YoVDO

New Vulnerabilities in 5G Networks

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Telecommunications Courses Network Security Courses 5G Courses Man in The Middle Attacks Courses 5G Security Courses

Course Description

Overview

Explore new vulnerabilities in 5G networks through this 44-minute Black Hat conference talk. Delve into the evolved security features of 5G radio networks and uncover potential threats affecting both operator infrastructure and end-devices, including mobiles, NB-IoT, and laptops. Learn about MC Catcher capabilities, mobile network mapping, man-in-the-middle attacks, and the process of identifying baseband vendors. Examine the differences between cellular and IoT security, and understand the implications of these vulnerabilities. Discover testing methodologies, reasons for battery drain issues, and potential fixes. Gain valuable insights into the latest security challenges facing 5G technology and their impact on various connected devices.

Syllabus

Introduction
What is 5G
New Use Cases
Security
MC Catcher
Capabilities
New Capabilities
The Issue
Mobile Network Mapping
Maninthemiddle
Nmap
How is it possible
Devices used
Reference model
Identifying baseband vendors
Baseband Wiki
Application
Cellular vs IOT
What now
What are capabilities
Maninthemiddle relay
Maninthemiddle modification
Testing
Why
Battery Drain
Fix
Conclusion


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube