Base Jumping: Attacking GSM Base Station Systems and Mobile Phone Base Bands presented at BlackHatAbuDhabi 2010

by The Grugq,

URL : https://media.blackhat.com/bh-ad-10/Grugq/BlackHat-AD-2010-Gurgq-Base-Jumping-slides.pdf

Summary : Recent technological advances have placed GSM tools within the reach of today's security researchers and hackers. It is finally possible to directly explore the lowest levels of the GSM stack.
This talk focuses on both sides of the GSM network where the users and network directly interact: the Um (air) interface.
The primary technological focus of this talk is on the exposed interfaces between the GSM networks and users. This covers the base station systemthe network components which communicate with mobile phonesand the base bandthe component of the mobile phone which communicates with the network.
During the talk the two main components of the attack system will be demoed - malicious basestations and malicious basebands. The base station enables fuzzing mobile phone basebands, as well as other attacks. The baseband is used to test GSM network equipment for flaws, as well as exploit backend systems.
Trust us, you'll want to turn off your phone for the duration of this talk!