5G Protocol Vulnerabilities and Exploits

5G Protocol Vulnerabilities and Exploits

0xdade via YouTube Direct link

LTE ATTACH PROCEDURE

8 of 32

8 of 32

LTE ATTACH PROCEDURE

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

5G Protocol Vulnerabilities and Exploits

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 ABOUT ME
  3. 3 WHAT AM I GOING TO TALK ABOUT?
  4. 4 MOBILE NETWORK SECURITY RETROSPECTIVE
  5. 5 SECURITY RESEARCH RAPIDLY MATURING
  6. 6 SOME BASIC JARGON
  7. 7 LTE ARCHITECTURE
  8. 8 LTE ATTACH PROCEDURE
  9. 9 LTE (IN)SECURITY REDUX
  10. 10 SNIFFING BASE STATION CONFIGURATION
  11. 11 IMSI CATCHING
  12. 12 DEVICE DOS AND SILENT DOWNGRADE TO GSM
  13. 13 DEVICE TRACKING
  14. 14 DNS SPOOFING AND TRAFFIC HIJACK OVER LTE
  15. 15 UL FUZZING AND EXPLOITS WITHOUT ROGUE BS!
  16. 16 (SIMPLIFIED) 5G ARCHITECTURE
  17. 17 5G ATTACH PROCEDURE
  18. 18 5G NSA ATTACH PROCEDURE
  19. 19 5G SA ATTACH PROCEDURE
  20. 20 CHALLENGES IN CAPTURING AND ANALYZING 5G TRAFFIC
  21. 21 RELEASE 15 TRAFFIC CAPTURES FOR ANALYSIS
  22. 22 5G IMSI PROTECTION - SUPUSUCI
  23. 23 5G SUPI PROTECTION?
  24. 24 OUT OF SCOPE
  25. 25 5G (IN)SECURITY RATIONALE
  26. 26 SNIFFING 5G BASE STATION CONFIGURATION
  27. 27 5G RNTI-BASED TRACKING
  28. 28 UE CAPABILITY INQUIRY
  29. 29 THE CURRENT STATE OF AFFAIRS IN 5G SECURITY
  30. 30 ROOT CAUSE FOR MOST VULNERABILITIES
  31. 31 5G SECURITY ROADMAP?
  32. 32 DIGITAL CERTIFICATES IN CELLULAR NETWORKS?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.