mirror of
https://github.com/EFForg/rayhunter.git
synced 2026-04-26 15:39:59 -07:00
203 lines
6.9 KiB
Rust
203 lines
6.9 KiB
Rust
use std::borrow::Cow;
|
|
|
|
use pycrate_rs::nas::NASMessage;
|
|
use pycrate_rs::nas::emm::EMMMessage;
|
|
|
|
use super::analyzer::{Analyzer, Event, EventType};
|
|
use super::information_element::{InformationElement, LteInformationElement};
|
|
use log::debug;
|
|
|
|
use telcom_parser::lte_rrc::{
|
|
DL_DCCH_MessageType, DL_DCCH_MessageType_c1, UL_CCCH_MessageType, UL_CCCH_MessageType_c1,
|
|
};
|
|
|
|
const TIMEOUT_THRESHHOLD: usize = 50;
|
|
|
|
#[derive(PartialEq, Debug)]
|
|
pub enum State {
|
|
Unattached,
|
|
AttachRequest,
|
|
IdentityRequest,
|
|
AuthAccept,
|
|
Disconnect,
|
|
}
|
|
|
|
pub struct ImsiRequestedAnalyzer {
|
|
state: State,
|
|
timeout_counter: usize,
|
|
flag: Option<Event>,
|
|
}
|
|
|
|
impl Default for ImsiRequestedAnalyzer {
|
|
fn default() -> Self {
|
|
Self::new()
|
|
}
|
|
}
|
|
|
|
impl ImsiRequestedAnalyzer {
|
|
pub fn new() -> Self {
|
|
Self {
|
|
state: State::Unattached,
|
|
timeout_counter: 0,
|
|
flag: None,
|
|
}
|
|
}
|
|
|
|
fn transition(&mut self, next_state: State, packet_num: usize) {
|
|
match (&self.state, &next_state) {
|
|
// Reset timeout on successful auth
|
|
(_, State::AuthAccept) => {
|
|
debug!(
|
|
"reset timeout counter at {} due to auth accept (frame {})",
|
|
self.timeout_counter, packet_num
|
|
);
|
|
self.timeout_counter = 0;
|
|
}
|
|
|
|
// IMSI or IMEI requested after auth accept
|
|
(State::AuthAccept, State::IdentityRequest) => {
|
|
self.flag = Some(Event {
|
|
event_type: EventType::High,
|
|
message: format!(
|
|
"Identity requested after auth request (frame {})",
|
|
packet_num
|
|
),
|
|
});
|
|
}
|
|
|
|
// Unexpected IMSI without AttachRequest
|
|
(State::Disconnect, State::IdentityRequest) => {
|
|
self.flag = Some(Event {
|
|
event_type: EventType::High,
|
|
message: format!(
|
|
"Identity requested without Attach Request (frame {})",
|
|
packet_num
|
|
),
|
|
});
|
|
}
|
|
|
|
// IMSI to Disconnect without AuthAccept
|
|
(State::IdentityRequest, State::Disconnect) => {
|
|
self.flag = Some(Event {
|
|
event_type: EventType::High,
|
|
message: format!(
|
|
"Disconnected after Identity Request without Auth Accept (frame {})",
|
|
packet_num
|
|
),
|
|
});
|
|
}
|
|
|
|
// Notify on any identity reqeust (IMEI or IMSI)
|
|
(_, State::IdentityRequest) => {
|
|
self.flag = Some(Event {
|
|
event_type: EventType::Informational,
|
|
message: format!(
|
|
"Identity Request happened but its not suspicious yet. (frame {})",
|
|
packet_num
|
|
)
|
|
.to_string(),
|
|
});
|
|
self.timeout_counter = 0;
|
|
}
|
|
|
|
// All other transitions proceeed
|
|
_ => {
|
|
debug!(
|
|
"Transition from {:?} to {:?} at {}",
|
|
self.state, next_state, packet_num
|
|
);
