Главная
Study mode:
on
1
Intro
2
Overview
3
Mobile Network Architecture
4
Recap - Telco Attacks
5
Self Organized Network (SON)
6
SON Operation in Practice
7
SON Operation Modes
8
SON Design Issue
9
Key Question
10
Automation in LTE - Vulnerable Points
11
LTE PCI Optimization
12
Automatic Neighbor Relation (ANR)
13
LTE Handover
14
Handover Analysis
15
Rogue Data Injection
16
Vulnerable Mobile Network Functions
17
Rogue eNodeB
18
Remotely Kill & Restart LTE Base Station
19
Handover Hijacking (Dropping Calls)
20
Impact of Handover Hijacking
21
Impact - Grand Scale
22
Vulnerability Status
23
Solutions
24
Takeaways
Description:
Explore the vulnerabilities in automated 4G/LTE networks through an in-depth examination of rogue base station operations. Delve into the exploitation of weaknesses in 4G/LTE mobile phones and SON protocols for malicious packet injection. Gain insights into mobile network architecture, telco attacks, and Self Organized Network (SON) operations. Analyze LTE PCI optimization, Automatic Neighbor Relation (ANR), and LTE handover processes. Discover the impact of rogue data injection, vulnerable mobile network functions, and handover hijacking. Learn about remotely killing and restarting LTE base stations, and understand the grand-scale implications of these vulnerabilities. Examine proposed solutions and key takeaways for securing LTE network automation against potential threats.

LTE Network Automation Under Threat

Black Hat
Add to list
0:00 / 0:00