YoVDO

Mobile Network Hacking - IP Edition

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Mobile Network Security Courses

Course Description

Overview

Explore the vulnerabilities in mobile networks and learn how to apply IT security measures to protect them in this 48-minute Black Hat conference talk. Discover missing protection measures, understand user tracking risks, and examine attack vectors such as RCS file transfer, RCS provisioning, and fake access points. Gain insights into brute force techniques, DNS mistrust, and best practices for securing mobile networks. Delve into the intersection of mobile and IP-based security to enhance your understanding of network protection strategies.

Syllabus

Introduction
Why do we have this
The map
Results
User Tracking
RCS File Transfer
RCS Provisioning
Fake Access Point
Brute Force
How it works
Another attack vector
Best practices
DNS mistrust


Taught by

Black Hat

Related Courses

Cybercrime Prevention and Protection
University of Liverpool via FutureLearn
4G to 5G Evolution - In-Depth Security Perspective
RSA Conference via YouTube
5G IMSI Catchers Mirage
Black Hat via YouTube
5G Protocol Vulnerabilities and Exploits
0xdade via YouTube
Attacks Against GSMA's M2M Remote Provisioning
Black Hat via YouTube