Ghost Telephonist Link Hijack Exploitations in 4G LTE CS Fallback
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a critical vulnerability in 4G LTE Circuit Switched Fallback (CSFB) networks in this 48-minute Black Hat presentation. Discover how the 'Ghost Telephonist' attack exploits the missing authentication step in CSFB procedures, allowing attackers to hijack victim communications. Learn about various exploitations enabled by this vulnerability, including the potential interception of unencrypted or weakly encrypted calls and SMS messages. Presented by Haoqi Shan, Jun Li, Yuwei Zheng, Lin Huang, and Qing Yang, this talk provides valuable insights into mobile network security and the importance of robust authentication mechanisms in telecommunications infrastructure.
Syllabus
''Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube