House Intercoms Attacks - When Frontdoors Become Backdoors
Offered By: Cooper via YouTube
Course Description
Overview
Syllabus
Intro
Intercoms today
Human curiosity...
Context
Different types of intercoms
Numeric intercoms: simplified architecture
Network architecture with M2M
Different brands market
State Of the Art: tools
GSM and GPRS: authentication
GSM and GPRS: Handover
3G/4G: advantages
Mobile interception: signal attraction A User Equipment connects to the closest Base Station
Jamming is generally basic...
GSM Lab setup: for interception
Intercom setup: configuration
First impressions
Attacker steps to open the door
To trap the intercom
What's next? Let's backdoor it!
Call premium rate numbers
Attack vectors with M2M Intercoms
Bruteforce accounts
Enumerated accounts
Attack scenarios
Reverse look-up directories
Connecting to the M2M network
Traceroute in the M2M virtual network
Conclusion
Security recommendations for M2M solutions
Taught by
Cooper
Related Courses
An Introduction to Computer NetworksStanford University via Independent Introduction aux réseaux cellulaires
Institut Mines-Télécom via Independent Introduction aux réseaux mobiles
Institut Mines-Télécom via France Université Numerique Comprendre la 4G
Institut Mines-Télécom via France Université Numerique 4G Network Essentials
Institut Mines-Télécom via edX