Stealing a Mobile Using Wormholes
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Explore the vulnerabilities in mobile network authentication and learn techniques for accessing SIM cards and forwarding authentication vectors in this BruCON Security Conference talk. Delve into the concept of "wormholes" in modern smartphones, which allow data to travel through unexpected communication channels. Gain insights into accessing SIM cards on Android phones without special privileges, and discover methods for modifying baseband firmware. Examine the implications of these vulnerabilities for online banking and account security. Follow along with demonstrations and a walkthrough of analyzing baseband firmware, and understand potential defense mechanisms against unintended SIM usage.
Syllabus
Intro
What we will learn
Birds Eye View
Baseband Overview
Baseband Hardware
Baseband Firmware - DEMO
Communicating With Baseband
Accessing the SIM-Card from the AP
SIM-Card-Access via AT+CSIM
Command-APDU via AT+CSIM
What is a Wormhole
Wormholes in your Phone
Shadow SIM - Overview
ShadowSIM - Concept
ShadowSIM - Baseband Communication
ShadowSIM - Firmware Modification
Defense - unintended SIM-Usage
Results-Recap
Taught by
BruCON Security Conference
Related Courses
Futurism and Space ExplorationPBS via YouTube The Map of Black Holes - Black Holes Explained
Domain of Science via YouTube Black Holes and the Quantum-Extended Church-Turing Thesis - Quantum Colloquium
Simons Institute via YouTube Spacetime, Quantum Entanglement and Black Holes
Institute for Advanced Study via YouTube Wormholes and Quantum Noise - Douglas Stanford
Institute for Advanced Study via YouTube