Ghost Telephonist Link Hijack Exploitations in 4G LTE CS Fallback
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a critical vulnerability in 4G LTE Circuit Switched Fallback (CSFB) networks in this 48-minute Black Hat presentation. Discover how the 'Ghost Telephonist' attack exploits the missing authentication step in CSFB procedures, allowing attackers to hijack victim communications. Learn about various exploitations enabled by this vulnerability, including the potential interception of unencrypted or weakly encrypted calls and SMS messages. Presented by Haoqi Shan, Jun Li, Yuwei Zheng, Lin Huang, and Qing Yang, this talk provides valuable insights into mobile network security and the importance of robust authentication mechanisms in telecommunications infrastructure.
Syllabus
''Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network