YoVDO

Security Transition from 4G to 5G - Are We Secure Enough?

Offered By: BruCON Security Conference via YouTube

Tags

BruCON Courses 5G Courses Cloud Security Courses 5G Security Courses

Course Description

Overview

Explore the security transition from 4G to 5G networks in this comprehensive conference talk from BruCON Security Conference. Delve into newly discovered vulnerabilities affecting devices and subscribers, despite 5G's improved security measures. Examine a set of protocol vulnerabilities in 5G/4G networks, impacting operator equipment and consumer devices like phones, routers, IoT sensors, and car modems. Learn about automated tools developed to exploit cellular information and gain insights from shared research traces and datasets. Witness demonstrations of new hijacking, bidding down, and battery draining attacks using low-cost hardware and software tools. Discover the surprising results of worldwide testing to estimate affected base stations. Gain valuable knowledge about interactions with vendors and standard bodies, as well as potential fixes to prevent these attacks. Cover topics including WiFi importance, service base architecture, cloud security principles, 5G use cases, radio capabilities, mobile networks, fingerprints, man-in-the-middle attacks, power-saving mode, location tracking, authentication, and core network security.

Syllabus

Introduction
Why WiFi is important
The problem with WiFi
Service Base Architecture
What makes this situation complicated
Cloud security principles
Use case of 5G
Greek wiretapping scandal
The problem of scope
The problem of Co Network
Snowden
MC catcher
Capabilities
Radio Capabilities
Registration
Setup
MNMap
Mobile Networks
Saving capabilities
Fingerprints
Who is BruCON
Supported devices
common fingerprints
two GPS
SIM cards
Maninthemiddle attack
Modifications
Security Mode
Live Networks
Why is this happening
Power Saving Mode
Battery Life
Location Tracking
Authentication
Security improvements
MC Cache
Sequence Number
Targeted Attack
Core Network
NATO Report
Questions


Taught by

BruCON Security Conference

Related Courses

New Vulnerabilities in 5G Networks
Black Hat via YouTube
Demystifying 5G Security through Threat Modeling
RSA Conference via YouTube
5G Trust Model - Recommendations and Best Practices for CSPs
RSA Conference via YouTube
5G Protocol Vulnerabilities and Exploits
0xdade via YouTube
4G to 5G Evolution - In-Depth Security Perspective
RSA Conference via YouTube