Completed
5G IMSI PROTECTION - SUPUSUCI
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
5G Protocol Vulnerabilities and Exploits
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 ABOUT ME
- 3 WHAT AM I GOING TO TALK ABOUT?
- 4 MOBILE NETWORK SECURITY RETROSPECTIVE
- 5 SECURITY RESEARCH RAPIDLY MATURING
- 6 SOME BASIC JARGON
- 7 LTE ARCHITECTURE
- 8 LTE ATTACH PROCEDURE
- 9 LTE (IN)SECURITY REDUX
- 10 SNIFFING BASE STATION CONFIGURATION
- 11 IMSI CATCHING
- 12 DEVICE DOS AND SILENT DOWNGRADE TO GSM
- 13 DEVICE TRACKING
- 14 DNS SPOOFING AND TRAFFIC HIJACK OVER LTE
- 15 UL FUZZING AND EXPLOITS WITHOUT ROGUE BS!
- 16 (SIMPLIFIED) 5G ARCHITECTURE
- 17 5G ATTACH PROCEDURE
- 18 5G NSA ATTACH PROCEDURE
- 19 5G SA ATTACH PROCEDURE
- 20 CHALLENGES IN CAPTURING AND ANALYZING 5G TRAFFIC
- 21 RELEASE 15 TRAFFIC CAPTURES FOR ANALYSIS
- 22 5G IMSI PROTECTION - SUPUSUCI
- 23 5G SUPI PROTECTION?
- 24 OUT OF SCOPE
- 25 5G (IN)SECURITY RATIONALE
- 26 SNIFFING 5G BASE STATION CONFIGURATION
- 27 5G RNTI-BASED TRACKING
- 28 UE CAPABILITY INQUIRY
- 29 THE CURRENT STATE OF AFFAIRS IN 5G SECURITY
- 30 ROOT CAUSE FOR MOST VULNERABILITIES
- 31 5G SECURITY ROADMAP?
- 32 DIGITAL CERTIFICATES IN CELLULAR NETWORKS?