Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the vulnerabilities in automated 4G/LTE networks through an in-depth examination of rogue base station operations. Delve into the exploitation of weaknesses in 4G/LTE mobile phones and SON protocols for malicious packet injection. Gain insights into mobile network architecture, telco attacks, and Self Organized Network (SON) operations. Analyze LTE PCI optimization, Automatic Neighbor Relation (ANR), and LTE handover processes. Discover the impact of rogue data injection, vulnerable mobile network functions, and handover hijacking. Learn about remotely killing and restarting LTE base stations, and understand the grand-scale implications of these vulnerabilities. Examine proposed solutions and key takeaways for securing LTE network automation against potential threats.
Syllabus
Intro
Overview
Mobile Network Architecture
Recap - Telco Attacks
Self Organized Network (SON)
SON Operation in Practice
SON Operation Modes
SON Design Issue
Key Question
Automation in LTE - Vulnerable Points
LTE PCI Optimization
Automatic Neighbor Relation (ANR)
LTE Handover
Handover Analysis
Rogue Data Injection
Vulnerable Mobile Network Functions
Rogue eNodeB
Remotely Kill & Restart LTE Base Station
Handover Hijacking (Dropping Calls)
Impact of Handover Hijacking
Impact - Grand Scale
Vulnerability Status
Solutions
Takeaways
Taught by
Black Hat