Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 How this Research Began
- 3 The Current Standard
- 4 OMA-DM: Managed Objects
- 5 Devices with OMA-DM
- 6 Embedded Client Locations
- 7 The Reference Toolkit
- 8 RedBend Software
- 9 "RedBend Enabled" Devices
- 10 Network Architecture Diagram
- 11 OMA-DM "Standard" Security
- 12 Initial OTA Payload Types
- 13 NIA Payload Example
- 14 DM Bootstrap Payload Example • Used for initial Device Provisioning
- 15 OMA-DM Tree Serialization
- 16 Client Side Parsing
- 17 Cellular Testing Hardware
- 18 Identifying Control Clients - Phones
- 19 Identifying Control Clients - Embedded Devices
- 20 Simulating Cellular Environments
- 21 Android Tracer
- 22 Cellular Network Attacks
- 23 Rogue Base Station Attacks
- 24 Vulnerabilities in Authentication
- 25 Transport Security and Encryption Flaws
- 26 Code Execution Without Memory Corruption
- 27 Types of Vulnerabilities found
- 28 Vulnerability Example: Reading Memory
- 29 Bypassing ASLR with OTA Feng Shui