{"id":10570,"date":"2014-05-30T15:13:22","date_gmt":"2014-05-30T13:13:22","guid":{"rendered":"https:\/\/www.corelan.be\/?p=10570"},"modified":"2014-05-30T15:13:22","modified_gmt":"2014-05-30T13:13:22","slug":"hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/","title":{"rendered":"HITB2014AMS - Day 2 - On Her Majesty's Secret Service: GRX &#038; A Spy Agency"},"content":{"rendered":"<p>Last year, Belgacom got hacked by an intelligence service (GCHQ?), Rob says. \"What is so interesting about this hack, why did they hack into Belgacom, what would or could be the purpose of a similar hack?\" \u00a0Before answering those questions, we need to take a quick look on how mobile networks work and how mobile data travels the network.\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0588.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0588.jpg\" alt=\"DSC 0588\" width=\"600\" height=\"400\" border=\"0\" \/><\/p>\n<h4>Mobile data<\/h4>\n<p>In a mobile data network, it's necessary to know where you are. \u00a0KPN has about 5000 cells throughout the country, and each site has a Cell Identifier (CI). To group them together, an RAC (Route Area Code) is used. \u00a0Every country has its own unique number. \u00a0MCC 204, for example, corresponds with The Netherlands. \u00a0Additionally, each provider has a unique number. \u00a0<\/p>\n<p>To access the network, you need an APN (Access Point Name), an IMSI (International Mobile Subscriber Identify) and an UICC (Universal Integrated Circuit Card), which is stored on the SIM card. From a network perspective, Rob explains, even more components are needed and used. \u00a0Radio (BTS\/nodeB), a Home Location Register, a Service GPRS Support Node (SGSN), a Gateway GPRS Support Node and DNS servers are needed to provide connectivity. \u00a0<\/p>\n<p>When the phone sends a data packet, it will hit the data network first. \u00a0The packet reaches the SGSN\/S-GW and gets authenticated (HLR\/HSS). \u00a0After successful authentication, the device will resolve the APN name (using DNS). \u00a0Traffic is then sent to a gateway, and everything behind the gateway is plain TCP\/IP. \u00a0<\/p>\n<p>To make sure all devices can use their own tunnel, GPRS Tunneling protocol was created, Rob explains, to allow devices to have their own GPRS tunnel. \u00a0The protocol (GTPv0 GPRS, GTPv1 GPRS\/UMTS, GTPv2 LTE) is based on UDP. \u00a0The GTP specification can be found at http:\/\/www.3gpp.org\/DynaReport\/29060.htm<\/p>\n<p>When a telco gets hacked, there are a number of fields in the GPRS protocol that may be interesting for hackers. \u00a0The IMSI may be interesting, the APN (if it's hidden) and some other information such as MCC, MNC, LAC, CI and IMEI.<\/p>\n<h4>Roaming Mobile data<\/h4>\n<p>The setup for Mobile roaming is quite similar to a domestic setup. \u00a0A device first connects to a local network and the local SGSN will connect to the HLR of the home country to authenticate the device. After authentication, traffic is sent to the gateway in the home country.... \u00a0and to make that happen, the operators use GRX (GPRS Roaming Exchange). \u00a0 GRX is a concept based on GSMA, but *should* be segmented\/isolated from the rest of the network. \u00a0To understand why access to GRX traffic could be interesting to spy agencies, Stephen continues, we need to look at what the GTP traffic looks like and what is inside the packets.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0589.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0589.jpg\" alt=\"DSC 0589\" width=\"600\" height=\"400\" border=\"0\" \/><\/p>\n<p>Most of the current network analyzers don't really understand GTP (except for Telco specific ones), so Wesley (one of the people in the KPN Cert team) wrote a script to strip the GTP headers and dissect the traffic. \u00a0The script identifies the link layer header, detects the VLAN tag, checks for the IP\/UDP Header etc... \u00a0basically allowing the researchers to load the stripped PCAP file into NetworkMiner (http:\/\/www.netresec.com\/?page=NetworkMiner) and examine the actual GTP traffic contents. \u00a0 This also means that you can see all cleartext traffic (including credentials etc). \u00a0Being able to get access to GRX traffic can clearly be very valuable to spy agencies.<\/p>\n<p>Additionally, since the GTP headers contain location information, spies can use the traffic to gather information on where somebody is. www.numberingplans.com is a website that allows you to perform analysis of an IMEI number, including displaying information about the device. <a href=\"http:\/\/unwiredlabs.com\/api\">http:\/\/unwiredlabs.com\/api<\/a> can be used to get location information.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0591.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_05911.jpg\" alt=\"DSC 0591\" width=\"600\" height=\"400\" border=\"0\" \/><\/p>\n<p>Long story short, getting access to GRX traffic is a big deal and an obvious goal for spies and attackers in general.<\/p>\n<h4>Getting access to the GRX network ?<\/h4>\n<p>How easy would it be to get GRX access, providing that you are not an operator\/telco, Stephen wonders. \u00a0To determine how easy it would be, they used the \"kill-chain\" methodology, which is a typical penetration testing approach. \u00a0 They started the audit by looking at the GRX BGP Routing table (MNO's) and identified 4,8K subnets (320K IP addresses). \u00a0Next, they performed a \"masscan\" against all of the IPs (limited port scan) and performed a GTP ping (UDP 2152, 2123) using zmap, allowing them to discover all GTP enabled devices. \u00a0Going forward, they used SGSNEMU (part of OpenGGSN) to attempt to connect to GGSN, perform ping requests, create PDP context, and forward packets to connections on Gn\/Gp interfaces.<\/p>\n<p>Next, they attempted to discover the DNS servers used by the various telcos, which is used by GRX to resolve the APN in order to set up the GTP tunnel. Most operators seem to be running (mostly) Bind and Microsoff DNS, with some of the discovered Bind versions appeared to be quite old and vulnerable to DoS attacks. \u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0592.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_05921.jpg\" alt=\"DSC 0592\" width=\"600\" height=\"400\" border=\"0\" \/><\/p>\n<p>Additionally, they performed a scan for SMTP servers inside the network and discovered a wide variety of servers (Exim, Microsoft, Sendmail, qmail, etc). \u00a0It is unclear why these SMTP servers are present on the network. \u00a0 Next, they performed an FTP scan, Telnet scan, SMB scan, SNMP probing etc... \u00a0and they detected old &amp; vulnerable versions of all kinds of servers and daemons. \u00a0In other words, the GRX network does not only contain GRX related devices. \u00a0In short, it doesn't seem to be a dedicated\/isolated network at all. \u00a0 \u00a0<\/p>\n<p>Even worse, out of the 42K GRX live hosts, 5.5K hosts from 15 operators were reachable from the internet. So, if one of the vulnerable machines, connected to the internet, gets compromised, it could be used to get inside the GRX network. \u00a0None of the found devices should have been reachable from the internet in the first place.<\/p>\n<p>Going back to the Belgacom hack, it appears that the breach was based on a direct attack against administrators, instead of compromising external machines. This either means that Belgacom didn't have any exposed systems, the exposed Belgacom systems (if any) were protected well, or perhaps the type of access that could be gained by hacking a vulnerable servers was too limited. \u00a0By attacking an administrator, hackers would get access to a lot more internal systems right away.<\/p>\n<p>GRX traffic is definitely interesting. It has information on who you are and where you are and what you do. \u00a0It should have been isolated from other networks but that is not the case. \u00a0GRX traffic can definitely be interesting to attackers and spy agencies. \u00a0To prevent issues, operators could:<\/p>\n<ul>\n<li>Remove GRX prefixes from the BGP tables<\/li>\n<li>Use BGP authentication<\/li>\n<li>Configure routers to only import specific prefixes from specific AS numbers with roaming agreements<\/li>\n<li>Perform ingress filtering (BGP sessions, block spoofed IP addresses, allow GTP, DNS, ICMP... basically apply \"least possible privilege\" access lists)<\/li>\n<\/ul>\n<div><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" title=\"DSC_0593.jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0593.jpg\" alt=\"DSC 0593\" width=\"600\" height=\"400\" border=\"0\" \/><\/div>\n<p>\u00a0<\/p>\n<hr \/>\n<h3>About the speakers<\/h3>\n<p><strong>Stephen Kho <\/strong>is a penetration tester within the CISO team of the Netherland\u2019s largest telecoms provider KPN. He has been a professional pentester for over 10 years and has experience in security testing across several domains including network infrastructure, VoIP, ICS\/SCADA and web application. He presented a technical briefing entitled, \u201cSecuring Unified Communications \u2013 Vulnerability Analysis and Best Practises\u201d at UC Expo 2009 in London. More recently, he has been active in the areas of 3G &amp; 4G mobile communication security testing and this work led to a presentation titled \u201c4G LTE security \u2013 what a hacker knows and doesn\u2019t want you to know?\u201d at the OHM 2013 Security conference which he was a co-author &amp; presenter. Stephen\u2019s current research is focussed on the area of GRX (GPRS Roaming eXchange) networks security.<\/p>\n<p><strong>Rob Kuiters <\/strong>works as an incident response handler in the CISO team at KPN, the largest telecoms provider in the Netherlands. He has been involved in mobile networks from the very early start of GSM in the Netherlands. In 2007 he joined KPN-CERT as a technical mobile security specialist. The main focus of Rob\u2019s work is currently still in mobile networking. His research on the new 4G mobile network contributed to the talk \u201c4G LTE security \u2013 what a hacker knows and doesn\u2019t want you to know?\u201d at OHM 2013 Security Conference which he was a co-author &amp; presenter. The main areas of his current research is GRX (GPRS Roaming Exchange) and signalling networks security.<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Last year, Belgacom got hacked by an intelligence service (GCHQ?), Rob says. \"What is so interesting about this hack, why did they hack into Belgacom, what would or could be the purpose of a similar hack?\" \u00a0Before answering those questions, we need to take a quick look on how mobile networks work and how mobile &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"HITB2014AMS - Day 2 - On Her Majesty's Secret Service: GRX &#038; A Spy Agency\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[2775,509,261],"class_list":["post-10570","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-hitb","tag-exchange","tag-corelan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Networks: How Data Travels and Security Secrets<\/title>\n<meta name=\"description\" content=\"Learn how mobile data travels across networks and the security implications of authentication and access. Focus on Mobile Networks for deeper insights.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Networks: Data Travel and Security Insights for Analysts\" \/>\n<meta property=\"og:description\" content=\"Uncover mobile data movement and security protecting your connections.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-30T13:13:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0588.jpg\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Mobile Networks: Data Travel &amp; Security Insights for Analysts\" \/>\n<meta name=\"twitter:description\" content=\"Discover data movement in networks and practical security lessons.\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"HITB2014AMS - Day 2 - On Her Majesty's Secret Service: GRX &#038; A Spy Agency\",\"datePublished\":\"2014-05-30T13:13:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/\"},\"wordCount\":1395,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0588.jpg\",\"keywords\":[\"hitb\",\"MS Exchange\",\"corelan\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/\",\"name\":\"Mobile Networks: How Data Travels and Security Secrets\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0588.jpg\",\"datePublished\":\"2014-05-30T13:13:22+00:00\",\"description\":\"Learn how mobile data travels across networks and the security implications of authentication and access. Focus on Mobile Networks for deeper insights.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0588.jpg\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/DSC_0588.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2014\\\/05\\\/30\\\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HITB2014AMS &#8211; Day 2 &#8211; On Her Majesty&#8217;s Secret Service: GRX &#038; A Spy Agency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Networks: How Data Travels and Security Secrets","description":"Learn how mobile data travels across networks and the security implications of authentication and access. Focus on Mobile Networks for deeper insights.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Networks: Data Travel and Security Insights for Analysts","og_description":"Uncover mobile data movement and security protecting your connections.","og_url":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2014-05-30T13:13:22+00:00","og_image":[{"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0588.jpg","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_title":"Mobile Networks: Data Travel &amp; Security Insights for Analysts","twitter_description":"Discover data movement in networks and practical security lessons.","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"HITB2014AMS - Day 2 - On Her Majesty's Secret Service: GRX &#038; A Spy Agency","datePublished":"2014-05-30T13:13:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/"},"wordCount":1395,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0588.jpg","keywords":["hitb","MS Exchange","corelan"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/","url":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/","name":"Mobile Networks: How Data Travels and Security Secrets","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0588.jpg","datePublished":"2014-05-30T13:13:22+00:00","description":"Learn how mobile data travels across networks and the security implications of authentication and access. Focus on Mobile Networks for deeper insights.","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0588.jpg","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2014\/05\/DSC_0588.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2014\/05\/30\/hitb2014ams-day-2-on-her-majestys-secret-service-grx-a-spy-agency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"HITB2014AMS &#8211; Day 2 &#8211; On Her Majesty&#8217;s Secret Service: GRX &#038; A Spy Agency"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":7514,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=10570"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/10570\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=10570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=10570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=10570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}