Главная
Study mode:
on
1
Intro
2
Tracking
3
Messages
4
Impact of SS7
5
Fake Base Stations
6
Rerouting Attacks
7
Demo
8
Phone identification
9
Phone recording
10
Transaction analysis
11
Wireshark
12
Breaking 3G
13
Breaking 2G
14
GSM Map
15
Encryption
16
Encryption Metric
17
SIM Card Encryption
18
Data Submissions
19
snoop snitch
20
base station behavior
21
Alarm
22
Statistics
23
Network Security
24
DSMF
25
Conclusion
Description:
Explore mobile network vulnerabilities and learn self-defense strategies in this 39-minute conference talk from nullcon Goa 2015. Discover new hybrid attack scenarios, including passive intercept and decryption of 3G traffic. Understand how modern phones can block or detect various attacks such as IMSI catchers, SIM exploits, and SMS attacks. Learn about SnoopSnitch, an Android app that alerts users to common mobile threats. Dive into topics like tracking, fake base stations, rerouting attacks, phone identification and recording, transaction analysis, breaking 2G and 3G networks, GSM mapping, encryption metrics, and SIM card security. Gain insights on data submissions, base station behavior, alarms, statistics, and network security measures to protect your mobile communications.

Mobile Self Defence

nullcon
Add to list
0:00 / 0:00