Главная
Study mode:
on
1
Introduction
2
Agenda
3
Background
4
Technical Details
5
Environment Overview
6
LTE Interfaces
7
Legitimate UE
8
Privileged Access
9
Challenges with Testing
10
No Authentication
11
Authentication Process
12
GTP
13
Tunnel IDs
14
Test Methods
15
The Bad Picture
16
Implementing the Environment
17
Gateways
18
Communications
19
Control
20
Architecture
21
Conclusions
22
Three Protective Controls
23
Moving to 12T
24
IPSec
25
Testing
26
Summary
Description:
Explore the security landscape of 4G (LTE) networks in this 52-minute conference talk from the 44CON Information Security Conference. Gain insights into the challenges and risks associated with LTE implementations, focusing on the use of IP for all communications between components. Learn about security testing methodologies for 4G networks, including an overview of LTE deployments, potential attack vectors, and assurance techniques. Delve into technical details such as LTE interfaces, authentication processes, and GTP tunnels. Discover the challenges in testing, including issues with no authentication and privileged access. Examine the implementation of testing environments, gateways, communications control, and architecture. Conclude with an understanding of protective controls, the move to 12T, IPSec, and essential testing procedures to ensure the security of 4G networks.

Security Testing 4G - LTE Networks

44CON Information Security Conference
Add to list
00:00
-00:54