Forensics of A Rogue Base Transceiver Station
Forensics of A Rogue Base Transceiver Station
net/publication/366760619
Article in International Journal of Electronic Security and Digital Forensics · January 2023
DOI: 10.1504/IJESDF.2023.10047307
CITATIONS READS
0 180
3 authors, including:
6 PUBLICATIONS 0 CITATIONS
National Forensic Sciences University
33 PUBLICATIONS 113 CITATIONS
SEE PROFILE
SEE PROFILE
All content following this page was uploaded by Digvijaysinh M Rathod on 18 April 2023.
1 Introduction
One of the most widely used cellular technologies in the world is the global system for
mobile (GSM) communications (Redl et al., 1995). GSM communications is a digital
mobile telephony network in which mobile phones interact using phone numbers as
identifiers. For GSM, a mobile number is equivalent to an internet protocol (IP) address
on the internet. This network is based on base stations, analogous to access points in IP
networks and provide direct contact with mobile phones. The base station is connected to
the rest of the network, and the only one who knows the path to the remainder of the
network is the base station. GSM is a widely utilised telephonic technology in many
countries, a threat to the GSM network is the most serious threat to the mobile
communication system.
Vulnerabilities are flaws in a system’s security that can be exploited by a malicious
individual to compromise its information assurance. The only way to prevent such flaws
from being exploited is to uncover them before an attacker does and quantify their impact
on the system. Simulating an attack on such a system allows the system’s owner to
identify the system’s vulnerabilities and patch them before a malicious person uses it.
Unfortunately, many operators continue to have serious vulnerabilities in their
networks, putting their consumers at danger and allowing attackers to use open-source
solutions like YateBTS (Finley, 2014) to prey on them. Simulating a BTS in the early
days of GSM networks appeared to be prohibitively expensive (Cooper, 2012), but
solutions like YateBTS and a software define radio (SDR), attacker with minimal
abilities may carry out an attack. Attackers employ rogue/fake BTS (Song et al., 2012) to
exploit GSM network weaknesses and fool users into connecting to the rogue BTS
assuming it is a legitimate BTS. YateBTS and SDR is used to recreate an assault scenario
in order to grasp the importance of the proposed forensics concept of rogue BTS.
The rest of this paper is laid out as follows: Section 2 discusses the results of a
literature review on GSM network security and rogue/fake BTS forensics. In Section 3,
we talked about configuration of laboratory with hardware and software recruitment,
methodology is discussed in Section 4. Section 5 describes forensic ways for collecting
evidence from Raspberry OS (Linux-based OS) and YateBTS, and Section 6 concludes
the work with research comments.
126 A.L. Sankara et al.
2 Related work
Tencent Security (June 2016) revealed that a mobile banking trojan called Swearing
Trojan attacked a large number of Android users in China, stealing their bank passwords
and other sensitive personal information. Attackers use fake base transceiver stations
(BTSs) to send phishing SMS messages posing as messages from Chinese telecom
companies such as China Mobile and China Unicom. The use of a BTS to transmit fake
messages is complex, and the SMS content is misleading. Users are tricked into visiting a
fraudulent URL, which downloads malware. The Swearing Trojan is capable of
bypassing the security of two-factor authentication (Ahvanooey et al., 2017). The Federal
Communications Commission (FCC) established a task force in 2014 to look into the
extent to which criminal gangs and foreign intelligence services utilise IMSI catchers to
locate and identify nearby phones, intercept calls and text messages (Timberg, 2014). In
2012, there were reports of IMSI catchers being widely used in the Czech Republic
(Volynsky, 2012). Hadžialić and Mušovic (1999) discussed a GSM network one-way
authentication vulnerability that can be exploited to intercept mobile phone traffic and
track position data using an international mobile subscriber identity-catcher (IMSI
catcher) device. Song et al. (2012) described the use of software radio technologies to
create fake BTSs and demonstrated IMSI/IMEI catch and selective jamming assaults.
Glendrange et al. (2010) discussed combining AirProbe, the Universal Software Radio
Peripheral (USRP) radio platform, and GNU radio to create an IMSI catcher. Hadžialić
et al. (2014) presented the creation of an open-source IMSI catcher utilising a USRP
device, as well as a security attack based on sending malicious SMS to many mobile
users.
It is worth noting that the majority of researchers used rogue BTS to implement
various GSM network attack scenarios, according to the literature. Cybercriminals can
use such rogue BTS to perform crimes, and no research focusing on the forensics of
rogue BTS. The purpose of this research study is to describe methods for gathering
evidence in cases where a rogue BTS was used to perform a crime.
