Cellular Hacking Workshop

March 20, 2017 (at 9 a.m.)

To stay interconnected we are using cellular networks all around the world. The network is offering us many services such as voice, short messaging and Internet access in smartphones but also a lot of IoT devices. The workshop will explain mobile communications on a technical level and assist in setting up a cellular lab based on OpenSource. We will set up our own full man-in-the-middle IMSI-Catcher (aka Stingray/FakeBTS) to understand mobile communication on a deeper technical level, but also to demonstrate how insecure such interfaces can be. Further exercises will demonstrate how the lab can be utilized for penetration testing of devices using 2G/3G/4G networks (Data interception, SMS Fuzzing) and applying common penetration testing methods to our targets.

Requirements:

Hendrik Schmidt

Hendrik Schmidt is a seasoned security researcher with vast experiences in large and complex enterprise networks. He is a pentester at the German based ERNW GmbH with focus on telecommunication networks. Over the years he evaluated and reviewed all kinds of network protocols and applications. He loves to play with complex technologies and networks and demonstrated several implementation and design flaws. In this context he learned how to play around with core and backhaul networks, wrote protocol fuzzers and spoofers for testing implementations and security architecture. As his profession of pentester, security researcher and consultant he will happily share his knowledge with the audience.