video thumbnail
Pause
Mute
Subtitles not available
Playback speed
0.25
0.5
0.75
1
1.25
1.5
1.75
2
Full screen

The Phonebusters

Published on 2015-01-152511 Views

Presentation

The Phonebusters00:00
Kidz, don't try this at home!07:17:40
Data on a SIM card - 118:19:00
Data on a SIM card - 229:24:20
Data on a SIM card - 335:43:00
Data on a SIM card - 446:33:00
Busted! - 158:46:20
Spoofing the identity of SMS sender59:48:20
Sending of SMS “from” arbitrary number - 164:41:00
Sending of SMS “from” arbitrary number - 280:59:00
Busted! - 285:17:00
Spoofing the identity of a caller86:19:40
Calling with arbitrary caller ID - 196:03:00
Calling with arbitrary caller ID - 2119:26:20
Calling with arbitrary caller ID - 3124:15:40
Calling with arbitrary caller ID - 4140:47:00
Practical use193:27:00
Busted! - 3206:28:20
GSM traffic security208:21:40
GSM security – the beginning of the story - 1210:05:40
GSM security – the beginning of the story - 2210:53:40
GSM security – the beginning of the story - 3242:08:20
Some GSM basics269:14:20
SIM card and mobile equipent274:56:20
OsmocomBB336:40:20
Mobile phone with Calypso chipset...342:00:20
...and OsmocomBB firmware369:57:00
Loading romloader374:36:20
Base station scan...383:33:00
GSM traffic analysis...389:47:40
Security analysis of slovenian GSM networks402:21:00
Use of encryption - Mobitel - 1416:29:00
Use of encryption - Mobitel - 2419:14:20
Use of encryption - Mobitel - 3428:44:20
Use of encryption - Simobil - 1434:05:40
Use of encryption - Simobil - 2437:34:20
Use of encryption - Tušmobil452:33:40
Cryptanalysis if session key Kc454:43:00
Creating of session key Kc - 1461:22:20
Creating of session key Kc - 2478:41:40
Cryptanalysis of A5/1491:25:40
Locating of user in mobile network550:17:00
Capture and cryptanalysis of A5/1581:25:40
Non-random padding595:29:00
Random padding599:31:00
Cracking A5/1 session key Kc in a practice - 1605:45:00
Cracking A5/1 session key Kc in a practice - 2611:35:00
Busted! - 4614:30:20
Mobile identity617:06:20
Mobile identity spoofing in GSM network634:34:20
Application mobile - 1639:22:20
Application mobile - 2650:19:00
Application mobile - 3658:19:00
Mobile identity in mobile network662:43:40
Mobile identity spoofing665:09:40
Detection of TMSI number695:09:00
Reconstruction of Kc699:05:40
SIM spoof702:51:00
Mobile identity spoofing714:48:20
Busted! - 5751:58:20
Reply from Telekom Slovenije756:04:20
Traffic data in data retention database765:22:20
What does it means for the data retention measures and eavesdropping?771:43:40
Software on the Witness Stand772:53:00
Gorenjski glas, 2. marec 2007787:23:00
Busted! - 6836:24:20
Mobile network security837:25:40
Some other attacks on mobile networks838:48:20
Busted! - 7858:19:00
Mobile network authentication859:18:20
Problem: mobile network does not authenticate to mobile phone - 1860:01:00
Problem: mobile network does not authenticate to mobile phone - 2877:28:20
Problem: mobile network does not authenticate to mobile phone - 3881:17:40
Problem: mobile network does not authenticate to mobile phone - 4889:41:00
Problem: mobile network does not authenticate to mobile phone - 5892:46:20
IMSI Catcher could be bought...899:22:20
...or we can build our own902:40:20
...or we can build our own (2)936:29:00
...or we can build our own (3)939:29:00
IMSI catcher detection - 1940:45:40
IMSI catcher detection - 2954:16:20
Busted! - 8963:57:00
Smartphones security964:56:20
Main approaches to smartphone security966:14:20
Encrypted SMS messages: TextSecure978:34:20
Encrypted phone calls: RedPhone - 1983:03:00
Encrypted phone calls: RedPhone - 2989:26:20
Unencrypted phone call (IP telefonija)990:06:20
Encrypted phone call995:22:20
Traffic data of RedPhone calls996:23:00
Encrypted calls: CsipSimple and OSTN1005:55:00
Encrypted instant messages: ChatSecure1007:50:20
Anonymisation...1008:42:20
...of voice communication on a mobile phone1010:15:40
Voice communication on a mobile phone through Tor network1010:44:20
Table1019:22:20
Location tracking1022:28:20
Location privacy - 11023:17:40
Silent SMS1032:39:40
Location privacy - 21045:05:40
Location privacy - 31064:47:00
Location privacy - 41082:09:00
Busted! - 91102:18:20
Attacks to internal memory - 11103:21:40
Attacks to internal memory - 21104:12:20
Tradeoff between security and usability1108:43:40
Cold Boot attack on mobile phones - 11140:05:00
Cold Boot attack on mobile phones - 21166:10:20
Evil Maid attack on mobile phones - 11178:30:20
Evil Maid attack on mobile phones - 21192:18:20
Evil Maid attack on mobile phones - 31198:37:00
Busted! - 101209:45:40
Baseband attacks1210:39:40
How much processors does your mobile phone have?1213:45:00
Attacks over the radio processor1225:44:20
Busted! - 111238:24:20
What about using external encryption device?1252:36:20
Using external, separated encryption device1254:35:40
Busted! - 121263:07:00
Conclusion - 11284:07:40
Conclusion - 21285:03:40
Conclusion - 31291:45:00
Attacks always get better; they never get worse1302:13:00
Questions1308:27:00