Главная
Study mode:
on
1
Intro
2
What is an IMSI?
3
Conventional IMSI Catchers
4
WiFi-Based IMSI Catcher
5
Automatic configuration
6
'Manual Configuration
7
Automatic WiFi Authentication
8
EAP-SIM/AKA Identities
9
EAP-SIM/AKA transport
10
WiFi-Calling Connection
11
IPsec brief overview
12
Internet Key Exchange (IKEV2)
13
Operator/Vendor Mitigations
14
User Mitigation
15
Summary
Description:
Explore a groundbreaking Black Hat conference talk introducing WiFi-based IMSI catchers, a novel approach to tracking mobile devices. Delve into two new methods that exploit WiFi authentication protocols, contrasting them with traditional Stingray-type IMSI catchers that use 2-4G radio protocols. Learn about IMSI fundamentals, conventional IMSI catchers, and the intricacies of WiFi-based alternatives, including automatic configuration, manual configuration, and automatic WiFi authentication. Examine EAP-SIM/AKA identities and transport, WiFi-calling connections, and gain insights into IPsec and Internet Key Exchange (IKEV2). Discover potential operator/vendor mitigations and user protection strategies in this comprehensive 59-minute presentation by Piers O'Hanlon and Ravishankar Borgaonkar.

WiFi-Based IMSI Catcher

Black Hat
Add to list
0:00 / 0:00