YoVDO

Cloning 3G - 4G SIM Cards With A PC And An Oscilloscope - Lessons Learned In Physical Security

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Signal Processing Courses Cryptanalysis Courses Mobile Network Security Courses

Course Description

Overview

Explore the vulnerabilities of 3G/4G SIM cards in this eye-opening Black Hat conference talk. Delve into the world of mobile network security as the speaker reveals practical attacks against UMTS/LTE SIM cards using differential power analysis. Learn how encryption keys and other secrets can be recovered within minutes, enabling SIM card cloning. Discover the experimental setup involving an oscilloscope, protocol analyzer, custom SIM card reader, and PC used to mount these attacks. Gain insights into the successful experiments conducted on various SIM cards from different operators and manufacturers. Witness the real-world implications of this security breach as the presentation concludes with a demonstration of how cloned SIM cards behave when receiving simultaneous texts and calls.

Syllabus

Cloning 3G/4G SIM Cards With A PC And An Oscilloscope: Lessons Learned In Physical Security


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube