YoVDO

5G IMSI Catchers Mirage

Offered By: Black Hat via YouTube

Tags

Black Hat Courses 5G Courses Mobile Network Security Courses IMSI Catchers Courses

Course Description

Overview

Explore the vulnerabilities and security measures of 5G networks in this comprehensive Black Hat conference talk. Delve into the world of IMSI catchers, also known as Stingrays or fake base stations, and their impact on mobile phone privacy. Examine the evolution of cellular network generations from 2G to 5G, focusing on the new security mechanisms implemented in 5G to address these threats. Follow along as the speakers conduct practical experiments using commercial 5G devices to investigate the effectiveness of these protection techniques. Learn about various aspects of 5G security, including paging procedures, capabilities exchange, NSA security, tracking, randomization, and downgrading attacks. Gain insights into standalone networks, base station operations, ciphering indicators, and network selection processes. Discover guidelines for operators and security verification methods. Walk away with valuable takeaways on the current state of 5G security and its implications for mobile privacy.

Syllabus

Introduction
Background
Paging Procedure
Capabilities Exchange
Security Specifications
NSA Security
Tracking
Randomization
Downgrading Attacks
Capability Exchange
Decoding
Impact
Standalone Networks
Downgrading
Master Slave
Base Station
Ciphering Indicator
Network Selection
Guidelines for Operators
Security Verification
Takeaways


Taught by

Black Hat

Related Courses

Introduction aux réseaux mobiles
Institut Mines-Télécom via France Université Numerique
Evolution Of Air Interface Towards 5G
Indian Institute of Technology, Kharagpur via Swayam
LDPC and Polar Codes in 5G Standard
Indian Institute of Technology Madras via Swayam
Business Considerations for 5G with Edge, IoT, and AI
Linux Foundation via edX
Open Source and the 5G Transition
Linux Foundation via edX