Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

IMP4GT - IMPersonation Attacks in 4G Networks

Black Hat via YouTube

Overview

Explore a comprehensive analysis of the IMP4GT attack on LTE/4G networks in this Black Hat conference talk. Delve into the vulnerabilities of the AKA protocol and the consequences of missing integrity protection in user traffic. Learn how attackers can exploit these weaknesses to impersonate users and networks, compromising mutual authentication. Examine the technical details of the attack, including its cross-layer nature and the reflection mechanism of the IP stack. Discover real-world demonstrations of IMP4GT variants in commercial networks and understand their implications for network security. Investigate the impact on various stakeholders, including law enforcement agencies and end-users. Gain valuable insights into the security challenges facing 4G networks and potential mitigation strategies.

Syllabus

Introduction
Motivation
Agenda
LTE Background Information
Security Aims
Control and User Plan Traffic
DNS Redirection Attack
The Relay
The Setup
Impact
Reflection
Encryption
Experiments
Downlink
Who is affected
Consequences
Law Enforcement Agencies
Consequences for Users
Conclusion

Taught by

Black Hat

Reviews

Start your review of IMP4GT - IMPersonation Attacks in 4G Networks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.