Overview
Explore the vulnerabilities and security measures of 5G networks in this comprehensive Black Hat conference talk. Delve into the world of IMSI catchers, also known as Stingrays or fake base stations, and their impact on mobile phone privacy. Examine the evolution of cellular network generations from 2G to 5G, focusing on the new security mechanisms implemented in 5G to address these threats. Follow along as the speakers conduct practical experiments using commercial 5G devices to investigate the effectiveness of these protection techniques. Learn about various aspects of 5G security, including paging procedures, capabilities exchange, NSA security, tracking, randomization, and downgrading attacks. Gain insights into standalone networks, base station operations, ciphering indicators, and network selection processes. Discover guidelines for operators and security verification methods. Walk away with valuable takeaways on the current state of 5G security and its implications for mobile privacy.
Syllabus
Introduction
Background
Paging Procedure
Capabilities Exchange
Security Specifications
NSA Security
Tracking
Randomization
Downgrading Attacks
Capability Exchange
Decoding
Impact
Standalone Networks
Downgrading
Master Slave
Base Station
Ciphering Indicator
Network Selection
Guidelines for Operators
Security Verification
Takeaways
Taught by
Black Hat