Creating a Fuzzer for Diameter and LTE Telecom Protocols
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the intricacies of creating a fuzzer for Diameter and LTE telecom protocols in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into the world of telecom signaling security, focusing on the Diameter protocol used in LTE core networks. Learn about the vulnerabilities discovered through fuzzing and the technical challenges specific to testing telecom equipment. Gain insights into fuzzer architecture, utilizing existing protocol stacks, adapting tools for MNO Test Lab environments, and reproducing issues reliably. Discover valuable lessons on communicating with mobile network operators when vulnerabilities are found. Benefit from the speaker's extensive experience in Diameter security audits and telecom vulnerability research, including practical examples and key takeaways for enhancing telecom network security.
Syllabus
Intro
Enter Header
Data Types
GLT
Software
BES
Test Lab
Problems
IPX Network
Why create a Fuzzer
Existing protocol implementations
Message types
Limitations
Enemy
Menos
Other problems
Fuzzing
Mutations
Nested TVP
Stateful Checks
Messages
Connections
emulators
hot pots
system time
Typical project
Ask for access
Presenting results
Key takeaways
Summary
Live Questions
One More Question
We Dont Do This Often
How To Do It
Taught by
Hack In The Box Security Conference
Related Courses
Browser Hacking With ANGLEHack In The Box Security Conference via YouTube Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube