Главная
Study mode:
on
1
Introduction
2
What is 5G
3
New Use Cases
4
Security
5
MC Catcher
6
Capabilities
7
New Capabilities
8
The Issue
9
Mobile Network Mapping
10
Maninthemiddle
11
Nmap
12
How is it possible
13
Devices used
14
Reference model
15
Identifying baseband vendors
16
Baseband Wiki
17
Application
18
Cellular vs IOT
19
What now
20
What are capabilities
21
Maninthemiddle relay
22
Maninthemiddle modification
23
Testing
24
Why
25
Battery Drain
26
Fix
27
Conclusion
Description:
Explore new vulnerabilities in 5G networks through this 44-minute Black Hat conference talk. Delve into the evolved security features of 5G radio networks and uncover potential threats affecting both operator infrastructure and end-devices, including mobiles, NB-IoT, and laptops. Learn about MC Catcher capabilities, mobile network mapping, man-in-the-middle attacks, and the process of identifying baseband vendors. Examine the differences between cellular and IoT security, and understand the implications of these vulnerabilities. Discover testing methodologies, reasons for battery drain issues, and potential fixes. Gain valuable insights into the latest security challenges facing 5G technology and their impact on various connected devices.

New Vulnerabilities in 5G Networks

Black Hat
Add to list
0:00 / 0:00