Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol

Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol

Black Hat via YouTube Direct link

Vulnerabilities in Authentication

24 of 29

24 of 29

Vulnerabilities in Authentication

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cellular Exploitation on a Global Scale - The Rise and Fall of the Control Protocol

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 How this Research Began
  3. 3 The Current Standard
  4. 4 OMA-DM: Managed Objects
  5. 5 Devices with OMA-DM
  6. 6 Embedded Client Locations
  7. 7 The Reference Toolkit
  8. 8 RedBend Software
  9. 9 "RedBend Enabled" Devices
  10. 10 Network Architecture Diagram
  11. 11 OMA-DM "Standard" Security
  12. 12 Initial OTA Payload Types
  13. 13 NIA Payload Example
  14. 14 DM Bootstrap Payload Example • Used for initial Device Provisioning
  15. 15 OMA-DM Tree Serialization
  16. 16 Client Side Parsing
  17. 17 Cellular Testing Hardware
  18. 18 Identifying Control Clients - Phones
  19. 19 Identifying Control Clients - Embedded Devices
  20. 20 Simulating Cellular Environments
  21. 21 Android Tracer
  22. 22 Cellular Network Attacks
  23. 23 Rogue Base Station Attacks
  24. 24 Vulnerabilities in Authentication
  25. 25 Transport Security and Encryption Flaws
  26. 26 Code Execution Without Memory Corruption
  27. 27 Types of Vulnerabilities found
  28. 28 Vulnerability Example: Reading Memory
  29. 29 Bypassing ASLR with OTA Feng Shui

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.