HOME

TheInfoList



OR:

Karsten Nohl (born 11 August 1981) is a German
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
expert and hacker. His areas of research include
Global System for Mobile Communications The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation ( 2G) digital cellular networks used by mobile devices such as ...
(GSM) security,
radio-frequency identification Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromag ...
(RFID) security, and privacy protection.


Life

Nohl grew up in the
Rhineland The Rhineland (german: Rheinland; french: Rhénanie; nl, Rijnland; ksh, Rhingland; Latinised name: ''Rhenania'') is a loosely defined area of Western Germany along the Rhine, chiefly its middle section. Term Historically, the Rhinelands ...
area of Germany and studied electrical engineering at the
Heidelberg University } Heidelberg University, officially the Ruprecht Karl University of Heidelberg, (german: Ruprecht-Karls-Universität Heidelberg; la, Universitas Ruperto Carola Heidelbergensis) is a public research university in Heidelberg, Baden-Württemberg, ...
of applied sciences from 2001 to 2004. From 2005 to 2008, he earned his PhD at the
University of Virginia The University of Virginia (UVA) is a Public university#United States, public research university in Charlottesville, Virginia. Founded in 1819 by Thomas Jefferson, the university is ranked among the top academic institutions in the United S ...
on Implementable Privacy for RFID Systems. Since 2010 Nohl has served as the Managing Director and Chief Scientist of the Berlin-based consultancy and think tank, Security Research Labs. Karsten has also served as interim CISO for the Indian corporation
Jio Reliance Jio Infocomm Limited, doing business as Jio, is an Indian telecommunications company and a subsidiary of Jio Platforms, headquartered in Navi Mumbai, Maharashtra, India. It operates a national LTE network with coverage across all 2 ...
from 2014 to 2017, as well as, for the Malaysian corporation
Axiata Axiata Group Berhad, commonly known as Axiata, formerly known as TM International Berhad, is a Malaysian multinational telecommunications conglomerate with extensive operations in Asia. The group Axiata's primary business is in investment h ...
in 2017.


Areas of Research


RFID Security


Mifare Security

Together with Henryk Plötz and
CCC CCC may refer to: Arts and entertainment * Canada's Capital Cappies, the Critics and Awards Program in Ottawa, Ontario, Canada * ''Capcom Classics Collection'', a 2005 compilation of arcade games for the PlayStation 2 and Xbox * CCC, the pro ...
Berlin's, Starbug, Nohl gave a presentation in December 2007 on how the encryption algorithm used in Mifare Classic RFID smart cards was cracked. The Mifare Classic Card has been used in many micropayment applications, such as the Oyster card, CharlieCard, or the OV Chipkaart for payment.


Legic Security

Together with Henryk Plötz, Nohl gave a presentation in December 2009 documenting the flawed security of Legic Prime RFID security. The talk demonstrated how the system employed multiple layers of strange and obscure techniques in lieu of standard encryption and cryptographic protocols. This allowed cards to be read, emulated, and even for arbitrary master tokens to be created.


Car Immobilizer

At SIGINT-2013, Nohl gave a presentation on the insecurity of electronic car immobilizers used to prevent vehicle theft, documenting vulnerabilities in the three most widely used systems: DST40 (
Texas Instruments Texas Instruments Incorporated (TI) is an American technology company headquartered in Dallas, Texas, that designs and manufactures semiconductors and various integrated circuits, which it sells to electronics designers and manufacturers globall ...
), Hitag 2 (
NXP Semiconductors NXP Semiconductors N.V. (NXP) is a Dutch semiconductor designer and manufacturer with headquarters in Eindhoven, Netherlands. The company employs approximately 31,000 people in more than 30 countries. NXP reported revenue of $11.06 billion in 2 ...
) and Megamos ( EM Micro).


Mobile Network Security


deDECTed.org

Nohl was part of the project group deDECTed.org 1 which in 2008 at 25C3 pointed out serious deficiencies in the DECT protocol. In April 2010, Nohl, together with Erik Tews and Ralf-Philipp Weinmann, published details on the cryptographic analysis of DECT proprietary and secret encryption algorithm used (
DECT standard cipher Digital enhanced cordless telecommunications (Digital European cordless telecommunications), usually known by the acronym DECT, is a standard primarily used for creating cordless telephone systems. It originated in Europe, where it is the common ...
), which is based on
reverse engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompli ...
of DECT hardware and descriptions from a patent specification.


A5/1 Security Project

In the summer of 2009 Nohl introduced the A5 / 1 Security Project. The project demonstrated an attack on the GSM encryption standard A5/1 using
Rainbow Tables A rainbow table is an efficient way to store data that has been computed in advance to facilitate cracking passwords. To protect stored passwords from compromise in case of a data breach, organizations avoid storing them directly, instead transfo ...
. With the help of volunteers, the key tables were calculated in a few months and published on the 26C3 in December 2009. The
GSM Association The GSM Association (commonly referred to as 'the GSMA' or ''Global System for Mobile Communications'', originally ''Groupe Spécial Mobile'') is an industry organisation that represents the interests of mobile network operators worldwide. More ...
described Nohl's plans as illegal and denied that wiretapping was actually possible. He replied that his research was purely academic. As early as 2008, the hacker group THC had begun with the pre-calculation of key tables for A5 / 1, but probably never published the tables because of legal problems.


