Cellular Exploitation a Global Scale: The Rise and Fall of The Control Protocol

by Mathew Solnik, Marc Blanchou
Sept. 19, 2017 0 comments Black Hat belen_caty Pen Testing & Audits

In this presentation, we will discuss and disclose how Over-the-Air code execution can be obtained on the major cellular platforms and networks (GSM/CDMA/LTE). Including but not limited to Android, iOS, Blackberry, and Embedded M2M devices. You will come away from this talk armed with detailed insight into these hidden control mechanisms. We will also release open source tools to help assess and protect from the new threats this hidden attack surface presents. These tools will include the ability to dynamically test proprietary system applications and simulate different aspects of a cellular environment.

https://www.blackhat.com/us-14/archives.html#cellular-exploitation-on-a-global-scale-the-rise-and...