Page 3 of 3 FirstFirst 123
Results 21 to 26 of 26

Thread: Cellular networks down/under attack across the nation

  1. #21
    Smoke Bomb / Ninja Vanish Chance's Avatar
    Join Date
    Nov 2011
    I don't know much about how a router would be configured in this particular use case, but I'm really straining to think of how this could be useful for espionage.

    Most encryption takes place at the transport and application layers, and since this equipment is presumably carrying primarily mobile traffic, that seems an unlikely medium to be exhanging worthwhile secrets. Stealing crypto keys doesn't make any sense unless you've intercepted and stored all the traffic going between those routers, and if you can do that without being noticed, sending one dude to get 16 of them one-after-the-other is a pretty dramatic dip in sophistication. And - as has already been mentioned - unless the nonvolatile storage isn't encrypted, you'd have to get the keys in situ, which would negate the point of stealing the entire physical thing.

    Sounds like a whackjob trying to halt the spread of coronavirus by taking out 5G or something.
    "Sapiens dicit: 'Ignoscere divinum est, sed noli pretium plenum pro pizza sero allata solvere.'" - Michelangelo

  2. #22
    Quote Originally Posted by Chance View Post
    I don't know much about how a router would be configured in this particular use case, but I'm really straining to think of how this could be useful for espionage.

    Most encryption takes place at the transport and application layers, and since this equipment is presumably carrying primarily mobile traffic, that seems an unlikely medium to be exhanging worthwhile secrets. Stealing crypto keys doesn't make any sense unless you've intercepted and stored all the traffic going between those routers, and if you can do that without being noticed, sending one dude to get 16 of them one-after-the-other is a pretty dramatic dip in sophistication. And - as has already been mentioned - unless the nonvolatile storage isn't encrypted, you'd have to get the keys in situ, which would negate the point of stealing the entire physical thing.

    Sounds like a whackjob trying to halt the spread of coronavirus by taking out 5G or something.
    I think an expert could get a lot of intelligence on internal network topology from dumping the config off of ISP's routers.

    But you would not need 16 of them. All the routers from a cell site are going to be more or less the same.

    I think wackjob is a good bet, and the complaint is unsealed if anyone wants to go read it. I didn't want to pay the PACER fee.

  3. #23
    Site Supporter SeriousStudent's Avatar
    Join Date
    Mar 2012
    Location
    Texas
    Quote Originally Posted by hufnagel View Post
    If it was 1 or 2 units, I could see maybe trying to get config/key/password data out of them, for future attacks. But 16? That sounds more like black market wholesale.
    As for "user" data... that'd for the most part be stored in volatile RAM, and once you killed power it'd be gone.
    Yup, you lose the run config on Cisco gear when the electrons go bye bye.

    I think the dude was just trying to steal shit and resell.

  4. #24
    Site Supporter OlongJohnson's Avatar
    Join Date
    Mar 2015
    Location
    "carbine-infested rural (and suburban) areas"
    Quote Originally Posted by hufnagel View Post
    But 16? That sounds more like black market wholesale.
    Aren’t the cartels setting up their own cell networks? I imagine it’s not a simple matter of placing a PO with a strait distributor to buy these things.
    .
    -----------------------------------------
    Not another dime.

  5. #25
    Site Supporter
    Join Date
    Jul 2016
    Location
    Away, away, away, down.......
    Quote Originally Posted by OlongJohnson View Post
    Aren’t the cartels setting up their own cell networks? I imagine it’s not a simple matter of placing a PO with a strait distributor to buy these things.
    With cartel money I’m pretty sure they could simply place an order to a factory in China face to face using one of the guys they have there already making deals with factories that supply all the precursor chemicals they use for cooking meth and processing other drugs.
    im strong, i can run faster than train

  6. #26
    Site Supporter hufnagel's Avatar
    Join Date
    Feb 2011
    Location
    NJ 07922
    Maybe. Maybe it's cheaper and quicker to just steal them?
    Just because you have a literal box truck of money, doesn't mean you need to spend like you have a literal box truck of money.
    Rules to live by: 1. Eat meat, 2. Shoot guns, 3. Fire, 4. Gasoline, 5. Make juniors
    TDA: Learn it. Live it. Love it.... Read these: People Management Triggers 1, 2, 3
    If anyone sees a broken image of mine, please PM me.

User Tag List

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •