YoVDO

New Vulnerabilities in 5G Networks

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Telecommunications Courses Network Security Courses 5G Courses Man in The Middle Attacks Courses 5G Security Courses

Course Description

Overview

Explore new vulnerabilities in 5G networks through this 44-minute Black Hat conference talk. Delve into the evolved security features of 5G radio networks and uncover potential threats affecting both operator infrastructure and end-devices, including mobiles, NB-IoT, and laptops. Learn about MC Catcher capabilities, mobile network mapping, man-in-the-middle attacks, and the process of identifying baseband vendors. Examine the differences between cellular and IoT security, and understand the implications of these vulnerabilities. Discover testing methodologies, reasons for battery drain issues, and potential fixes. Gain valuable insights into the latest security challenges facing 5G technology and their impact on various connected devices.

Syllabus

Introduction
What is 5G
New Use Cases
Security
MC Catcher
Capabilities
New Capabilities
The Issue
Mobile Network Mapping
Maninthemiddle
Nmap
How is it possible
Devices used
Reference model
Identifying baseband vendors
Baseband Wiki
Application
Cellular vs IOT
What now
What are capabilities
Maninthemiddle relay
Maninthemiddle modification
Testing
Why
Battery Drain
Fix
Conclusion


Taught by

Black Hat

Related Courses

Demystifying 5G Security through Threat Modeling
RSA Conference via YouTube
5G Trust Model - Recommendations and Best Practices for CSPs
RSA Conference via YouTube
5G Protocol Vulnerabilities and Exploits
0xdade via YouTube
Security Transition from 4G to 5G - Are We Secure Enough?
BruCON Security Conference via YouTube
4G to 5G Evolution - In-Depth Security Perspective
RSA Conference via YouTube