Bypassing in Mobile Network From Red-Team Points of View

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • aNullValue
    Moderator
    • Jun 2019
    • 584

    #1

    Bypassing in Mobile Network From Red-Team Points of View

    This talk focus on reviewing implementation of new security features in mobile networks as well as detecting techniques and bypassing methods from red team perspective . The scope of the illustration include both radio (SDR) and signalling core network attacks. - The outline of the presentation // max 500 words One of the most complicated network is mobile telecom network. There are some segments include signalling, charging, packet data, Radio etc. Still there are many security holes that allow attackers to compromise the network and however telecom companies enable security mechanisms and put some security devices. In this talk, I will cover common high-tech security solutions used by telecom operators and and all ways to detect and after that bypass it as well as security recommendations to prevent theses activities. In this talk I will start the presentation with recent telecom abuse and related hacking news in 2019. In the next section I will cover common mobile network vulnerabilities and architecture. After that illustrate security of radio access network (RAN) and bypassing scenarios and techniques:
    1. Mobile Phone Registration (IMEI policies) Bypass
    2. Bypassing Unrevealed Ciphering Algorithms
    3. 5G, LTE/LTE Advanced Bypass
    The next part of the talk will be assign to Circuit Switch network (Signaling) and the technical bypass techniques are as below:
    1. Home Routing Detection
    2. Bypassing Home Routing
    3. Signalling Firewall Detection
    4. Bypassing Signalling Firewall
    And at the final section I will explain security solutions to defend against these malicious techniques.

    Speaker(s): Ali Abdollahi

    Location: Red Team Vlg

    Discord: https://discord.com/channels/7082082...77357820411944

    Event starts: 2020-08-08 20:15 (08:15 PM) PDT (UTC -07:00)

    Event ends: 2020-08-08 21:15 (09:15 PM) PDT (UTC -07:00)

    For the most up-to-date information, please either visit https://info.defcon.org, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-07-29T01:27 (UTC).
    Starts
    August 8, 2020 20:15
    Ends
    August 8, 2020 21:15
    Location
    Red Team Vlg
Working...