├── LICENSE ├── README.md └── documentation ├── GSMA ├── IR.34-Guidelines_for_IPX_Provider_networks_v12.pdf └── IR.70-SMS_SS7_Fraud_v4.pdf └── presentations ├── 2G_3G_SS7_SIGTRAN_GRX ├── 2015-Hacking_mobile_network_via_SS7_interception_shadowing_and_more.pdf ├── 2015-Master_Thesis_Analysis_and_Mitigation_of_Recent_Attacks_on_Mobile_Communication_Backend.pdf ├── 2015_SIGNALING_SYSTEM_7_SS7_SECURITY_REPORT.pdf ├── 25c3-Locating_mobile_phones.pdf ├── 31C3-Mobile_Self_Defense.pdf ├── 31c3-SS7-Locate-Track-Manipulate.pdf ├── BH-EU-2007_SCTPscan_Finding_entry_points_to_SS7_Networks_Telecommunication_Backbones.pdf ├── BH-EU-2009-Gassira-Piccirillo-Hijacking-Mobile-Data-Connections.pdf ├── Eko2009_Attacking_SS7_applications_SCCP_hacking_and_mapping_the_phone_system.pdf ├── HES2010-Attacking-SS7.pdf ├── HES2014_Hacking_telco_equipment_The_HLR_HSS.pdf ├── HES2014_Worldwide_attacks_on_SS7_network.pdf ├── HITB2011_Attacking_3G_and_4G_Networks.pdf ├── HITB2012_6000_Ways_and_More.pdf ├── HITB2014-GRX_and_a_Spy_Agency.pdf ├── Hacklu2012-Remotely_crashing_HLR.pdf ├── IAS2001-Securing_SS7_Telecommunications_Networks.pdf ├── PHDays2014_How_to_Intercept_a_Conversation_Held_on_the_Other_Side_of_the_Planet.pdf ├── SyScan2015-Attacks_on_telecom_operators_and_mobile_subscribers_using_SS7.pdf ├── Telecom_Security_from_SS7_to_all_IP_all_open_LTE_and_3G.pdf ├── Troopers2012_Attacking_GRX.pdf └── Troopers2013-Remotely_crashing_hlr_or_why_it_took_telecom_industry_20_years_to_recognize_the_problems_with_ss7.pdf ├── LTE ├── 2015-Practical_attacks_against_privacy_and_availability_in_LTE.pdf ├── 32C3-Dissecting_VoLTE.pdf ├── CCS2015-Insecurity_of_Voice_Solution_VoLTE_in_LTE_Mobile_Networks.pdf └── Shmoocom2016_LTE_security_and_protocol_exploits.pdf ├── Radio_and_Baseband ├── 2010-Authentication_and_Secure_Communication_in_GSM_GPRS_and_UMTS.pdf ├── 26C3-Cracking_GSM_Encryption.pdf ├── 27C3-GSM_Sniffing.pdf ├── 28C3-Reverse_engineering_a_Qualcomm_baseband.pdf ├── 29C3-Let_Me_Answer_That_for_You!Adventures_in_mobile_paging.pdf ├── 30C3-Mobile_Network_Attack_Evolution.pdf ├── BH-US-2010-Attacking_the_GSM_baseband_and_base_station.pdf ├── BH-US-2010-Breaking_GSM_Phone_Privacy.pdf ├── CCCamp2015-Advanced_Interconnect_Attacks.pdf ├── CCS2015-Defeating_IMSI_Catchers.pdf ├── DeepSec2011-SMS_Fuzzing_Attack.pdf └── Master-Thesis-2010-Catching_and_Understanding_GSM_Signals.pdf └── SIM_Cards ├── 2002-Advances_in_Smartcard_Security.pdf ├── 30C3-Mobile_Network_Attack_Evolution.pdf ├── BH-US-15_Cloning_3G_4G_SIM_Cards_With_A_PC_And_An_Oscilloscope_Lessons_Learned_In_Physical_Security.pdf ├── BH-US-2013-Rooting-sim-cards.pdf ├── BH-US-2015-Advanced_IC_Reverse_Engineering_Techniques_In_Depth_Analysis_Of_A_Modern_Smart_Card.pdf ├── Defcon21-2013-The_secret_life_of_SIM cards.pdf └── PacSec2015-Root_via_SMS.pdf /LICENSE: -------------------------------------------------------------------------------- 1 | GNU LESSER GENERAL PUBLIC LICENSE 2 | Version 3, 29 June 2007 3 | 4 | Copyright (C) 2007 Free Software Foundation, Inc. 5 | Everyone is permitted to copy and distribute verbatim copies 6 | of this license document, but changing it is not allowed. 7 | 8 | 9 | This version of the GNU Lesser General Public License incorporates 10 | the terms and conditions of version 3 of the GNU General Public 11 | License, supplemented by the additional permissions listed below. 12 | 13 | 0. Additional Definitions. 14 | 15 | As used herein, "this License" refers to version 3 of the GNU Lesser 16 | General Public License, and the "GNU GPL" refers to version 3 of the GNU 17 | General Public License. 18 | 19 | "The Library" refers to a covered work governed by this License, 20 | other than an Application or a Combined Work as defined below. 21 | 22 | An "Application" is any work that makes use of an interface provided 23 | by the Library, but which is not otherwise based on the Library. 24 | Defining a subclass of a class defined by the Library is deemed a mode 25 | of using an interface provided by the Library. 26 | 27 | A "Combined Work" is a work produced by combining or linking an 28 | Application with the Library. The particular version of the Library 29 | with which the Combined Work was made is also called the "Linked 30 | Version". 