Главная
Study mode:
on
1
Introduction
2
Background
3
Paging Procedure
4
Capabilities Exchange
5
Security Specifications
6
NSA Security
7
Tracking
8
Randomization
9
Downgrading Attacks
10
Capability Exchange
11
Decoding
12
Impact
13
Standalone Networks
14
Downgrading
15
Master Slave
16
Base Station
17
Ciphering Indicator
18
Network Selection
19
Guidelines for Operators
20
Security Verification
21
Takeaways
Description:
Explore the vulnerabilities and security measures of 5G networks in this comprehensive Black Hat conference talk. Delve into the world of IMSI catchers, also known as Stingrays or fake base stations, and their impact on mobile phone privacy. Examine the evolution of cellular network generations from 2G to 5G, focusing on the new security mechanisms implemented in 5G to address these threats. Follow along as the speakers conduct practical experiments using commercial 5G devices to investigate the effectiveness of these protection techniques. Learn about various aspects of 5G security, including paging procedures, capabilities exchange, NSA security, tracking, randomization, and downgrading attacks. Gain insights into standalone networks, base station operations, ciphering indicators, and network selection processes. Discover guidelines for operators and security verification methods. Walk away with valuable takeaways on the current state of 5G security and its implications for mobile privacy. Read more

5G IMSI Catchers Mirage

Black Hat
Add to list