-
Q: What is the primary vulnerability discussed regarding 2G/3G/4G networks?A: The lack of mutual authentication in older protocols (2G) allowing for impersonation.
-
Q: What is an 'IMSI Catcher'?A: A device that mimics a legitimate cell tower to intercept mobile traffic and track users.
-
Q: How does a 'Downgrade Attack' facilitate eavesdropping?A: It forces a 4G/LTE device to connect to a less secure 2G network where encryption is weak or nonexistent.
-
Q: What is 'A5/1'?A: The encryption algorithm used in GSM (2G) which has been cryptographically broken.
-
Q: What is 'Femtocell' exploitation?A: Compromising a small, home-based cellular base station to intercept traffic or gain access to the carrier network.
-
Q: What is the significance of 'SS7' vulnerabilities?A: They allow attackers to intercept calls and SMS messages, and track locations across global networks.
-
Q: Why is 'air interface' encryption insufficient?A: It only protects traffic between the device and the tower; it does not protect data in the carrier's backhaul network.
-
Q: What tool is mentioned for cellular network analysis?A: OpenBTS (Open Base Transceiver Station).
-
Q: What is the risk of 'pre-shared keys' in SIM cards?A: If the key database is compromised (as in the Gemalto hack), encryption can be bypassed.
-
Q: What mitigation is suggested for high-risk users?A: Using end-to-end encrypted voice and messaging apps (e.g., Signal) instead of standard cellular services.
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.