    working so well for a Telecom, because I
  • 40:38 - 40:43
    was able to bypass it. But I know that,
    because I did some test with HLR records
  • 40:43 - 40:47
    that you can actually tell the type of
    device that it is, if it's a virtual
  • 40:47 - 40:51
    number. So if carriers could actually look
    at the type of phone that is trying to
  • 40:51 - 40:56
    call in. I think if it's a virtual number,
    you know, red flag. If it's not I don't
  • 40:56 - 40:59
    think someone is going to have... I guess
    the government could like, you know have
  • 40:59 - 41:06
    3333 devices because you try one pin for
    the 10000 keyspace, you know. You try 3
  • 41:06 - 41:11
    pins at a time and just have 3333 SIM
    cards and so it will come from real
  • 41:11 - 41:16
    devices. But then at least it will quite
    significantly mitigate it. And then like
  • 41:16 - 41:23
    again like if you ban DTMF tones from the
    greeting message that will help as well.
  • 41:23 - 41:26
    Herald: Thank you Martin. I have never
    provided any telephone number to any
  • 41:26 - 41:32
    platform and now thanks to you I know why.
    Warm applause for Martin Vigo please.
  • 41:32 - 41:34
    M.V.: Thank you
  • 41:34 - 41:40
    applause
  • 41:40 - 41:45
    35c3 postroll music
  • 41:45 - 42:02
    subtitles created by c3subtitles.de
    in the year 2019. Join, and help us!
Title:
35C3 - Compromising online accounts by cracking voicemail systems
Description:

more » « less
Video Language:
English
Duration:
42:02

English subtitles

Revisions