Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Creating a Fuzzer for Diameter and LTE Telecom Protocols

Hack In The Box Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of creating a fuzzer for Diameter and LTE telecom protocols in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into the world of telecom signaling security, focusing on the Diameter protocol used in LTE core networks. Learn about the vulnerabilities discovered through fuzzing and the technical challenges specific to testing telecom equipment. Gain insights into fuzzer architecture, utilizing existing protocol stacks, adapting tools for MNO Test Lab environments, and reproducing issues reliably. Discover valuable lessons on communicating with mobile network operators when vulnerabilities are found. Benefit from the speaker's extensive experience in Diameter security audits and telecom vulnerability research, including practical examples and key takeaways for enhancing telecom network security.

Syllabus

Intro
Enter Header
Data Types
GLT
Software
BES
Test Lab
Problems
IPX Network
Why create a Fuzzer
Existing protocol implementations
Message types
Limitations
Enemy
Menos
Other problems
Fuzzing
Mutations
Nested TVP
Stateful Checks
Messages
Connections
emulators
hot pots
system time
Typical project
Ask for access
Presenting results
Key takeaways
Summary
Live Questions
One More Question
We Dont Do This Often
How To Do It

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Creating a Fuzzer for Diameter and LTE Telecom Protocols

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.