Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Ghost Telephonist Link Hijack Exploitations in 4G LTE CS Fallback

Black Hat via YouTube

Overview

Explore a critical vulnerability in 4G LTE Circuit Switched Fallback (CSFB) networks in this 48-minute Black Hat presentation. Discover how the 'Ghost Telephonist' attack exploits the missing authentication step in CSFB procedures, allowing attackers to hijack victim communications. Learn about various exploitations enabled by this vulnerability, including the potential interception of unencrypted or weakly encrypted calls and SMS messages. Presented by Haoqi Shan, Jun Li, Yuwei Zheng, Lin Huang, and Qing Yang, this talk provides valuable insights into mobile network security and the importance of robust authentication mechanisms in telecommunications infrastructure.

Syllabus

''Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback

Taught by

Black Hat

Reviews

Start your review of Ghost Telephonist Link Hijack Exploitations in 4G LTE CS Fallback

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.