{"id":150,"date":"2011-03-11T08:34:00","date_gmt":"2011-03-11T13:34:00","guid":{"rendered":"http:\/\/www.digitalundercurrents.com\/blog\/?p=150"},"modified":"2011-03-11T08:34:00","modified_gmt":"2011-03-11T13:34:00","slug":"disabling-gsm-phones-with-sms","status":"publish","type":"post","link":"http:\/\/www.digitalundercurrents.com\/blog\/?p=150","title":{"rendered":"Disabling GSM Phones With SMS"},"content":{"rendered":"<p>Researchers at CanSecWest gave a presentation this week on <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/cansecwest-researchers-show-method-disabling-phones-sms-030911\">disabling various GSM phones using only SMS messaging<\/a>. OpenBSC, an open source toolkit, was used to build a custom GSM network and the SMS messages were generated using it. Phones could be frozen, rebooted, locked, even completely bricked.<\/p>\n<p>From one of the comments on the article:<\/p>\n<div>\n<blockquote><p>It&#8217;s actually pretty well known &#8211;has been known for a while, too&#8211; that handsets are mostly tested against the few types of base stations Out There and, er, that&#8217;s it. Malicious input checking? Never needed; all the base stations are made by just a few manufacturers, right? Right?<\/p>\n<p>Well, that&#8217;s what OpenBSC changed. Phones are still back where computers were back in the eighties. And now we can poke at them. There&#8217;s more where this came from. Far more.<\/p><\/blockquote>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at CanSecWest gave a presentation this week on disabling various GSM phones using only SMS messaging. OpenBSC, an open source toolkit, was used to build a custom GSM network and the SMS messages were generated using it. Phones could be frozen, rebooted, locked, even completely bricked. From one of the comments on the article: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,5,3],"tags":[],"class_list":["post-150","post","type-post","status-publish","format-standard","hentry","category-exploits","category-smartphones","category-syndicated"],"_links":{"self":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=150"}],"version-history":[{"count":0,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/150\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=150"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.digitalundercurrents.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}