Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
5G Protocol Vulnerabilities and Exploits
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 ABOUT ME
- 3 WHAT AM I GOING TO TALK ABOUT?
- 4 MOBILE NETWORK SECURITY RETROSPECTIVE
- 5 SECURITY RESEARCH RAPIDLY MATURING
- 6 SOME BASIC JARGON
- 7 LTE ARCHITECTURE
- 8 LTE ATTACH PROCEDURE
- 9 LTE (IN)SECURITY REDUX
- 10 SNIFFING BASE STATION CONFIGURATION
- 11 IMSI CATCHING
- 12 DEVICE DOS AND SILENT DOWNGRADE TO GSM
- 13 DEVICE TRACKING
- 14 DNS SPOOFING AND TRAFFIC HIJACK OVER LTE
- 15 UL FUZZING AND EXPLOITS WITHOUT ROGUE BS!
- 16 (SIMPLIFIED) 5G ARCHITECTURE
- 17 5G ATTACH PROCEDURE
- 18 5G NSA ATTACH PROCEDURE
- 19 5G SA ATTACH PROCEDURE
- 20 CHALLENGES IN CAPTURING AND ANALYZING 5G TRAFFIC
- 21 RELEASE 15 TRAFFIC CAPTURES FOR ANALYSIS
- 22 5G IMSI PROTECTION - SUPUSUCI
- 23 5G SUPI PROTECTION?
- 24 OUT OF SCOPE
- 25 5G (IN)SECURITY RATIONALE
- 26 SNIFFING 5G BASE STATION CONFIGURATION
- 27 5G RNTI-BASED TRACKING
- 28 UE CAPABILITY INQUIRY
- 29 THE CURRENT STATE OF AFFAIRS IN 5G SECURITY
- 30 ROOT CAUSE FOR MOST VULNERABILITIES
- 31 5G SECURITY ROADMAP?
- 32 DIGITAL CERTIFICATES IN CELLULAR NETWORKS?