Top Banner
©2017 P1 Security. All rights reserved. ² Training Description TS-250 IMS Security & attacking telecom infrastructure
3

P1 Training Description TS-250 20171010 IMS Security & attacking telecom infrastructure Description of Training Class Learn about modern telecom and mobile system and networks in the

Jun 10, 2018

Download

Documents

doannhan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: P1 Training Description TS-250 20171010 IMS Security & attacking telecom infrastructure Description of Training Class Learn about modern telecom and mobile system and networks in the

©2017P1Security.Allrightsreserved.

²

TrainingDescription

TS-250IMSSecurity&attackingtelecominfrastructure

Page 2: P1 Training Description TS-250 20171010 IMS Security & attacking telecom infrastructure Description of Training Class Learn about modern telecom and mobile system and networks in the

©2017P1Security.Allrightsreserved.

TS-250IMSSecurity&attackingtelecominfrastructure

DescriptionofTrainingClass

LearnaboutmoderntelecomandmobilesystemandnetworksinthecontextofIMSandNGNcorenetworks.ThetraineewilllearnalsoaboutthecoreevolutionsofthelegacytelecomnetworksintoIMSnetworksandthereuseofIETF-basedprotocolsinthecontextofIMSalongwithitsmainbenefits.

Duration• Uniqueversion:3days

Attendeeswillreceive• Trainingmaterial: copyof thepresenter’s slides through IntralinksWebplatformtool fora

oneYeardurationafterthetraining’sdelivery.

Pre-requisitesoftrainingclass• Basicknowledgeoftelecom&networkprinciples:

o Whatis2G,3G;o OSInetworklayers;o Basicknowledgeoftelecomtechnologies;o BasicknowledgeofLinux.

• LaptopwithKaliLinuxinstalledeitherinVMornative;• GoodknowledgeandusageofWireshark;• GoodITsecuritybackground.

Coveredinthistraining• IMSIntroduction• IMSBenefits• IMSTechnologies• RootofthetechnologyofIMS• IMSSecurityArchitecture• IMS-specificProtocolsstudy

o SIPIETFo SIP-Io SIP-To Diameter

• OverviewofotherprotocolsstillusedinIMSo GTP-Co GTP-Uo GTPv2o GTP’

• IMSNetworkElementsoverviewandsecurityroles,functionso HSSo CSCFs:I-CSCF,P-CSCF,S-CSCF

Page 3: P1 Training Description TS-250 20171010 IMS Security & attacking telecom infrastructure Description of Training Class Learn about modern telecom and mobile system and networks in the

©2017P1Security.Allrightsreserved.

o BG/BGCFo MGCFo SGW

• SpecificNetworkElementsinrecentversionofIMScorenetworkso SDP/SDRo PCRF

• SecurityofthedifferentIMSplaneso Accesso Transporto Controlo Application

• IMSCommunicationsecurity• OpenSourceIMStools• IMSnetworkelementfingerprinting• TypicalattacksonIMSinfrastructure• RoleoflegacyinIMSsecurity

o interconnectionwithSS7signalingnetworkelemento H248

• VulnerabilitiesofsomeVoiceoverIPprotocols:o SIP-Io SIP-To H323

• AnalysisofNetworkElementandvulnerabilitieso GenericIMSNetworkElementvulnerabilities

• Diametersecurity• ScenarioofattackofIMSnetwork

o Radio-based,subscriberroleo Infrastructure-based,TransmissionorRANvectoro Internal-based,attack

NextstepstobecomeanIMSnetworkauditor.