GSM, Telecommunications infrastructure, Mobile phone, Cell site, Cellular network, Base station

An overview of hacking LTE

On Oct 25, 2020
@elenaneira shared
An overview of LTE hacking https://t.co/sHTUw9Ut9O https://t.co/ofJ4QQzotr
Open

Documentation for the Division of Network and Systems Engineering’s Cyber Security Lab at KTH

nse.digital
On Oct 25, 2020
@elenaneira shared
An overview of LTE hacking https://t.co/sHTUw9Ut9O https://t.co/ofJ4QQzotr
Open

An overview of hacking LTE

An overview of hacking LTE

Documentation for the Division of Network and Systems Engineering’s Cyber Security Lab at KTH

Gotta Catch 'Em All: Understanding How IMSI-Catchers Exploit Cell Networks

Gotta Catch 'Em All: Understanding How IMSI-Catchers Exploit Cell Networks

Table of ContentsSection 1: Introduction Section 2: Necessary background info Section 3: Overview of attacks Section 3.1: Basic IMSI-catcher Section 3.2: Communication interception ...

Awesome-Cellular-Hacking

Awesome-Cellular-Hacking

Awesome-Cellular-Hacking. Contribute to W00t3k/Awesome-Cellular-Hacking development by creating an account on GitHub.

Security weaknesses in 5G, 4G and 3G could expose users’ locations

Security weaknesses in 5G, 4G and 3G could expose users’ locations

Researchers have discovered security holes in 5G, 4G and 3G telephony protocols, which can expose a user’s location.

LTE and 5G Integrity attacks – An in-depth briefing

LTE and 5G Integrity attacks – An in-depth briefing

Finding loopholes in security suits never stops... Recent publications reveal innovative attacks in 4G and 5G networks. Here's a look into these new attacks.

GSM Traffic and Encryption: A5/1 Stream Cipher

GSM Traffic and Encryption: A5/1 Stream Cipher

Raymond Felch // Disclaimer: Be sure to use a faraday bag or cage before transmitting cellular data so you don’t accidentally break any laws by illegally transmitting on regulated ...

Fiber-optic is important for 5G but operators will need a range of options

Fiber-optic is important for 5G but operators will need a range of options

Only 5G cell-sites served with fiber-optic cable or microwave links will be able to support the latency tolerances required by some LTE and 5G applications.

Drones and networks: Ensuring safe and secure operations

Drones and networks: Ensuring safe and secure operations

How will LTE and 5G mobile networks support drone connectivity in future? Learn about drone communication and traffic management in our latest white paper.

The Glossary of Things of Cellular IoT

The Glossary of Things of Cellular IoT

Cellular IoT is on its way up. And, there are a lot of terms associated with the technology. Here’s a quick rundown of 20 essential cellular IoT terms that will help you better understand ...

Understanding what a 5G SIM is and its benefits

Understanding what a 5G SIM is and its benefits

5G SIM ensures a new trust model in 5G thanks to subscriber identity privacy and protection against hacking, while maximizing operators’ 5G network investments

Click here to read the article

Click here to read the article

We show that partly learning SQN leads to a new class of privacy attacks (i.e., activ- ity monitoring attacks): an active attacker can leverage fake base stations and our attack to learn ...

ETH researchers uncover security gaps in the 5G mobile communication standard

ETH researchers uncover security gaps in the 5G mobile communication standard

Researchers in the Information Security Group subjected the upcoming 5G mobile communication standard to a comprehensive security analysis. The fifth and newest mobile communication ...

5g In-Building Deployment Trend: Roll-Out Options and Challenges Featured

5g In-Building Deployment Trend: Roll-Out Options and Challenges Featured

Real estate companies, building owners, landlords and others are beginning to see wireless as a “fourth utility” behind water, power, and heating and cooling. This takes on further emphasis ...