Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-telco-security
A list of telco security resources and projects.
https://github.com/Lofmir/awesome-telco-security
Last synced: 5 days ago
JSON representation
-
Rogue BTS & CDMA/GSM Traffic Impersonation and Interception
- How To Build Your Own Rogue GSM BTS For Fun and Profit
- Practical attacks against GSM networks: Impersonation
- Building a Portable GSM BTS Using BladeRF/PI
- rtl.sdr.com Tutorial-Analyzing GSM with-Airprobe and Wireshark - SDR software defined radio can be used to analyze cellular phone GSM signals, using Linux based tools GR-GSM (or Airprobe) and Wireshark. This tutorial shows how to set up these tools for use with the RTL-SDR."
- Traffic Interception for Penetration Testing Engagements - exhaustively we commonly see:"
- Building a Portable GSM BTS Using BladeRF/PI
-
Cellular Attacks
- Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information
- Hacking Public Warning System in LTE Mobile Networks
- RF Exploitation: IoT/OT Hacking with SDR
- Hacking Cellular Networks
- Bye-Bye-IMSI-Catchers
- New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
- White-Stingray: Evaluating IMSI Catchers Detection Applications
- Breaking_LTE_on_Layer_Two
- LTE/LTE-A Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation
- Exploring LTE security and protocol exploits with open source software and low-cost software radio by Roger Jover
- LTE PROTOCOL EXPLOITS: IMSI CATCHERS,BLOCKING DEVICES AND LOCATION LEAKS
- Using OpenBTS - "Experimental_Security_Assessment_of_BMW_Cars by KeenLab"
- 5G NR Jamming, Spoofing, and Sniffing
- Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
- #root via SMS: 4G access level security assessment
- LTE security and protocol exploits
- LTE Recon - (Defcon 23)
- Synacktiv
- WiFi IMSI Catcher
- Demystifying the Mobile Network by Chuck McAuley
- D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov
- VoLTE Phreaking - Ralph Moonen
- LTE Security – How Good Is It?
- Forcing a targeted LTE Cellphone Into an Eavesdropping Network
- New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
- Forcing a targeted LTE Cellphone Into an Eavesdropping Network
-
SIM Specific Attacks
-
SS7/Telecom Specific
-
Resources
-
Misc