YoVDO

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Ethical Hacking Courses Mobile Device Security Courses Software-Defined Radio Courses Network Monitoring Courses Firmware Analysis Courses

Course Description

Overview

Explore modmob tools for testing mobile devices and monitoring networks in this comprehensive conference talk. Dive into mobile network security, software-defined radio, and custom SIM card solutions. Learn about Faraday cages, downgrade attacks, and cell information capture methods. Discover techniques for GPRS data analysis, UMTS interception, and firmware analysis. Gain insights into hardware auditing, memory protection bypasses, and remote mobile module hunting. Investigate client-side attacks and explore opportunities in mobile security testing. Acquire practical knowledge on setting up testing environments, automating cell changes, and interfacing with various components.

Syllabus

Introduction
Use of mobile network with intercoms
Security of communications (2)
Software Defined radio
Alternatives
Set-up: architecture example with bladeRF
Testing it
Possible ways
Custom SIMUSIM cards
SIMtrace for the rescue
Faraday cage
Practical shielding box for us
Final set-up
Downgrade attacks
Monitoring: State of the Art
Methods to capture cells information
Service Mode on Android
The camping concept in brief
Automate cell changes with AT commands
Jamming in general
"Smart" jamming
Analyzing GPRS data
Talk with one service
UMTS interception
Issues during tests
Identifying components
Interfacing and dumping the firmware
Firmware analysis: strings (2)
Firmware disassembly
Hardware audit tip
Device to interface
Memory protections bypasses
Garage hacker: the CAN bus
Hunting for mobile modules remotely
Client-side attack: sweets
Opportunities
Spotted API
Interception in a parking station
Read more about this
XTRX
Conclusion


Taught by

WEareTROOPERS

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Security Awareness Training
(ISC)² via Coursera
Masterclass - Hacking de dispositivos moviles
Udemy
Threat and Vulnerability Management for CompTIA CySA+
Pluralsight
Protecting Devices and Applications in Microsoft 365
Pluralsight