|
|
}
|
|
}
|
|
self.state = next_state;
|
|
}
|
|
}
|
|
|
|
impl Analyzer for ImsiRequestedAnalyzer {
|
|
fn get_name(&self) -> Cow<'_, str> {
|
|
Cow::from("Identity (IMSI or IMEI) requested in suspicious manner")
|
|
}
|
|
|
|
fn get_description(&self) -> Cow<'_, str> {
|
|
Cow::from(
|
|
"Tests whether the ME sends an Identity Request NAS message without either an associated attach request or auth accept message",
|
|
)
|
|
}
|
|
|
|
fn get_version(&self) -> u32 {
|
|
3
|
|
}
|
|
|
|
fn analyze_information_element(
|
|
&mut self,
|
|
ie: &InformationElement,
|
|
packet_num: usize,
|
|
) -> Option<Event> {
|
|
if let InformationElement::LTE(inner) = ie {
|
|
match &**inner {
|
|
LteInformationElement::NAS(payload) => match payload {
|
|
NASMessage::EMMMessage(EMMMessage::EMMExtServiceRequest(_))
|
|
| NASMessage::EMMMessage(EMMMessage::EMMAttachRequest(_)) => {
|
|
self.transition(State::AttachRequest, packet_num);
|
|
}
|
|
NASMessage::EMMMessage(EMMMessage::EMMIdentityRequest(_)) => {
|
|
self.transition(State::IdentityRequest, packet_num);
|
|
}
|
|
NASMessage::EMMMessage(EMMMessage::EMMAttachComplete(_))
|
|
| NASMessage::EMMMessage(EMMMessage::EMMAuthenticationResponse(_)) => {
|
|
self.transition(State::AuthAccept, packet_num);
|
|
}
|
|
NASMessage::EMMMessage(EMMMessage::EMMServiceReject(_))
|
|
| NASMessage::EMMMessage(EMMMessage::EMMAttachReject(_))
|
|
| NASMessage::EMMMessage(EMMMessage::EMMDetachRequestMO(_))
|
|
| NASMessage::EMMMessage(EMMMessage::EMMDetachRequestMT(_))
|
|
| NASMessage::EMMMessage(EMMMessage::EMMTrackingAreaUpdateReject(_)) => {
|
|
self.transition(State::Disconnect, packet_num);
|
|
}
|
|
_ => {}
|
|
},
|
|
|
|
LteInformationElement::UlCcch(rrc_payload) => match rrc_payload.message {
|
|
UL_CCCH_MessageType::C1(UL_CCCH_MessageType_c1::RrcConnectionRequest(_))
|
|
| UL_CCCH_MessageType::C1(
|
|
UL_CCCH_MessageType_c1::RrcConnectionReestablishmentRequest(_),
|
|
) => {
|
|
self.transition(State::AttachRequest, packet_num);
|
|
}
|
|
_ => {}
|
|
},
|
|
|
|
LteInformationElement::DlDcch(rrc_payload) => {
|
|
if let DL_DCCH_MessageType::C1(DL_DCCH_MessageType_c1::RrcConnectionRelease(
|
|
_,
|
|
)) = rrc_payload.message
|
|
{
|
|
self.transition(State::Disconnect, packet_num)
|
|
}
|
|
}
|
|
_ => {}
|
|
}
|
|
};
|
|
|
|
if self.state == State::IdentityRequest {
|
|
self.timeout_counter += 1;
|
|
debug!(
|
|
"timeout: counter {}, packet: {}",
|
|
self.timeout_counter, packet_num
|
|
);
|
|
if self.timeout_counter >= TIMEOUT_THRESHHOLD {
|
|
self.flag = Some(Event {
|
|
event_type: EventType::Informational {},
|
|
message: format!(
|
|
"Identity request happened without auth request followup (frame {})",
|
|
packet_num
|
|
)
|
|
.to_string(),
|
|
});
|
|
self.timeout_counter = 0;
|
|
}
|
|
}
|
|
|
|
self.flag.take()
|
|
}
|
|
}
|