Главная
Study mode:
on
1
Intro
2
Mobile Telephony for InfoSec Practitioners
3
Brief History of Mobile Telephony
4
Handset Anatomy
5
2G/3G Mobile Telephone Network
6
2G Protocol Stack
7
3G/4G Protocol Stack
8
GSM Family Encryption
9
Rogue Base Stations
10
Professional IMSI Catchers
11
Hacker IMSI Catchers
12
I've Brought A Toy!
13
So What's Real and What's FUD?
14
References and Links
15
Thank You!
Description:
Explore the fundamentals of mobile telephony security in this 50-minute conference talk from Louisville Infosec 2014. Delve into the history of mobile technology, understand handset anatomy, and examine 2G, 3G, and 4G network protocols. Learn about GSM family encryption, the risks of rogue base stations, and both professional and hacker-made IMSI catchers. Gain practical insights into real security threats versus common misconceptions in the mobile telephony landscape, and access valuable references for further study in information security.

Mobile Telephony for InfoSec Practitioners

Add to list