Explore the vulnerabilities of 3G/4G SIM cards in this eye-opening Black Hat conference talk. Delve into the world of mobile network security as the speaker reveals practical attacks against UMTS/LTE SIM cards using differential power analysis. Learn how encryption keys and other secrets can be recovered within minutes, enabling SIM card cloning. Discover the experimental setup involving an oscilloscope, protocol analyzer, custom SIM card reader, and PC used to mount these attacks. Gain insights into the successful experiments conducted on various SIM cards from different operators and manufacturers. Witness the real-world implications of this security breach as the presentation concludes with a demonstration of how cloned SIM cards behave when receiving simultaneous texts and calls.
Overview
Syllabus
Cloning 3G/4G SIM Cards With A PC And An Oscilloscope: Lessons Learned In Physical Security
Taught by
Black Hat