5G IMSI Catchers Mirage
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities and security measures of 5G networks in this comprehensive Black Hat conference talk. Delve into the world of IMSI catchers, also known as Stingrays or fake base stations, and their impact on mobile phone privacy. Examine the evolution of cellular network generations from 2G to 5G, focusing on the new security mechanisms implemented in 5G to address these threats. Follow along as the speakers conduct practical experiments using commercial 5G devices to investigate the effectiveness of these protection techniques. Learn about various aspects of 5G security, including paging procedures, capabilities exchange, NSA security, tracking, randomization, and downgrading attacks. Gain insights into standalone networks, base station operations, ciphering indicators, and network selection processes. Discover guidelines for operators and security verification methods. Walk away with valuable takeaways on the current state of 5G security and its implications for mobile privacy.
Syllabus
Introduction
Background
Paging Procedure
Capabilities Exchange
Security Specifications
NSA Security
Tracking
Randomization
Downgrading Attacks
Capability Exchange
Decoding
Impact
Standalone Networks
Downgrading
Master Slave
Base Station
Ciphering Indicator
Network Selection
Guidelines for Operators
Security Verification
Takeaways
Taught by
Black Hat
Related Courses
Cybercrime Prevention and ProtectionUniversity of Liverpool via FutureLearn 4G to 5G Evolution - In-Depth Security Perspective
RSA Conference via YouTube 5G Protocol Vulnerabilities and Exploits
0xdade via YouTube Attacks Against GSMA's M2M Remote Provisioning
Black Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube