Base Jumping: Attacking Gsm Base Station Systems And Mobile Phone Base Bands presented at SyScan 2010

by The Grugq,

Tags: Security Fuzzing

Summary : Technological advances have finally placed GSM tools within the reach of security
researchers and hackers. Finally it is possible to directly explore the lowest levels of the GSM stack.This talk focuses on both sides of the GSM network where the users and network directly interact: the Um (air) interface.The primary technological focus of this talk is on the exposed interfaces between the GSM networks
and users. This covers the base station system -- the network components which communicate with
mobile phones -- and the base band -- the component of the mobile phone which communicates with the network.During the talk the two main components of the attack system will be demoed - malicious
basestations and malicious basebands. The base station enables fuzzing mobile phone basebands,
as well as other attacks. The baseband is used to test GSM network equipment for flaws,
as well as exploit backend systems.Trust us, you'll *want* to turn off your phone for the duration of this talk!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