Attacks From a New Front Door in 4G & 5G Mobile Networks

Attacks From a New Front Door in 4G & 5G Mobile Networks

Black Hat via YouTube Direct link

Intro

1 of 23

1 of 23

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Attacks From a New Front Door in 4G & 5G Mobile Networks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 General mobile network
  3. 3 Exposure via a provider
  4. 4 Drone control via network exposure
  5. 5 Control and configure the SIMS
  6. 6 How it works: Get device location
  7. 7 Misc functions
  8. 8 Attack model for network exposure
  9. 9 Commercial loT service platform security configurations
  10. 10 Platform design and forged access?
  11. 11 Guessable username and password policies for API authentication
  12. 12 Token management
  13. 13 Lack of rate limiting for API requests
  14. 14 Private identifiers used in apps domain
  15. 15 Verbose error messages
  16. 16 Firewall vs secure API-by-design
  17. 17 Malware propagation inside user plane
  18. 18 Internal node exposure
  19. 19 Broken authorization while sending downlink message
  20. 20 Access control misconfiguration
  21. 21 Script Injection
  22. 22 XSS execution
  23. 23 Summary of security analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.