pdf

CellularEavesdropping SD.pdf

Cellulareavesdropping Sd

Presentation on cellular network vulnerabilities and eavesdropping techniques.

This page contains AI generated content. Errors or omissions may be present. Use human level critical thinking.
  • Q: What is the primary vulnerability discussed regarding 2G/3G/4G networks?
    A: The lack of mutual authentication in older protocols (2G) allowing for impersonation.
  • Q: What is an 'IMSI Catcher'?
    A: A device that mimics a legitimate cell tower to intercept mobile traffic and track users.
  • Q: How does a 'Downgrade Attack' facilitate eavesdropping?
    A: It forces a 4G/LTE device to connect to a less secure 2G network where encryption is weak or nonexistent.
  • Q: What is 'A5/1'?
    A: The encryption algorithm used in GSM (2G) which has been cryptographically broken.
  • Q: What is 'Femtocell' exploitation?
    A: Compromising a small, home-based cellular base station to intercept traffic or gain access to the carrier network.
  • Q: What is the significance of 'SS7' vulnerabilities?
    A: They allow attackers to intercept calls and SMS messages, and track locations across global networks.
  • Q: Why is 'air interface' encryption insufficient?
    A: It only protects traffic between the device and the tower; it does not protect data in the carrier's backhaul network.
  • Q: What tool is mentioned for cellular network analysis?
    A: OpenBTS (Open Base Transceiver Station).
  • Q: What is the risk of 'pre-shared keys' in SIM cards?
    A: If the key database is compromised (as in the Gemalto hack), encryption can be bypassed.
  • Q: What mitigation is suggested for high-risk users?
    A: Using end-to-end encrypted voice and messaging apps (e.g., Signal) instead of standard cellular services.

Ask a question

Have a doubt or need clarification?



I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.

Thank you!

I have received your message and I shall get back to you shortly.