Overview
This course covers the following learning outcomes and goals: understanding the evolution of LTE and IMSI catchers, analyzing mobile network architecture, recognizing vulnerabilities such as IMEI and GUTI leaks, exploring location tracking methods, evaluating service denial attacks, assessing the success and impact of IMSI catchers, discussing protection measures, and previewing security aspects in 5G networks.
The course teaches skills such as identifying privacy vulnerabilities, analyzing cellular network security, evaluating the impact of attacks, and exploring protection mechanisms.
The teaching method includes lectures on mobile network architecture, vulnerabilities, attacks, and protection measures, with a focus on real-world examples and case studies.
The intended audience for this course includes security professionals, network engineers, researchers, and individuals interested in understanding cellular network security and privacy issues.
Syllabus
Intro
Overview
Mobile Network Architecture
Recap - Telco Attacks
1. Privacy
IMEI leak: implementation vulnerability
GUTI leak (TMSI)
Location leak-cell/tower
Location leak - GPS co-ordinates Measurement and RUF report
2. Availability
Service denial
BTS Poisoning
Success of IMSI catchers
Status and Impact
Looking for protection
What's more in 5G
Takeaways
Setup and attacks
Taught by
nullcon