DEF CON China Party - Cooper Quintin- Detecting Fake 4G Base Stations in Real Time
4G based IMSI catchers such as the Hailstorm are becoming more popular with governments and law enforcement around the world, as well as spies, and even criminals. Until now IMSI catcher detection has focused on 2G IMSI catchers such as the Stingray which are quickly falling out of favor.
In this talk we will tell you how 4G IMSI Catchers might work to the best of our knowledge, and what they can and can't do. We demonstrate a brand new software project to detect fake 4G base stations, with open source software and relatively cheap hardware. And finally we will present a comprehensive plan to dramatically limit the capabilities of IMSI catchers (with the long term goal of making them useless once and for all).
Видео DEF CON China Party - Cooper Quintin- Detecting Fake 4G Base Stations in Real Time канала DEFCONConference
In this talk we will tell you how 4G IMSI Catchers might work to the best of our knowledge, and what they can and can't do. We demonstrate a brand new software project to detect fake 4G base stations, with open source software and relatively cheap hardware. And finally we will present a comprehensive plan to dramatically limit the capabilities of IMSI catchers (with the long term goal of making them useless once and for all).
Видео DEF CON China Party - Cooper Quintin- Detecting Fake 4G Base Stations in Real Time канала DEFCONConference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
DEF CON 29 - Michael Whiteley Katie Whiteley - Making the DEF CON 29 BadgeDEF CON 26 - Nirenberg and Buchwald - Reverse Engineering Hacking Documentary SeriesAndrew Tierney - Pwning a mobile drilling rig Hacking an oil rig - DEF CON 27 Hack the Sea VillageAli Islam - Weaponizing Hypervisors to Beat Car and Medical Device Attacks - DEF CON 27 ConferenceDEF CON 29 Blockchain Village - Anto Joseph - Flash Loans DemystifiedDEF CON Safe Mode Career Hacking Village - Steven Bernstein - Cons & CareersDEF CON 29 - Chad Seaman - UPnProxyPot: Fake the Funk, Become a Blackhat Proxy, MITM their TLS...DEF CON 24 - Bryant Zadegan, Ryan Lester - Abusing Web Standards for AppSec GloryDEF CON 24 - Adam Donenfeld - Stumping the Mobile ChipsetGerald Doussot - State of DNS Rebinding Attacks & Singularity of Origin - DEF CON 27 ConferenceDEF CON 25 Conference - Alvaro Muñoz, Alexandr Mirosh - Friday the 13th JSON attacksDEF CON 29 - Mars Cheng, Selmon Yang - Taking Apart and Taking Over ICS & SCADA EcosystemsDEF CON 29 - Rex Guo, Junyuan Zeng - Phantom Attack: Evading System Call MonitoringHila Cohen, Amit Waisel - Malproxy Leave Your Malware at Home - DEF CON 27 ConferenceDEF CON 20 Documentary 20min Preview - 720pAriel Herbert Voss - Dont Red Team AI Like a Chump - DEF CON 27 ConferenceDEF CON Safe Mode Aerospace Village - Harshad Sathaye - A Deeper Dive into ILS and ADS B SpoofingDEF CON Safe Mode Red Team Village - Shay Nehmad - Making Breach and Attack Simulation AccessibleJeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 ConferenceDEF CON Safe Mode Blue Team Village - Canary - Thinkst Canary OPENSOC CTF Tool DemoYou are not hiding from me NET - Aden Wee Jing Chung - DEF CON China 1