YoVDO

New Vulnerabilities in 5G Networks

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Telecommunications Courses Network Security Courses 5G Courses Man in The Middle Attacks Courses 5G Security Courses

Course Description

Overview

Explore new vulnerabilities in 5G networks through this 44-minute Black Hat conference talk. Delve into the evolved security features of 5G radio networks and uncover potential threats affecting both operator infrastructure and end-devices, including mobiles, NB-IoT, and laptops. Learn about MC Catcher capabilities, mobile network mapping, man-in-the-middle attacks, and the process of identifying baseband vendors. Examine the differences between cellular and IoT security, and understand the implications of these vulnerabilities. Discover testing methodologies, reasons for battery drain issues, and potential fixes. Gain valuable insights into the latest security challenges facing 5G technology and their impact on various connected devices.

Syllabus

Introduction
What is 5G
New Use Cases
Security
MC Catcher
Capabilities
New Capabilities
The Issue
Mobile Network Mapping
Maninthemiddle
Nmap
How is it possible
Devices used
Reference model
Identifying baseband vendors
Baseband Wiki
Application
Cellular vs IOT
What now
What are capabilities
Maninthemiddle relay
Maninthemiddle modification
Testing
Why
Battery Drain
Fix
Conclusion


Taught by

Black Hat

Related Courses

Introduction aux réseaux mobiles
Institut Mines-Télécom via France Université Numerique
Evolution Of Air Interface Towards 5G
Indian Institute of Technology, Kharagpur via Swayam
LDPC and Polar Codes in 5G Standard
Indian Institute of Technology Madras via Swayam
Business Considerations for 5G with Edge, IoT, and AI
Linux Foundation via edX
Open Source and the 5G Transition
Linux Foundation via edX