ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

#HITBGSEC

Автор: Hack In The Box Security Conference

Загружено: 2019-09-30

Просмотров: 9596

Описание: Femtocells offer a user the ability to have a small base station located within their house or other area. These small base stations provide access to the core telecom network where poor reception from an eNodeB would normally prevent consistent coverage. Femtocells has been standardized in LTE since release 8, and is referred as Home eNodeB, or HeNB. HeNBs are mandated to have an IPsec connection back to a security gateway (SeGW) to protect traffic flowing into and out of a Mobile Network Operator (MNO)’s core network.

If the HeNB is within the physical possession of an attacker, this provides unlimited time to identify a flaw on the HeNB. A compromised HeNB can be used in a manner similar to a rogue base station, but will also provide the attacker access to clear text traffic before it is sent back to the core network. There are more than ten different types of HeNBs deployed in China. Ericsson ENC-nRBS01B40 is one of them – a TD-LTE base station working on band B40.

In this talk, we will cover:

1.) How to root a 4G LTE femtocell.
2.) How to make the femtocell portable.
3.) How to perform man-in-the-middle attack with the femtocell.
4.) Show the prototype of Hacking Box of S1 Interface (HBoS)

===

Xiaodong Zou (aka Seeker), Call-sign: BD4ET, Entrepreneur, Educator, Investor and Hacker. Seeker has 22 years’ of executive management and higher education experience as the founder of HiTeam Institute of Software Engineering. As an independent network security researcher focus on telecommunication and IOT, Seeker has done a lot of research works on hacking air interface of LTE/UMTS/GSM, cellular RAN and core networks, signaling protocols like SS7, Diameter, interconnections via GRX/IPX, firmware of femtocells and IOT devices, and baseband of mobile phones. He is one of the most active security researcher in telecommunication networks. Research Interest: 1.Cellular Network Security 2.Internet of Things (IoT) Security 3.5G Mobile Edge Computing Conference Talks: 1.from HAM Radio to 5G: the Evolution of Wireless Communication and it’s Security, Defcon 010 at Internet Security Conference 2018. 2.from Pocket Fake Base Station to Hand-held True Base Station, KCon 2017. 3.Telecommunication Devices Selling on Tabobao and the threat to IoT Security, Cyber Security Summit 2017. 4.Network Intrusion Starting from a Cellular Phone, xKungfoo 2017. 5.Advanced Hacking Through Rogue Base Station: Taking Down All SMS Verification Codes, KCon 2016.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
#HITBGSEC

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Attacks You Can't Combat  Vulnerabilities of Mobile Operators - Sergey Puzankov - DEF CON China 1

Attacks You Can't Combat Vulnerabilities of Mobile Operators - Sergey Puzankov - DEF CON China 1

LTE And IMSI Catchers: Then And Now | Altaf Shaik | nullcon Goa 2019

LTE And IMSI Catchers: Then And Now | Altaf Shaik | nullcon Goa 2019

4G LTE Man In The Middle Attacks With A Hacked Femtocell   Xiaodong Zou

4G LTE Man In The Middle Attacks With A Hacked Femtocell Xiaodong Zou

#HITBGSEC D2: Launching Feedback-Driven Fuzzing On TrustZone TEE - Andrey Akimov

#HITBGSEC D2: Launching Feedback-Driven Fuzzing On TrustZone TEE - Andrey Akimov

#HITB2016AMS D1T1 Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang

#HITB2016AMS D1T1 Forcing A Targeted LTE Cellphone Into An Eavesdropping Network - Lin Huang

4G to 5G Evolution: In-Depth Security Perspective

4G to 5G Evolution: In-Depth Security Perspective

How to Hack a Car: Phreaked Out (Episode 2)

How to Hack a Car: Phreaked Out (Episode 2)

Что такое IMSI-ловушка? Как защитить себя

Что такое IMSI-ловушка? Как защитить себя

WiFi-Based IMSI Catcher

WiFi-Based IMSI Catcher

Hacking 4G and how to get arrested in 10 minutes - Christian Sørseth

Hacking 4G and how to get arrested in 10 minutes - Christian Sørseth

DEF CON 18 - Chris Paget - Practical Cellphone Spying

DEF CON 18 - Chris Paget - Practical Cellphone Spying

Первый P2P‑менеджер паролей без облака от Tether (USDT): PearPass обзор

Первый P2P‑менеджер паролей без облака от Tether (USDT): PearPass обзор

Breaking LTE on Layer Two

Breaking LTE on Layer Two

New Vulnerabilities in 5G Networks

New Vulnerabilities in 5G Networks

Боглаев/Бобылев: Бунт против Набиуллиной.

Боглаев/Бобылев: Бунт против Набиуллиной.

LTE & IMSI Catcher Myths

LTE & IMSI Catcher Myths

Intercept cell signals with femtocell

Intercept cell signals with femtocell

Взлом мобильных телефонов в стиле Мистера Робота

Взлом мобильных телефонов в стиле Мистера Робота

Defcon 21 - Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

Defcon 21 - Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

Создание собственной сотовой сети 2G GSM в 2023 году (за небольшие деньги)

Создание собственной сотовой сети 2G GSM в 2023 году (за небольшие деньги)

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]