Skip to content
Explore All

MITM on PSTN


Course
Enroll

Kirils Solovjovs of Possible Security exposes novel methods for intercepting phone calls through PSTN vulnerabilities, demonstrating how attackers can exploit SS7 protocols and call routing mechanisms.

The Public Switched Telephone Network, PSTN, remains a critical global communications infrastructure, processing billions of calls daily. Despite its reputation for security through dedicated lines, recent discoveries reveal concerning vulnerabilities that allow remote interception and manipulation of phone calls worldwide.

The interconnected nature of modern telephony, combining traditional PSTN with mobile networks and VoIP systems, creates unique security challenges. By exploiting weaknesses in caller ID systems, SS7 protocols and call routing mechanisms, attackers can intercept and alter phone conversations from anywhere in the world without physical access to telephone lines.

Given the widespread use of phone communications for sensitive business transactions and two-factor authentication, it's crucial for security professionals to understand these emerging attack vectors and strengthen defenses across telecommunications infrastructure.

This session, led by Kirils Solovjovs, hacker at Possible Security, will cover:

  • Novel techniques for intercepting phone calls using simultaneous ring attacks
  • Methods for exploiting call diversion through SS7 and ENUM vulnerabilities
  • Practical approaches for altering call content and metadata in real time
  • Solutions for securing modern telephony systems against remote interception

Here is the course outline:

MITM on PSTN - Novel Methods for Intercepting Phone Calls