2.1 YateBTS
Yet Another Telephony Engine (YateBTS, n.d.) is a C++-based telephony engine that
supports a variety of scripting languages, including PHP, Python, Perl, JavaScript
libraries, and even any UNIX shell. To make developing external capabilities for Yate
easier, PHP, Python, Perl, and JavaScript libraries have been built and made accessible.
Its present focus on voice over internet protocol (VoIP) and the public switched
telephone network (PSTN). Its strength comes from its ability to be quickly expanded,
and it may be used for mobile telephony, VoIP networks, and PBX systems. Under
Yate’s flexible routing engine, voice, video, data, and instant messaging may all be
merged, maximising communications efficiency and lowering infrastructure costs for
enterprises. Yate has a JavaScript interpreter enabling easy-to-build telephony and
supports protocols such as Signalling System 7 (SS7) (Qasim et al., 2018), session
initiation protocol (SIP) (Jennings et al., 2016), diameter and radius, and media gateway
control protocol (MGCP) (Bertrand, 2007). It can be used as a VoIP server/client,
200-channel conference server, ‘call centre server’, SS7 switch, H.323 -> SIP proxy,
jabber server/client, conference server, IVR engine, ISDN passive and active recorder,
PC2Phone, or VoIP to PSTN gateway, among other things.
Forensics of a rogue base transceiver station 127
3 Laboratory setup
An software defined radio (SDR), two quad-band cellular duck antennas SMA, a
Raspberry Pi 3 model B and laptop Idea Pad Z580 Intel Core i5, telephony engine Yate,
and the BTS (YateBTS) were configured (Appendix). Figure 1 depicts the configuration
of a rogue BTS laboratory, and an attacker can use the same hardware and software to
setup the laboratory for numerous attacks. Our goal is to employ rogue BTS to carry out a
series of attacks and then use various digital forensics techniques (Rathod, 2017) to
capture or retrieve crucial artefacts that can be used to verify that the same hardware and
software were used to carry out the attacks.
In the following section, Yate and YateBTS Open Source software is discussed with
different goals.
Figure 1 Rogue BTS lab setup (see online version for colours)
4 Methodology
A laptop, a telephony engine called Yate, the BTS (YateBTS), and a Raspberry Pi 3
model B were used to configure the rogue BTS. The investigator gathers and analyses
information from the devices used by the attacker to replicate the attack. Figure 2(a)
depicts a process for investigating such devices. The investigator must remove the SD
card from the Raspberry Pi and use the FTK imager to produce an image of it. EnCase is
used to collect the files or folders from which the investigator can gather evidence from
the produced image. In the instance of the Raspberry Pi 3, we found key evidence in files
such as bash history, user.log, auth.log, and messages, as shown in Figure 2(a).
In the case of YateBTS, we used manual digital forensics (Rathod and Wangchuk,
2021) procedures to collect the important file. We discovered crucial files such as
BladeRF-cli, cdrfile.conf, ggsn.log, nib.js, tmsidata.conf, and subscribers.conf, as shown
in Figure 2(a).
In Section 6, the importance of gathered evidence in the cases of Raspberry Pi 3 and
YateBTS, as well as their relevance to the case, is explored in depth. The investigator
must demonstrate in court that the attacker simulated an attack utilising the rogue BTS,
which includes a laptop, YateBTS, and Raspberry Pi, and these devices are connected
with each other.
128 A.L. Sankara et al.
Figure 2 (a) Methodology (b) Hashes (see online version for colours)
(a)
(b)
The SD card of the Raspberry Pi 3 was imaged using FTK imager (Dykstra and Sherman,
2012), and the same image was processed using EnCase (Garber, 2001) to extract
evidence, as shown in Figure 3.
5 Recovered artefacts
In this section, we explained the process of extracting evidence from rogue BTS devices
and Raspberry Pi that had been seized, as well as we analysed the devices using various
tools and methodologies to extract as much information as possible.
After acquiring and processing the image file, we must verify the hashes calculated
while acquiring the image and those by EnCase. Figure 2(b) shows that both the hash
value is matched. It will allow to prove to the court that the file has not been modified
during acquisition and analysis.
Forensics of a rogue base transceiver station 129
5.1.2 Activities
This file contains the list of activities performed by the attacker, activities related to
opening a particular YateBTS configuration file with the exact time and date at which the
operation was carried out, as shown in figure 4.
Attackers altered the Ybts.conf file, which contains parameters inherited from
OpenBTS as well as a few other YBTS-related parameters that were introduced to
regulate the connection between MBTS and YBTS, according to the user.log entries.
Time stamp is very important to re-construct the case.
• Evidence file: /var/log/user.log.
Figure 4 Activities performed by the attacker (see online version for colours)
Figure 6 Log shows machine model and MAC address of Raspberry Pi (see online version
for colours)
Figure 9 BladeRF-cli: shows firmware and FPGA (see online version for colours)
Forensics of a rogue base transceiver station 133
The bladeRF-cli utility is used to flash firmware files, load FPGA bitstreams, and
perform other tasks on the Nuand Bladerf software-defined radio system.
Figure 10 shows that call detail records (CDRs) are saved in the yate-cdr.csv file and the
format of the file is format = ${time}, “${billid}”, “${chan}”, “${address}”, “${caller}”,
“${called}”, ${billtime}, ${ringtime}, ${duration}, “${direction}”, “${status}”,
“${reason}” (CDR File Module – Yate Documentation, n.d.). As shown in Figure 11,
column A shows ${time}, column D shows ${address}, column E shows ${caller},
column F shows ${called}, column I shows ${duration}, column J shows ${direction}
and column K shows ${status} which is very important evidence for the investigator to
understand how an attacker simulated attacks.
A (1) (Figure 11) indicates the date and time of the call as 1489149738.254, which is
in Unix epoch time format. Date and time = ((A1 + 19800) / 86400) + 25569 is the
formula for converting epoch to IST date and time.
Where A1 is the epoch number and 19800 is the IST time zone adjustment.
((1489149738.254 + 19800) / 86400) + 25569 = 42804.76.
We have used the format cell functionality of Microsoft Excel with the date and time
option to convert 42804.76 to IST. The final calculated date and time value is 10 March
2017 06:12:18 PM.
134 A.L. Sankara et al.
The investigator can interpret (Figure 11) the call received (K (1)) by mobile number
ended with 0019 mobile number and they talked for 30.143 seconds (I (1)). This evidence
is very important to find out whether a hacker has called whom or received a call from
whom.
the phone was linked to BTS and was used to commit the crime. This information is also
important in cybercrime situations using the IMSI-catcher.
• Evidence file:/usr/local/etc/yate/tmsidata.conf.
The following are the important parameters that the investigator is interested in: Identity.
MCC stands for mobile country code. The MCC indicates the country, for example, 460
for China and 310 for the USA. Mobile network code (identity, MNC) is a code that
identifies a mobile network and the mobile operator is identified by this code
(CellIdFinder, n.d.). Identity, location area code (LAC) is a unique number within the
current location area. A location area is a collection of base stations grouped together to
improve signalling. A unique LAC is assigned to each BTS unit in multi-BTS networks,
and CellID (CID) – a CID is a generally unique number used to identify each BTS or
sector of a BTS inside a geographic area code.
References
Ahvanooey, M.T., Li, Q., Rabbani, M. and Rajput, A.R. (2017) ‘A survey on smartphones security:
software vulnerabilities, malware, and attacks’, International Journal of Advanced Computer
Science and Applications, Vol. 8, pp.30–45, DOI: 10.14569/IJACSA.2017.081005.
Bertrand, G. (2007) The IP Multimedia Subsystem in Next Generation Networks, Network,
Multimedia and Security Department (RSM)-GET/ENST Bretagne.
CDR File Module – Yate Documentation (n.d.) [online] http://docs.yate.ro/wiki/CDR_File_
Module (accessed January 2021).
CellIdFinder (n.d.) How to Find the Cell ID Location with MCC, MNC, LAC and CellID (CID)
[online] https://cellidfinder.com/articles/how-to-find-cellid-location-with-mcc-mnc-lac-i-
cellid-cid (accessed January 2021).
Cooper, T.A. (2012) Integration of Open-Source GSM Networks, PhD Diss., Virginia Polytechnic
Institute and State University.
Dykstra, J. and Sherman, A.T. (2012) ‘Acquiring forensic evidence from infrastructure-as-a-service
cloud computing: exploring and evaluating tools, trust, and techniques’, Digit. Investig.,
Vol. 9, pp.S90–S98, DOI: 10.1016/j.diin.2012.05.001.
Finley, K. (2016) Out in the Open: This Super-Cheap Cellphone Network Brings Coverage Almost
Anywhere, 6 September 2014 [online] http://www.wired.com/2014/06/openbts/ (accessed 6
August 2016).
Garber, L. (2001) ‘EnCase: a case study in computer-forensic technology’, IEEE Computer
Magazine, January.
Glendrange, M., Hove, K. and Hvideberg, E. (2010) Decoding GSM, Norwegian University of
Science and Technology, Department of Telematics.
Hadžialić, M. and Mušovic, J. (1999) ‘An approach to analyze security of GSM network’, ETSI,
Digital Cellular Telecommunications System (Phase 2), Security-Related Network Functions,
3GPP TS 03.20 version 8.2.0 release.
Hadžialić, M., Škrbić, M., Huseinović, K., Kočan, I., Mušović, J., Hebibović, A. and
Kasumagić, L. (2014) ‘An approach to analyzing the security of GSM network’, in
Telecommunications Forum Telford (TELFOR), IEEE, 22 November, pp.99–102.
Home – Nuand (2021) Nuand, 12 January [online] http://nuand.com/ (accessed 12 January 2021).
Javascript NiPC – YateBTS (n.d.) [online] https://wiki.yatebts.com/index.php/Javascript_
NiPC#subscribers.conf (accessed September 2018).
Jennings, C., Peterson, J. and Rescorla, E. (2016) Authenticated Identity Management in the
Session Initiation Protocol (SIP) draft-ietf-stir-rfc4474bis-09, IETF.
Network in a PC – YateBTS (n.d.) [online] https://wiki.yatebts.com/index.php/Network_in_
a_PC#Web_UI_for_NiPC_Management (accessed September 2018).
Nuand – Configuration of Firmware [online] http://www.nuand.com/fx3/bladeRF_fw_v1.9.1.img
(accessed January 2021).
Nuand – Configuration of FPGA [online] http://www.nuand.com/fpga/v0.1.2/hostedx40.rbf
(accessed January 2021).
Nuand – Setting Up Yate and YateBTS with the BladeRF [online] https://github.com/Nuand/
bladeRF/wiki/Setting-up-Yate-and-YateBTS-with-the-bladeRF (accessed January 2021).
Ooi, J. (2015) IMSI Catchers and Mobile Security [online] https://www.cis.upenn.edu/
currentstudents/undergraduate/courses/documents/EAS499Honors-IMSICatchersandMobile
Security-V18F-1.pdf.
Qasim, T., Durad, M.H., Khan, A., Nazir, F. and Qasim, T. (2018) ‘Detection of signaling system 7
attack in network function virtualization using machine learning’, 15th International Bhurban
Conference on Applied Sciences and Technology (IBCAST), 9–13 January.
Rathod, D. (2017) ‘Web browser forensics: Google Chrome’, Intl. J. Adv. Res. Compu. Sci., Vol. 8,
No. 7, pp.518–522.
140 A.L. Sankara et al.
Rathod, D. and Wangchuk, T. (2021) ‘Forensic and behavior analysis of free android VPNS’,
J. Adv. App. Eng. Tech. and Mang., Vol. 1, No. 1, pp.91–101.
Recent Posts (n.d.) [online] https://forum.yate.ro/index.php?action=recent (accessed September
2018).
Redl, S., Weber, M. and Oliphant, M. (1995) An Introduction to GSM, Artech House, Norwood,
MA, USA.
Song, Y., Zhou, K. and Chen, X. (2012) ‘Fake BTS attacks of GSM system on software radio
platform’, Journal of Network, Vol. 7, No. 2, pp.275–281.
Timberg, C. (2014) Feds to Study Illegal Use of Spy Gear [online] https://www.washingtonpost.
com/blogs/the-switch/wp/2014/08/11/feds-to-study-illegal-use-of-spy-gear
(accessed 12 January 2021).
Volynsky, M. (2012) Spy Games Turn Real as Eavesdropping Technology Spreads [online]
http://www.radio.cz/en/section/curraffrs/spy-games-turn-real-as-eavesdropping-technology-
spreads (accessed 12 January 2021).
YateBTS (n.d.) YateBTS – LTE & GSM Mobile Network Components for MNO & MVNO [online]
http://yatesbts.com/ (accessed September 2018).
Ybts.conf – YateBTS (n.d.) [online] https://wiki.yatebts.com/index.php/Ybts.conf (accessed
September 2018).
Appendix