Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore new vulnerabilities in 5G networks through this 44-minute Black Hat conference talk. Delve into the evolved security features of 5G radio networks and uncover potential threats affecting both operator infrastructure and end-devices, including mobiles, NB-IoT, and laptops. Learn about MC Catcher capabilities, mobile network mapping, man-in-the-middle attacks, and the process of identifying baseband vendors. Examine the differences between cellular and IoT security, and understand the implications of these vulnerabilities. Discover testing methodologies, reasons for battery drain issues, and potential fixes. Gain valuable insights into the latest security challenges facing 5G technology and their impact on various connected devices.
Syllabus
Introduction
What is 5G
New Use Cases
Security
MC Catcher
Capabilities
New Capabilities
The Issue
Mobile Network Mapping
Maninthemiddle
Nmap
How is it possible
Devices used
Reference model
Identifying baseband vendors
Baseband Wiki
Application
Cellular vs IOT
What now
What are capabilities
Maninthemiddle relay
Maninthemiddle modification
Testing
Why
Battery Drain
Fix
Conclusion
Taught by
Black Hat