Cloning 3G - 4G SIM Cards With A PC And An Oscilloscope - Lessons Learned In Physical Security
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities of 3G/4G SIM cards in this eye-opening Black Hat conference talk. Delve into the world of mobile network security as the speaker reveals practical attacks against UMTS/LTE SIM cards using differential power analysis. Learn how encryption keys and other secrets can be recovered within minutes, enabling SIM card cloning. Discover the experimental setup involving an oscilloscope, protocol analyzer, custom SIM card reader, and PC used to mount these attacks. Gain insights into the successful experiments conducted on various SIM cards from different operators and manufacturers. Witness the real-world implications of this security breach as the presentation concludes with a demonstration of how cloned SIM cards behave when receiving simultaneous texts and calls.
Syllabus
Cloning 3G/4G SIM Cards With A PC And An Oscilloscope: Lessons Learned In Physical Security
Taught by
Black Hat
Related Courses
Cybercrime Prevention and ProtectionUniversity of Liverpool via FutureLearn White-Stingray - Bypassing Stingray Detectors
nullcon via YouTube Comprehensive Hacker Techniques in Mobile Networks
nullcon via YouTube Mobile Self Defence
nullcon via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube