YoVDO

Probing Mobile Operator Networks

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Mobile Network Security Courses

Course Description

Overview

Explore the intricacies of probing cellular networks in this 54-minute Black Hat USA 2012 conference talk. Delve into Collin Mulliner's investigation of the diverse devices hosted on mobile operator networks beyond smartphones. Learn the step-by-step process of probing cellular networks, from initial stages to completion. Examine the presenter's findings and discuss their potential security implications for mobile infrastructure. Gain insights into the hidden landscape of cellular networks and the various devices they accommodate.

Syllabus

Black Hat USA 2012 - Probing Mobile Operator Networks


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube