YoVDO

5G IMSI Catchers Mirage

Offered By: Black Hat via YouTube

Tags

Black Hat Courses 5G Courses Mobile Network Security Courses IMSI Catchers Courses

Course Description

Overview

Explore the vulnerabilities and security measures of 5G networks in this comprehensive Black Hat conference talk. Delve into the world of IMSI catchers, also known as Stingrays or fake base stations, and their impact on mobile phone privacy. Examine the evolution of cellular network generations from 2G to 5G, focusing on the new security mechanisms implemented in 5G to address these threats. Follow along as the speakers conduct practical experiments using commercial 5G devices to investigate the effectiveness of these protection techniques. Learn about various aspects of 5G security, including paging procedures, capabilities exchange, NSA security, tracking, randomization, and downgrading attacks. Gain insights into standalone networks, base station operations, ciphering indicators, and network selection processes. Discover guidelines for operators and security verification methods. Walk away with valuable takeaways on the current state of 5G security and its implications for mobile privacy.

Syllabus

Introduction
Background
Paging Procedure
Capabilities Exchange
Security Specifications
NSA Security
Tracking
Randomization
Downgrading Attacks
Capability Exchange
Decoding
Impact
Standalone Networks
Downgrading
Master Slave
Base Station
Ciphering Indicator
Network Selection
Guidelines for Operators
Security Verification
Takeaways


Taught by

Black Hat

Related Courses

Cybercrime Prevention and Protection
University of Liverpool via FutureLearn
4G to 5G Evolution - In-Depth Security Perspective
RSA Conference via YouTube
5G Protocol Vulnerabilities and Exploits
0xdade via YouTube
Attacks Against GSMA's M2M Remote Provisioning
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube