Plus the models looked really, really good, so I couldn’t resist. Not merely a game between players, the board had an agenda of its own and everything was subject to the consequences of hacking and digital warfare alongside the usual blast, slash and fisticuffs. Fusing small scale skirmish combat with RPG and management aspects, it offered a progressive mission-based campaign with unique augmented characters, all of whom could be upgraded with a variety of cybertech and weaponry. Centred on the struggle between two mega corporations and the rogue AI within the titular Nakamura tower, HINT promised a hybrid gaming experience that scratched many of my casual gamer itches. As a casual gamer with a love of the obvious, I had to find out more. The transceiver is the key hardware factor in the BTS station rig, which transmits and receives data between the BTS core software and the radio antenna.Early last year indie developers Postindustrial Games announced Human Interface Nakamura Tower, their forthcoming cyberpunk hybrid boardgame. An attacker can perform commands on the BTS station’s transceiver module, if the attacker can send routine UDB traffic to the BTS station, as the control channel features no validation. This bug is as unsafe as the attacker’s skills. This is a classic remote code execution flaw (RCE) that allows the attacker run malicious code on the device. The second concern is a memory buffer overflow caused by enormous UDP packets. In this case, Zimperium suggests that companies bind the sockets used for control and data exchange only to the local interface (127.0.0.1), or install a firewall to stop external traffic. This allows the attacker to take remote control of the BTS station, remove information from the passing data, make changes to the GSM traffic, crash the BTS station, or worse. The cell towers are basically composed of software and radio equipment that allows mobile stations (cellular phones) to connect to the GSM, UMTS, and LTE networks.īTS stations for the gist of GSM telephony network and are used by service providers to pass on your SMS messages, transmit calls, and data packets from our phones to the mobile operator’s data center, which in turn relays the SMS messages to their destination, interconnect calls, and sends data packets over the Internet to the servers we are trying to reach.Īttackers can take advantage of the device’s built-in features by sending UDP packets to certain management ports (5700, 5701, 5702). The Zimperium researchers have said that the flaw is so critical that it allows hackers to abuse, hijack, and crash mobile cell towers.īTS (Base Transceiver Station) is the technical term used to define cellular phone towers we see plastered in our cities, towns, villages, and spread all over the fields, hills, and mountains. You and I are afraid of somebody hacking our smartphones and stealing critical information, but what happens when hackers hijack a whole cellular network by hacking into cellphone towers? No, this is not an empty threat because, security researchers from the mobile security firm, Zimperium have discovered three serious security flaws in BTS stations which can allow potential hacker remotely hijack the entire cell phone tower.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |