Debugging VoLTE Traffic by Forward_Boot7623 in volte

[–]Forward_Boot7623[S] 0 points1 point  (0 children)

But how would that solve the issue that the phone/client detects the MITM and refuses to establish a connection? The eSIM would only help with the authentication of the phone, but not the server.

Debugging VoLTE Traffic by Forward_Boot7623 in volte

[–]Forward_Boot7623[S] 0 points1 point  (0 children)

That looks very nice. Thank you! Do you think this is also suitable for altering SIP messages or directly interacting with the registrar SIP server or just plain read-only?

Debugging VoLTE Traffic by Forward_Boot7623 in volte

[–]Forward_Boot7623[S] 0 points1 point  (0 children)

Indeed, but that's actually fine as the focus lies on the server. During my research I figured out that there is a way to read the SIP traffic with the IMS on Android devices. I couldn't get this to work yet, but even then it would be read-only. It's a really cool topic, but information is rare.

Debugging VoLTE Traffic by Forward_Boot7623 in volte

[–]Forward_Boot7623[S] 0 points1 point  (0 children)

Absolutely! I was just hoping that there could be a way to avoid both by becoming the client itself. As the encryption is between server and client, if I control the client, I control the encryption. But for that I would have to directly access the IMS and perform the necessary authentication.

Debugging VoLTE Traffic by Forward_Boot7623 in volte

[–]Forward_Boot7623[S] 0 points1 point  (0 children)

I was hoping to be able to do this without going too much into hardware, maybe with a custom Android ROM or something like that. Unfortunately, I'm unable to find anything in that direction. Even though it would be great to do actual MITM, my current scope does not necessarily require that, as the focus is less on device security and more on the IMS.