Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Stealing a Mobile Using Wormholes

BruCON Security Conference via YouTube

Overview

Explore the vulnerabilities in mobile network authentication and learn techniques for accessing SIM cards and forwarding authentication vectors in this BruCON Security Conference talk. Delve into the concept of "wormholes" in modern smartphones, which allow data to travel through unexpected communication channels. Gain insights into accessing SIM cards on Android phones without special privileges, and discover methods for modifying baseband firmware. Examine the implications of these vulnerabilities for online banking and account security. Follow along with demonstrations and a walkthrough of analyzing baseband firmware, and understand potential defense mechanisms against unintended SIM usage.

Syllabus

Intro
What we will learn
Birds Eye View
Baseband Overview
Baseband Hardware
Baseband Firmware - DEMO
Communicating With Baseband
Accessing the SIM-Card from the AP
SIM-Card-Access via AT+CSIM
Command-APDU via AT+CSIM
What is a Wormhole
Wormholes in your Phone
Shadow SIM - Overview
ShadowSIM - Concept
ShadowSIM - Baseband Communication
ShadowSIM - Firmware Modification
Defense - unintended SIM-Usage
Results-Recap

Taught by

BruCON Security Conference

Reviews

Start your review of Stealing a Mobile Using Wormholes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.