Explore the world of IMSI Catchers in this informative video presentation by White Hat alum Maria Pikusova. Discover how these tools exploit a longstanding authentication bug in the Global System for Mobile Communications (GSM) to intercept cell phone communications. Learn about the history, functionality, and potential applications of IMSI Catchers, including the controversial Stingray device. Understand the technical aspects such as bidirectional authentication, strong signal manipulation, and encryption vulnerabilities that enable man-in-the-middle attacks. Examine the legal landscape surrounding IMSI Catchers, including ACLU and Google's involvement, and current legislation. Gain insights into personal security concerns and explore an open-source Android app designed to detect IMSI Catchers. Engage with the content by investigating laws in your area and sharing your findings in the comments.
Overview
Syllabus
Intro
What are IMSIs
How it started
Why its useful
Stingray
Bidirectional Authentication
Strong Signal
Encryption
Maninthemiddle
ACLU
Google
Legislation
Should you be worried
How to get information
Android app
Conclusion
Questions
Taught by
White Hat Cal Poly