Diameter Attack Simulator
Interactive simulation tool for learning Diameter protocol security vulnerabilities in 4G/5G networks. Practice attack techniques in a safe, educational environment.
Educational Use Only
S6a Subscriber Data Extraction
Extract subscriber profile data from HSS via S6a interface exploitation
Diameter Routing Manipulation
Manipulate Diameter routing to redirect traffic through attacker-controlled nodes
Diameter Identity Spoofing
Impersonate legitimate Diameter nodes to gain unauthorized access
Gx Policy Control Manipulation
Manipulate policy control decisions via Gx interface exploitation
Techniques Used:
Prerequisites:
- Network access to Diameter signaling
- Knowledge of S6a interface
- Target IMSI
Potential Impact:
Unauthorized access to subscriber authentication vectors and profile information
Technical Details:
Scan for Diameter nodes on port 3868, identify HSS and MME nodes, map S6a interface connectivity
Network Reconnaissance
Identify Diameter nodes and S6a interface endpoints in the target network
HSS Discovery
Locate the Home Subscriber Server (HSS) serving the target subscriber
MME Impersonation Setup
Configure attacker node to impersonate a legitimate MME
ULR Message Crafting
Create malicious Update-Location-Request message
S6a Attack Execution
Send ULR to HSS and extract subscriber data from response
Data Extraction & Analysis
Parse and analyze extracted subscriber profile information
Deploy Diameter Edge Agents (DEAs) with strict filtering rules
Implement mutual TLS authentication for all Diameter connections
Apply origin-based access control for S6a requests
Configure topology hiding to protect network architecture
Implement real-time monitoring for suspicious Diameter activity