Overview
Explore mobile network vulnerabilities and learn self-defense strategies in this 39-minute conference talk from nullcon Goa 2015. Discover new hybrid attack scenarios, including passive intercept and decryption of 3G traffic. Understand how modern phones can block or detect various attacks such as IMSI catchers, SIM exploits, and SMS attacks. Learn about SnoopSnitch, an Android app that alerts users to common mobile threats. Dive into topics like tracking, fake base stations, rerouting attacks, phone identification and recording, transaction analysis, breaking 2G and 3G networks, GSM mapping, encryption metrics, and SIM card security. Gain insights on data submissions, base station behavior, alarms, statistics, and network security measures to protect your mobile communications.
Syllabus
Intro
Tracking
Messages
Impact of SS7
Fake Base Stations
Rerouting Attacks
Demo
Phone identification
Phone recording
Transaction analysis
Wireshark
Breaking 3G
Breaking 2G
GSM Map
Encryption
Encryption Metric
SIM Card Encryption
Data Submissions
snoop snitch
base station behavior
Alarm
Statistics
Network Security
DSMF
Conclusion
Taught by
nullcon