Главная
Study mode:
on
1
Intro
2
What we will learn
3
Birds Eye View
4
Baseband Overview
5
Baseband Hardware
6
Baseband Firmware - DEMO
7
Communicating With Baseband
8
Accessing the SIM-Card from the AP
9
SIM-Card-Access via AT+CSIM
10
Command-APDU via AT+CSIM
11
What is a Wormhole
12
Wormholes in your Phone
13
Shadow SIM - Overview
14
ShadowSIM - Concept
15
ShadowSIM - Baseband Communication
16
ShadowSIM - Firmware Modification
17
Defense - unintended SIM-Usage
18
Results-Recap
Description:
Explore the vulnerabilities in mobile network authentication and learn techniques for accessing SIM cards and forwarding authentication vectors in this BruCON Security Conference talk. Delve into the concept of "wormholes" in modern smartphones, which allow data to travel through unexpected communication channels. Gain insights into accessing SIM cards on Android phones without special privileges, and discover methods for modifying baseband firmware. Examine the implications of these vulnerabilities for online banking and account security. Follow along with demonstrations and a walkthrough of analyzing baseband firmware, and understand potential defense mechanisms against unintended SIM usage.

Stealing a Mobile Using Wormholes

BruCON Security Conference
Add to list
0:00 / 0:00