Cloning 3G - 4G SIM Cards With A PC And An Oscilloscope - Lessons Learned In Physical Security
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities of 3G/4G SIM cards in this eye-opening Black Hat conference talk. Delve into the world of mobile network security as the speaker reveals practical attacks against UMTS/LTE SIM cards using differential power analysis. Learn how encryption keys and other secrets can be recovered within minutes, enabling SIM card cloning. Discover the experimental setup involving an oscilloscope, protocol analyzer, custom SIM card reader, and PC used to mount these attacks. Gain insights into the successful experiments conducted on various SIM cards from different operators and manufacturers. Witness the real-world implications of this security breach as the presentation concludes with a demonstration of how cloned SIM cards behave when receiving simultaneous texts and calls.
Syllabus
Cloning 3G/4G SIM Cards With A PC And An Oscilloscope: Lessons Learned In Physical Security
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube