New Vulnerabilities in 5G Networks
Offered By: Black Hat via YouTube
Course Description
Overview
Explore new vulnerabilities in 5G networks through this 44-minute Black Hat conference talk. Delve into the evolved security features of 5G radio networks and uncover potential threats affecting both operator infrastructure and end-devices, including mobiles, NB-IoT, and laptops. Learn about MC Catcher capabilities, mobile network mapping, man-in-the-middle attacks, and the process of identifying baseband vendors. Examine the differences between cellular and IoT security, and understand the implications of these vulnerabilities. Discover testing methodologies, reasons for battery drain issues, and potential fixes. Gain valuable insights into the latest security challenges facing 5G technology and their impact on various connected devices.
Syllabus
Introduction
What is 5G
New Use Cases
Security
MC Catcher
Capabilities
New Capabilities
The Issue
Mobile Network Mapping
Maninthemiddle
Nmap
How is it possible
Devices used
Reference model
Identifying baseband vendors
Baseband Wiki
Application
Cellular vs IOT
What now
What are capabilities
Maninthemiddle relay
Maninthemiddle modification
Testing
Why
Battery Drain
Fix
Conclusion
Taught by
Black Hat
Related Courses
Demystifying 5G Security through Threat ModelingRSA Conference via YouTube 5G Trust Model - Recommendations and Best Practices for CSPs
RSA Conference via YouTube 5G Protocol Vulnerabilities and Exploits
0xdade via YouTube Security Transition from 4G to 5G - Are We Secure Enough?
BruCON Security Conference via YouTube 4G to 5G Evolution - In-Depth Security Perspective
RSA Conference via YouTube