Rodan Telecom Exploitation Framework
Disclaimer
Rodan framework is provided so that you can test your systems against threats, understand the nature of these threats, and protect your own systems from similar attacks. Do not attempt to violate the law using Rodan. If this is your intention, then LEAVE NOW!
Any actions and/or activities related to the uses of Rodan is solely your responsibility. The misuse of Rodan can result in criminal charges brought against the persons in question. The authors and Etisalat Egypt will not be held responsible in the event any criminal charges be brought against any individuals misusing Rodan to break the law.
Introduction
Rodan is a telecom signaling exploitation framework created and maintained by Etisalat Egypt Research Labs (E-Labs). This framework includes a suite of modules that enable users to exploit vulnerabilities in the signaling protocols used by mobile operators. Rodan currently supports SS7 and Diameter protocols with plans to support GTP and SIP.
Authors
Features
- Network and Subscriber Information Disclosure.
- Location Tracking.
- SMS Interception.
- Call Redirection.
- Fraud.
- GT/Host Brute Forcing.
- Advanced Filtering Bypass:
- Malformed ACN.
- Substitution of Operation Code Tag.
- Double MAP Component.
- E.214 Numbering Plan
- Calling Party/Origin Host Spoofing.
- SS7 Simulation Network.
Rodan has a look and feel similar to the Metasploit Framework, reducing the learning curve for leveraging the framework.
NOTE: Knowledge of SS7 and Diameter signaling protocols is required to use Rodan framework
Installation instructions
Supported OS:
- Linux OS
1. Download source code
Download and extract the source:
$ unzip rodan-master
$ cd rodan-master
NOTE: Instead of downloading the compressed source, you may instead want to clone the GitHub
repository: git clone https://github.com/Etisalat-Egypt/Rodan.git
2. Build
2.1. Build using Docker
The easiest way to build Rodan is using provided Docker build container, and use it with the included simulation network.
Prerequisites
Edit SS7/Diameter association details, and IP addresses in YAML configuration files included in build/config folder (default configuration files are ok for running inside simulation network).
$ cd build/scripts
$ chmod +x build-docker.sh
$ ./build-docker.sh
2.2. Standalone build
To create the latest development build from this source repository:
Install build tools:
Install Linux SCTP tools:
$ sudo apt install lksctp-tools
Disable Maven's default http blocker by removing or commenting out below element in settings.xml.
<mirror>
<id>maven-default-http-blocker</id>
<mirrorOf>external:http:*</mirrorOf>
<name>Pseudo repository to mirror external repositories initially using HTTP.</name>
<url>http://0.0.0.0/</url>
<blocked>true</blocked>
</mirror>
</mirrors>
Build framework and stack extentions:
$ cd build/scripts
$ chmod +x build-standalone.sh
$ ./build-standalone.sh
3. Run
3.1. Run using Docker
Run startup script:
$ cd build/scripts
$ chmod +x start-docker.sh
$ ./start-docker.sh
Open a new terminal and attach to the Intruder container
$ docker attach intruder
3.2. Run as a standalone
Edit SS7/Diameter association details, and IP addresses in YAML configuration files included in build/config folder.
Run:
$ cd build/scripts
$ chmod +x start-standalone.sh
$ ./start-standalone.sh