GSM Sniffing

At the 27C3 in December 2010, Nohl, together with Sylvain Munaut, demonstrated how mobile calls can be cut and decrypted with the help of converted cheap mobile phones and the open-source software OsmocomBB. The pair showed that the GSM encryption can be cracked "in about 20 seconds" and that calls can be recorded and played back.


GPRS Security

At Chaos Communication Camp 2011, Nohl and Luca Melette gave a presentation showing how
GPRS General Packet Radio Service (GPRS) is a packet oriented mobile data standard on the 2G and 3G cellular communication network's global system for mobile communications (GSM). GPRS was established by European Telecommunications Standards Insti ...
networks do not securely encrypt their mobile traffic. The pair stated that they had recorded data transmissions in the networks of several German mobile providers, including
Deutsche Telekom Deutsche Telekom AG (; short form often just Telekom, DTAG or DT; stylised as ·T·) is a German telecommunications company that is headquartered in Bonn and is the largest telecommunications provider in Europe by revenue. Deutsche Telekom was ...
,
O2 Germany O, or o, is the fifteenth letter and the fourth vowel letter in the Latin alphabet, used in the modern English alphabet, the alphabets of other western European languages and others worldwide. Its name in English is ''o'' (pronounced ), pl ...
,
Vodafone Vodafone Group Public limited company, plc () is a British Multinational corporation, multinational Telephone company, telecommunications company. Its registered office and Headquarters, global headquarters are in Newbury, Berkshire, England. It ...
and
E-Plus E-Plus was a mobile telecommunications operator in Germany. With more than 25 million subscribers, E-Plus was the third largest mobile operator in Germany, until the takeover from Telefónica Germany in October, 2014. Ownership E-Plus was ...
. Several mobile service providers used either no or only insufficient encryption. With a modified mobile phone, mobile traffic could be read from within a radius of five kilometers.


SIM Card DES-Hack

At both
Black Hat Black hat, blackhats, or black-hat refers to: Arts, entertainment, and media * Black hat (computer security), a hacker who violates computer security for little reason beyond maliciousness or for personal gain * Black hat, part of black and white ...
2013 and
OHM Ohm (symbol Ω) is a unit of electrical resistance named after Georg Ohm. Ohm or OHM may also refer to: People * Georg Ohm (1789–1854), German physicist and namesake of the term ''ohm'' * Germán Ohm (born 1936), Mexican boxer * Jörg Ohm (b ...
2013, Nohl demonstrated that many SIM cards use the outdated and insecure
DES Des is a masculine given name, mostly a short form (hypocorism) of Desmond. People named Des include: People * Des Buckingham, English football manager * Des Corcoran, (1928–2004), Australian politician * Des Dillon (disambiguation), sever ...
encryption, undermining the privacy and security of mobile phone users. Through "Over The Air (OTA)" communication, such as SMS messages, it is possible to provide a SIM card with updates, applications, or new encryption keys. Such messages are digitally signed with DES, 3DES or AES. Nohl generated a
Rainbow Table A rainbow table is an efficient way to store data that has been computed in advance to facilitate cracking passwords. To protect stored passwords from compromise in case of a data breach, organizations avoid storing them directly, instead transfo ...
for 56-bit DES within a year based a on specially signed error message with known plain text. The resulting attack scenario: an attacker sends the victim a signed text message. With the help of the Rainbow Table it is then possible to crack the DES key of a SIM card in minutes and crack the internal key. (Known Plaintext Attack). This allows an attacker to send a signed SMS, which in turn loads a Java app onto the SIM card. These apps are capable of multiple actions, including sending SMS or sharing the location of the device. An attacker could, for example, command a device to send SMS messages to foreign premium services at the cost of the device owner. In principle, the
Java Virtual Machine A Java virtual machine (JVM) is a virtual machine that enables a computer to run Java programs as well as programs written in other languages that are also compiled to Java bytecode. The JVM is detailed by a specification that formally describes ...
should make sure that every Java app can only access predefined interfaces. Nohl found that the Java sandbox implementations of at least two major SIM card manufacturers, including market leader
Gemalto Gemalto was an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. It was formed in June 2006 by the merger of two companies, Axalto and Gemplus In ...
, are insecure and it is possible for a Java app to escape the sandbox environment and thus gain access to the entire SIM card. This makes it possible to duplicate SIM cards including the IMSI, authentication key (Ki) and payment information stored on the card.


