Overview
Explore the vulnerabilities in mobile network authentication and learn techniques for accessing SIM cards and forwarding authentication vectors in this BruCON Security Conference talk. Delve into the concept of "wormholes" in modern smartphones, which allow data to travel through unexpected communication channels. Gain insights into accessing SIM cards on Android phones without special privileges, and discover methods for modifying baseband firmware. Examine the implications of these vulnerabilities for online banking and account security. Follow along with demonstrations and a walkthrough of analyzing baseband firmware, and understand potential defense mechanisms against unintended SIM usage.
Syllabus
Intro
What we will learn
Birds Eye View
Baseband Overview
Baseband Hardware
Baseband Firmware - DEMO
Communicating With Baseband
Accessing the SIM-Card from the AP
SIM-Card-Access via AT+CSIM
Command-APDU via AT+CSIM
What is a Wormhole
Wormholes in your Phone
Shadow SIM - Overview
ShadowSIM - Concept
ShadowSIM - Baseband Communication
ShadowSIM - Firmware Modification
Defense - unintended SIM-Usage
Results-Recap
Taught by
BruCON Security Conference