YoVDO

Stealing a Mobile Using Wormholes

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses Wormholes Courses Firmware Analysis Courses Mobile Network Security Courses

Course Description

Overview

Explore the vulnerabilities in mobile network authentication and learn techniques for accessing SIM cards and forwarding authentication vectors in this BruCON Security Conference talk. Delve into the concept of "wormholes" in modern smartphones, which allow data to travel through unexpected communication channels. Gain insights into accessing SIM cards on Android phones without special privileges, and discover methods for modifying baseband firmware. Examine the implications of these vulnerabilities for online banking and account security. Follow along with demonstrations and a walkthrough of analyzing baseband firmware, and understand potential defense mechanisms against unintended SIM usage.

Syllabus

Intro
What we will learn
Birds Eye View
Baseband Overview
Baseband Hardware
Baseband Firmware - DEMO
Communicating With Baseband
Accessing the SIM-Card from the AP
SIM-Card-Access via AT+CSIM
Command-APDU via AT+CSIM
What is a Wormhole
Wormholes in your Phone
Shadow SIM - Overview
ShadowSIM - Concept
ShadowSIM - Baseband Communication
ShadowSIM - Firmware Modification
Defense - unintended SIM-Usage
Results-Recap


Taught by

BruCON Security Conference

Related Courses

Being a Cyberdefender - Behind the Curtains
BruCON Security Conference via YouTube
Bypassing Microsoft Defender for Identity
BruCON Security Conference via YouTube
A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
BruCON Security Conference via YouTube
Android Malware Targeting Belgian Financial Apps
BruCON Security Conference via YouTube
Chasing the White Whale of Malware
BruCON Security Conference via YouTube