標題:美國少年利用 iOS 漏洞攻擊報案系統,警察局電話險被打爆!
摘要:
根據 Maricopa 郡警長辦公室的說法,德賽伊開發了 JavaScript 腳本發動攻擊,並把腳本分享在 Twitter 和其他網站上。如果通過 iPhone 去訪問德賽伊提供的聯結,那麼手機就會自動不斷撥打 911 電話。
根據 Maricopa 郡警長辦公室的說法,德賽伊開發了 JavaScript 腳本發動攻擊,並把腳本分享在 Twitter 和其他網站上。如果通過 iPhone 去訪問德賽伊提供的聯結,那麼手機就會自動不斷撥打 911 電話。
調查人員表示,這些 iPhone 從美國全國範圍內撥打 911 電話,響一聲就掛。德州和加州等相關部門均表示,他們發現了這種響一聲電話的成長。
受影響最大的是鳳凰城地區,即德賽伊及其好友的所在地區。Peoria 警察局和 Maricopa 郡警長辦公室均表示,他們接到了大量 911 電話。而 Surprise 警察局在短時間內曾接到過 100 個電話,幾乎導致系統癱瘓。
今 年 9 月,以色列內蓋夫本-古里安大學資訊安全研究中心的科學家發佈研究報告顯示,只需要 6000 部智慧型手機,就可以對美國的 911 系統發起 DDoS 攻擊。
原始資料:
Here's How Hackers Can Disrupt '911' Emergency System and Put Your Life at Risk
http://thehackernews.com/2016/09/hacking-911-emegency.html
Here's How Hackers Can Disrupt '911' Emergency System and Put Your Life at Risk
http://thehackernews.com/2016/09/hacking-911-emegency.html
Teenage Hacker Arrested For Disrupting 911 Service With DDoS Attack
http://thehackernews.com/2016/10/hacking-911-service.html
http://thehackernews.com/2016/10/hacking-911-service.html
研究報告下載處:
9-1-1 DDoS: Threat, Analysis and Mitigation
https://arxiv.org/ftp/arxiv/papers/1609/1609.02353.pdf
9-1-1 DDoS: Threat, Analysis and Mitigation
https://arxiv.org/ftp/arxiv/papers/1609/1609.02353.pdf
語法1:A Bot (No-SIM + IMEI Spoofing)
1: procedure Start-DDoS
2: // set the device state
3: Invoke(IMSI-Detach-procedure)
4: SetDeviceState(No-SIM)
5: // main DDoS loop. Stops when user activity detected
6: while (no key-pressed) do
7: SetIMEI(randomIMEI)
8: InitiateEmergencyCall()
9: yield(Call-End-event)
10: end while
11: // restore the device state and attach
12: SetIMEI(origionalIMEI)
13: SetDeviceState(Attached-SIM)
14: Invoke(IMSI-Attach-procedure)
15: Return
1: procedure Start-DDoS
2: // set the device state
3: Invoke(IMSI-Detach-procedure)
4: SetDeviceState(No-SIM)
5: // main DDoS loop. Stops when user activity detected
6: while (no key-pressed) do
7: SetIMEI(randomIMEI)
8: InitiateEmergencyCall()
9: yield(Call-End-event)
10: end while
11: // restore the device state and attach
12: SetIMEI(origionalIMEI)
13: SetDeviceState(Attached-SIM)
14: Invoke(IMSI-Attach-procedure)
15: Return
語法2:A Bot (No-SIM + IMEI Spoofing)
1: procedure Start-DDoS
2: // main DDoS loop. Stops when user activity detected
3: while (no key-pressed) do
4: // set random IMSI and attach
5: Invoke(IMSI-Detach-procedure)
6 SetIMSI(randomIMSI)
7: Invoke(IMSI-Attach-procedure)
8: InitiateEmergencyCall()
9: // Call N times with the same identity
10: for (݅=1,…,ܰ) do
1: InitiateEmergencyCall()
12: yield(Call-End-event)
11 end for
10: end while
11: // restore the device identifiers and attach
12 Invoke(IMSI-Detach-procedure)
13: SetIMSI(originalIMSI)
14: Invoke(IMSI-Attach-procedure)
15: Return
1: procedure Start-DDoS
2: // main DDoS loop. Stops when user activity detected
3: while (no key-pressed) do
4: // set random IMSI and attach
5: Invoke(IMSI-Detach-procedure)
6 SetIMSI(randomIMSI)
7: Invoke(IMSI-Attach-procedure)
8: InitiateEmergencyCall()
9: // Call N times with the same identity
10: for (݅=1,…,ܰ) do
1: InitiateEmergencyCall()
12: yield(Call-End-event)
11 end for
10: end while
11: // restore the device identifiers and attach
12 Invoke(IMSI-Detach-procedure)
13: SetIMSI(originalIMSI)
14: Invoke(IMSI-Attach-procedure)
15: Return
沒有留言:
張貼留言