TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Binary SMS – The old backdoor to your new thing

213 pointsby wolframioabout 7 years ago

12 comments

robert_tweedabout 7 years ago
Back around 2000, shortly after The Matrix came out and everyone was buying &quot;those&quot; Nokia phones, I was tasked with writing a couple of applets for a certain UK mobile phone operator.<p>One applet was to design operator logos. The other was to compose ringtones. Both popular things at the time. I was given access to an SMS gateway, a PDF of the Nokia message format and a deadline.<p>The exact UI was phone-dependent, but typically these updates would pop up a confirm box saying &quot;Accept new ringtone?&quot; or something similar. I was surprised to discover that this was triggered by sending an SMS, because there was usually no indication that a message had been received. If you were lucky you would be told where the file had come from, but often the phone just assumed it was an update from the network. On some phones there wasn&#x27;t even an alert, it would just obey, silently.<p>The message just had to start with &quot;&#x2F;&#x2F;SCKL&quot;, followed by a code, followed by some data. That&#x27;s it. On first reading I assumed the &quot;header&quot; part would require direct access to the SMS gateway, like the SMTP HELO or similar.<p>Nope. First thing I tried once I had some PoC data was to send a message from my phone directly to a colleague. It worked.<p>Over the course of that project I sent so many of those text messages I still can&#x27;t get the code &#x2F;&#x2F;SCKL1581 out of my head. JFTR, sending someone a really awful ringtone (a single diminished fifth or something) is way more annoying than sending them &quot;0&quot; as an operator logo, especially if their phone only has one ringtone.<p><a href="https:&#x2F;&#x2F;www.activexperts.com&#x2F;sms-component&#x2F;sms&#x2F;sckl&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.activexperts.com&#x2F;sms-component&#x2F;sms&#x2F;sckl&#x2F;</a>
评论 #17101970 未加载
donttrackabout 7 years ago
I wonder why we haven&#x27;t seen more exploits targeting SMS PDU mode. Is it the barrier for script kiddies just too high? You would probably need a network tester of some kind to properly try to find exploits.<p>I used to work for a big mobile phone manufacturer and once in a while we would get &quot;secret&quot; fixes to merge into the source. The commit message would be something unrelated and the builds would be pushed silently without much fanfare.<p>I was in charge for the merging, which is how I know this. Some of those fixes were for SMS PDU mode or related to stuff happening when PDUs were received. Not sure how phones handle these messages today, but I assume they follow spec, which means there are certain SMS PDUs which will be reacted on silently in the background (stuff in the PDU body is parsed and applications launched if necessary).<p>I should try to get an old R&amp;S tester from eBay maybe. Could be fun to try to explore this area. Could be a nice security business niche to get into.
评论 #17099490 未加载
HillaryBrissabout 7 years ago
<i>Law Enforcement can track a phone with &#x27;silent&#x27; SMS messages designed not to alert the user.</i><p>well, that&#x27;s something i didn&#x27;t know
评论 #17099874 未加载
评论 #17099505 未加载
评论 #17099479 未加载
app4softabout 7 years ago
It just remind me dirty &#x27;hack&#x27; from 2005-2010: if you set format for SMS as &quot;E-Mail&quot; on <i>Siemens C65&#x2F;C72</i> phone, then send SMS from this <i>Siemens phone</i> to <i>SonyEricsson K210&#x2F;K750</i> phone -- this SMS on <i>SonyEricsson phone</i> shown as <i>sent from anonymous</i> ;-)
评论 #17101334 未加载
derefrabout 7 years ago
I’ve always wanted to play around with raw SMS PDUs. You could construct MMSes “from scratch”, for example; or send “ephemeral alert” messages that (at least by the standard) don’t get stored in SMS conversation history, just popping up and then disappearing instead.<p>Does anyone know, then, why Twilio and its like don’t let you construct&#x2F;send raw binary PDUs? If it was a matter of cellular network security, well, that was already out the window once you let people with rooted phones into the network. Why not give virtual “phones” the same capability?
评论 #17098846 未加载
peterburkimsherabout 7 years ago
Are there tools available to monitor if I receive a silent SMS?<p>I think it&#x27;s safe to assume that all popular brands of phone are compromised and exploitable with these SMS PDUs. If I buy a Seeed Rephone open-source DIY kit and use it as a GSM-to-WiFi modem, will that be any more secure? I guess that reverse triangulation from cell towers is still possible to determine my location.
评论 #17101368 未加载
评论 #17099017 未加载
locknloadabout 7 years ago
SMS was always an effective procedure writing to certain parts of the phone without checks
codedokodeabout 7 years ago
&gt; Setting the PID to 0x64 would be a silent SMS known as a &#x27;type 0&#x27; SMS which all handsets receive and must acknowledge without indicating its receipt to the user. As previously mentioned, this has been used by law enforcement to actively &#x27;ping&#x27; a handset on a network.<p>I don&#x27;t like that. Why should a device that I have paid for contain this backdoor? Manufacturers should not forget from whom they get the money.<p>It might be difficult to fix in hardware but if it is handled in software then open source projects like Android could do it and do not reply to silent SMS or display them to the user.
评论 #17101290 未加载
评论 #17101381 未加载
pavel_lishinabout 7 years ago
Unrelated to the article, but when I zoomed in to 150%+ in Chrome, this image [1] turned into this image [2]:<p><a href="https:&#x2F;&#x2F;www.contextis.com&#x2F;media&#x2F;images&#x2F;made&#x2F;media&#x2F;images&#x2F;content&#x2F;RF_box.width-800_800_533_75.jpg" rel="nofollow">https:&#x2F;&#x2F;www.contextis.com&#x2F;media&#x2F;images&#x2F;made&#x2F;media&#x2F;images&#x2F;con...</a><p><a href="https:&#x2F;&#x2F;www.contextis.com&#x2F;media&#x2F;images&#x2F;made&#x2F;media&#x2F;images&#x2F;content&#x2F;RF_box.width-800_800_533_1.jpg" rel="nofollow">https:&#x2F;&#x2F;www.contextis.com&#x2F;media&#x2F;images&#x2F;made&#x2F;media&#x2F;images&#x2F;con...</a>
jiveturkeyabout 7 years ago
i used to use this (in my company) to provision OTP secrets. this was before iphone. after provisioning, OTP requests could be offline. thus no worries about sending an otp over sms.<p>of course the secret was itself encrypted via pre-provisioned Key Encrypting Key.<p>or users could manually enter the wrapped otp secret on the off chance the sms didn’t work. it worked for nokia and blackberry so that covered nearly 100%.<p>the article talks about abuse but in my case quite a useful “backdoor”.
secstuabout 7 years ago
Nice little write up. Rather than using the USRP I&#x27;d probably use a LimeSDR, if you can get hold of one.
noir-yorkabout 7 years ago
Great article! Thanks for posting.