Загрузка страницы

DEF CON China Party - Cooper Quintin- Detecting Fake 4G Base Stations in Real Time

4G based IMSI catchers such as the Hailstorm are becoming more popular with governments and law enforcement around the world, as well as spies, and even criminals. Until now IMSI catcher detection has focused on 2G IMSI catchers such as the Stingray which are quickly falling out of favor.

In this talk we will tell you how 4G IMSI Catchers might work to the best of our knowledge, and what they can and can't do. We demonstrate a brand new software project to detect fake 4G base stations, with open source software and relatively cheap hardware. And finally we will present a comprehensive plan to dramatically limit the capabilities of IMSI catchers (with the long term goal of making them useless once and for all).

Видео DEF CON China Party - Cooper Quintin- Detecting Fake 4G Base Stations in Real Time канала DEFCONConference
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
8 апреля 2021 г. 12:53:19
00:24:19
Другие видео канала
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 BadgeDEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 BadgeDEF CON 26 -  Nirenberg and Buchwald - Reverse Engineering Hacking Documentary SeriesDEF CON 26 - Nirenberg and Buchwald - Reverse Engineering Hacking Documentary SeriesAndrew Tierney - Pwning a mobile drilling rig Hacking an oil rig - DEF CON 27 Hack the Sea VillageAndrew Tierney - Pwning a mobile drilling rig Hacking an oil rig - DEF CON 27 Hack the Sea VillageAli Islam - Weaponizing Hypervisors to Beat Car and Medical Device Attacks - DEF CON 27 ConferenceAli Islam - Weaponizing Hypervisors to Beat Car and Medical Device Attacks - DEF CON 27 ConferenceDEF CON 29 Blockchain Village - Anto Joseph - Flash Loans DemystifiedDEF CON 29 Blockchain Village - Anto Joseph - Flash Loans DemystifiedDEF CON Safe Mode Career Hacking Village - Steven Bernstein - Cons & CareersDEF CON Safe Mode Career Hacking Village - Steven Bernstein - Cons & CareersDEF CON 29 - Chad Seaman - UPnProxyPot: Fake the Funk, Become a Blackhat Proxy, MITM their TLS...DEF CON 29 - Chad Seaman - UPnProxyPot: Fake the Funk, Become a Blackhat Proxy, MITM their TLS...DEF CON 24 - Bryant Zadegan, Ryan Lester - Abusing Web Standards for AppSec GloryDEF CON 24 - Bryant Zadegan, Ryan Lester - Abusing Web Standards for AppSec GloryDEF CON 24 - Adam Donenfeld - Stumping the Mobile ChipsetDEF CON 24 - Adam Donenfeld - Stumping the Mobile ChipsetGerald Doussot - State of DNS Rebinding Attacks & Singularity of Origin - DEF CON 27 ConferenceGerald Doussot - State of DNS Rebinding Attacks & Singularity of Origin - DEF CON 27 ConferenceDEF CON 25 Conference - Alvaro Muñoz, Alexandr Mirosh - Friday the 13th JSON attacksDEF CON 25 Conference - Alvaro Muñoz, Alexandr Mirosh - Friday the 13th JSON attacksDEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA EcosystemsDEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA EcosystemsDEF CON 29 - Rex Guo, Junyuan Zeng - Phantom Attack: Evading System Call MonitoringDEF CON 29 - Rex Guo, Junyuan Zeng - Phantom Attack: Evading System Call MonitoringHila Cohen, Amit Waisel - Malproxy Leave Your Malware at Home - DEF CON 27 ConferenceHila Cohen, Amit Waisel - Malproxy Leave Your Malware at Home - DEF CON 27 ConferenceDEF CON 20 Documentary 20min Preview - 720pDEF CON 20 Documentary 20min Preview - 720pAriel Herbert Voss - Dont Red Team AI Like a Chump - DEF CON 27 ConferenceAriel Herbert Voss - Dont Red Team AI Like a Chump - DEF CON 27 ConferenceDEF CON Safe Mode Aerospace Village - Harshad Sathaye - A Deeper Dive into ILS and ADS B SpoofingDEF CON Safe Mode Aerospace Village - Harshad Sathaye - A Deeper Dive into ILS and ADS B SpoofingDEF CON Safe Mode Red Team Village - Shay Nehmad -  Making Breach and Attack Simulation AccessibleDEF CON Safe Mode Red Team Village - Shay Nehmad - Making Breach and Attack Simulation AccessibleJeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 ConferenceJeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 ConferenceDEF CON Safe Mode Blue Team Village - Canary - Thinkst Canary OPENSOC CTF Tool DemoDEF CON Safe Mode Blue Team Village - Canary - Thinkst Canary OPENSOC CTF Tool DemoYou are not hiding from me NET - Aden Wee Jing Chung - DEF CON China 1You are not hiding from me NET - Aden Wee Jing Chung - DEF CON China 1
Яндекс.Метрика