Top Banner
©2018 P1 Security. All rights reserved. ² Training Description 2018 TS-270 LTE Security and Insecurity
3

P1 Training Description TS-270 20181121 v7 JBT · • Training material: copy of the presenter’s slides through Intralinks Web platform tool for a one Year duration after the training’s

Mar 11, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: P1 Training Description TS-270 20181121 v7 JBT · • Training material: copy of the presenter’s slides through Intralinks Web platform tool for a one Year duration after the training’s

©2018 P1 Security. All rights reserved.

²

Training Description

2018

TS-270 LTE Security and Insecurity

Page 2: P1 Training Description TS-270 20181121 v7 JBT · • Training material: copy of the presenter’s slides through Intralinks Web platform tool for a one Year duration after the training’s

©2018 P1 Security. All rights reserved.

TS-270 LTE Security and Insecurity

Description of training

Learn about modern telecom, mainline and mobile, systems and networks for 4G LTE mobile network service. Understand the security mechanism of LTE and the Evolved Packet Core network security and vulnerabilities. Learn in details the various problems that may happen in LTE networks and define a plan of study to become an LTE Network auditor. Duration Unique version: 2 days. Attendees will receive

• Training material: copy of the presenter’s slides through Intralinks Web platform tool for a one Year duration after the training’s delivery.

Prerequisites for training

• Basic knowledge of telecom & network principles: o What is 2G, 3G, 4G; o OSI network layers; o Basic knowledge of telecom technologies.

• Good knowledge and usage of Wireshark; • Internet Access (preferred but optional).

Covered in this training

• LTE Introduction; • LTE Security architecture; • LTE Network elements overview and security roles & functions; • LTE Communication security, cryptography and key management; • Study of LTE protocols:

o S1AP; o X2AP; o Diameter; o GTP-C; o GTP-U; o GTP v2; o GTP’; o NAS.

• Typical attacks on LTE infrastructure; • Recap of SS7 attack scenarios and comparison to 4G; • Role of legacy in LTE security;

Page 3: P1 Training Description TS-270 20181121 v7 JBT · • Training material: copy of the presenter’s slides through Intralinks Web platform tool for a one Year duration after the training’s

©2018 P1 Security. All rights reserved.

• Network elements and their functions: HSS, DRA/DEA, MME, PCRF, eNodeB, PGW, SGW; • DRA remote and RCE compromise via Diameter; • Vulnerabilities in VoLTE; • Analysis of Generic LTE Network element and vulnerabilities: • Diameter security and comparison to SIGTRAN and Radius protocols; • Diameter fuzzing and scanning; • Diameter in a roaming context; • NAS security, protocol review and known attacks; • SCTP protocol basics, scanning and attack scenarios; • SGW – PGW infrastructure and design and GTPv2 scanning and fuzzing; • S1AP interface protocol study and known vulnerabilities; • Attack scenarios over the S1AP interface; • Attacking O&M (OAM & Management) of network elements; • Cracking RADIUS protocol; • GRX / IPX compromise case studies, architecture and design and known vulnerabilities; • Scenarios of attack of LTE network:

o Radio-based, subscriber role; o Infrastructure-based, transmission or RAN vector; o Internal-based attack; o Interconnect based attack scenarios.