31 | 32 | The "Minimal Corresponding Source" for a Combined Work means the 33 | Corresponding Source for the Combined Work, excluding any source code 34 | for portions of the Combined Work that, considered in isolation, are 35 | based on the Application, and not on the Linked Version. 36 | 37 | The "Corresponding Application Code" for a Combined Work means the 38 | object code and/or source code for the Application, including any data 39 | and utility programs needed for reproducing the Combined Work from the 40 | Application, but excluding the System Libraries of the Combined Work. 41 | 42 | 1. Exception to Section 3 of the GNU GPL. 43 | 44 | You may convey a covered work under sections 3 and 4 of this License 45 | without being bound by section 3 of the GNU GPL. 46 | 47 | 2. Conveying Modified Versions. 48 | 49 | If you modify a copy of the Library, and, in your modifications, a 50 | facility refers to a function or data to be supplied by an Application 51 | that uses the facility (other than as an argument passed when the 52 | facility is invoked), then you may convey a copy of the modified 53 | version: 54 | 55 | a) under this License, provided that you make a good faith effort to 56 | ensure that, in the event an Application does not supply the 57 | function or data, the facility still operates, and performs 58 | whatever part of its purpose remains meaningful, or 59 | 60 | b) under the GNU GPL, with none of the additional permissions of 61 | this License applicable to that copy. 62 | 63 | 3. Object Code Incorporating Material from Library Header Files. 64 | 65 | The object code form of an Application may incorporate material from 66 | a header file that is part of the Library. You may convey such object 67 | code under terms of your choice, provided that, if the incorporated 68 | material is not limited to numerical parameters, data structure 69 | layouts and accessors, or small macros, inline functions and templates 70 | (ten or fewer lines in length), you do both of the following: 71 | 72 | a) Give prominent notice with each copy of the object code that the 73 | Library is used in it and that the Library and its use are 74 | covered by this License. 75 | 76 | b) Accompany the object code with a copy of the GNU GPL and this license 77 | document. 78 | 79 | 4. Combined Works. 80 | 81 | You may convey a Combined Work under terms of your choice that, 82 | taken together, effectively do not restrict modification of the 83 | portions of the Library contained in the Combined Work and reverse 84 | engineering for debugging such modifications, if you also do each of 85 | the following: 86 | 87 | a) Give prominent notice with each copy of the Combined Work that 88 | the Library is used in it and that the Library and its use are 89 | covered by this License. 90 | 91 | b) Accompany the Combined Work with a copy of the GNU GPL and this license 92 | document. 93 | 94 | c) For a Combined Work that displays copyright notices during 95 | execution, include the copyright notice for the Library among 96 | these notices, as well as a reference directing the user to the 97 | copies of the GNU GPL and this license document. 98 | 99 | d) Do one of the following: 100 | 101 | 0) Convey the Minimal Corresponding Source under the terms of this 102 | License, and the Corresponding Application Code in a form 103 | suitable for, and under terms that permit, the user to 104 | recombine or relink the Application with a modified version of 105 | the Linked Version to produce a modified Combined Work, in the 106 | manner specified by section 6 of the GNU GPL for conveying 107 | Corresponding Source. 108 | 109 | 1) Use a suitable shared library mechanism for linking with the 110 | Library. A suitable mechanism is one that (a) uses at run time 111 | a copy of the Library already present on the user's computer 112 | system, and (b) will operate properly with a modified version 113 | of the Library that is interface-compatible with the Linked 114 | Version. 