GSM Security Map und SnoopSnitch

At the 30C3 in December 2013, Nohl introduced the Android app "GSMmap". Initially designed for use on a Galaxy S2 or S3 (including root access), the app collects information on the level a mobile network secures its traffic. The collected data can be uploaded, with the app user’s consent, to a database that evaluates the security of mobile networks worldwide, based on selected protection capability criteria. The results of this analysis are displayed on the "GSM Security Map" website, where the security level of mobile providers are visualized on an interactive world map and made available for download as "country reports". At the 31C3 in December 2014, Nohl presented the Android app "SnoopSnitch" as a possible countermeasure against various mobile network security attacks. On various smartphones models with Qualcomm chipset and root access, mobile network traffic can be collected and analyzed locally with "SnoopSnitch,” where the app gives the user information about the encryption and authentication algorithm being used by the network, the possibility for SMS and SS7 attacks, as well as the potential presence of
IMSI-catcher An international mobile subscriber identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Essentially a "fake" mobile tower acting betwe ...
s. The data collected via “SnoopSnitch” can also be uploaded, with the user’s consent, to a database to support additional security analysis, which is shared on the "GSM Security Map" website.


SS7 Hacking

Also at the 31C3, Nohl presented a
side channel attack In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is Implementation#Computer science, implemented, rather than flaws in the d ...
using
Signaling System 7 Signalling System No. 7 (SS7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down telephone calls in most parts of the world-wide public switched telephone network (PSTN). The protocol also perform ...
(SS7) on
UMTS The Universal Mobile Telecommunications System (UMTS) is a third generation mobile cellular system for networks based on the GSM standard. Developed and maintained by the 3GPP (3rd Generation Partnership Project), UMTS is a component of the Inte ...
communication and described other SS7-based attacks that can allow the reading of text messages, the determination of location coordinates, and various scenarios for fraud.


Android Patching

In April 2018, Nohl presented on security in the mobile Android environment. Nohl and his colleagues analyzed Android firmware images from various smartphone vendors. In some cases, a so-called "patch gap" was found, where vendors had not applied all security patches that otherwise should have been present based on the monthly patch level date specified in the firmware. Nohl released an updated version of the open source “Snoopsnitch” app with new features to allow users to run tests on their Android phones to check for a "patch gap" on their device.


Security of payment and booking systems


Attacks on the Electronic Cash protocol

At the 32C3, Nohl and colleagues presented an attack on the EC card protocols ZVT and Poseidon, which are a dialect of
ISO 8583 ISO 8583 is an international standard for ''financial transaction card originated'' interchange messaging. It is the International Organization for Standardization standard for systems that exchange electronic transactions initiated by cardholde ...
. Both protocols are the most common payment protocols in German-speaking countries.


Security gaps in travel booking systems

At the 33C3, Nohl and colleagues highlighted security holes in
Amadeus Amadeus may refer to: *Wolfgang Amadeus Mozart (1756–1791), prolific and influential composer of classical music *Amadeus (name), a given name and people with the name * ''Amadeus'' (play), 1979 stage play by Peter Shaffer * ''Amadeus'' (film), ...
,
Sabre A sabre ( French: sabʁ or saber in American English) is a type of backsword with a curved blade associated with the light cavalry of the early modern and Napoleonic periods. Originally associated with Central European cavalry such as th ...
, and
Travelport Travelport Worldwide Ltd provides distribution, technology, payment solutions for the travel and tourism industry. It is the smallest, by revenue, of the top three global distribution systems (GDS) after Amadeus IT Group and Sabre Corporation. ...
, three of the largest Global Distribution Systems (GDS) which combined, handle approximately 90% of worldwide flight reservations and a large proportion of hotel, car rental, and other travel bookings.


IT Security research


BadUSB

At
Black Hat Black hat, blackhats, or black-hat refers to: Arts, entertainment, and media * Black hat (computer security), a hacker who violates computer security for little reason beyond maliciousness or for personal gain * Black hat, part of black and white ...
2014, Nohl and Jacob Lell presented on security risks associated with USB devices. The USB standard is versatile and includes many different classes of devices. Their research is based on the reprogramming of USB controller chips, which are widely used and found in USB sticks. There is no effective protection against reprogramming, so a harmless USB device can be converted and used as a malicious device in many ways. Possible scenarios for abuse include: * A USB device can emulate a keyboard and issue commands on behalf of the logged-in user to install malware on their computer, malware which would also infect other USB devices connected. * A USB device can pretend to be a network card, change the computer's DNS setting, and redirect traffic. * A modified USB stick or a USB hard drive can load a small virus during the boot process, which infects the operating system before booting. Preventing such attacks is not yet possible because malware scanners have no access to the firmware version of USB devices and behavior detection is difficult. USB firewalls that can block only certain device classes do not (yet) exist. The usual process to remove malware - reinstalling the operating system - fails here because the USB stick that installs the operating systems may itself already be infected, as well as a built-in webcam or other USB devices. In addition, a proof of concept for Android devices was released to test the security.


External links


Security Research Labs: GSM Security MapSnoopsnitch
An Android app for analyzing mobile traffic data. Gives the user information about the encryption and authentication algorithm, SMS and SS7 attacks and IMSI catcher.


References

{{DEFAULTSORT:Nohl, Karsten German cryptographers 1981 births Living people