115 | 116 | e) Provide Installation Information, but only if you would otherwise 117 | be required to provide such information under section 6 of the 118 | GNU GPL, and only to the extent that such information is 119 | necessary to install and execute a modified version of the 120 | Combined Work produced by recombining or relinking the 121 | Application with a modified version of the Linked Version. (If 122 | you use option 4d0, the Installation Information must accompany 123 | the Minimal Corresponding Source and Corresponding Application 124 | Code. If you use option 4d1, you must provide the Installation 125 | Information in the manner specified by section 6 of the GNU GPL 126 | for conveying Corresponding Source.) 127 | 128 | 5. Combined Libraries. 129 | 130 | You may place library facilities that are a work based on the 131 | Library side by side in a single library together with other library 132 | facilities that are not Applications and are not covered by this 133 | License, and convey such a combined library under terms of your 134 | choice, if you do both of the following: 135 | 136 | a) Accompany the combined library with a copy of the same work based 137 | on the Library, uncombined with any other library facilities, 138 | conveyed under the terms of this License. 139 | 140 | b) Give prominent notice with the combined library that part of it 141 | is a work based on the Library, and explaining where to find the 142 | accompanying uncombined form of the same work. 143 | 144 | 6. Revised Versions of the GNU Lesser General Public License. 145 | 146 | The Free Software Foundation may publish revised and/or new versions 147 | of the GNU Lesser General Public License from time to time. Such new 148 | versions will be similar in spirit to the present version, but may 149 | differ in detail to address new problems or concerns. 150 | 151 | Each version is given a distinguishing version number. If the 152 | Library as you received it specifies that a certain numbered version 153 | of the GNU Lesser General Public License "or any later version" 154 | applies to it, you have the option of following the terms and 155 | conditions either of that published version or of any later version 156 | published by the Free Software Foundation. If the Library as you 157 | received it does not specify a version number of the GNU Lesser 158 | General Public License, you may choose any version of the GNU Lesser 159 | General Public License ever published by the Free Software Foundation. 160 | 161 | If the Library as you received it specifies that a proxy can decide 162 | whether future versions of the GNU Lesser General Public License shall 163 | apply, that proxy's public statement of acceptance of any version is 164 | permanent authorization for you to choose that version for the 165 | Library. 166 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Telecom Security repo 2 | 3 | This repo will agregate some information about telecom security. Let's see what comes out. 4 | 5 | ## Contact 6 | 7 | Alexandre De Oliveira 8 | mail@alexandredeoliveira.fr 9 | -------------------------------------------------------------------------------- /documentation/GSMA/IR.34-Guidelines_for_IPX_Provider_networks_v12.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/GSMA/IR.34-Guidelines_for_IPX_Provider_networks_v12.pdf -------------------------------------------------------------------------------- /documentation/GSMA/IR.70-SMS_SS7_Fraud_v4.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/GSMA/IR.70-SMS_SS7_Fraud_v4.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/2015-Hacking_mobile_network_via_SS7_interception_shadowing_and_more.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/2015-Hacking_mobile_network_via_SS7_interception_shadowing_and_more.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/2015-Master_Thesis_Analysis_and_Mitigation_of_Recent_Attacks_on_Mobile_Communication_Backend.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/2015-Master_Thesis_Analysis_and_Mitigation_of_Recent_Attacks_on_Mobile_Communication_Backend.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/2015_SIGNALING_SYSTEM_7_SS7_SECURITY_REPORT.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/2015_SIGNALING_SYSTEM_7_SS7_SECURITY_REPORT.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/25c3-Locating_mobile_phones.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/25c3-Locating_mobile_phones.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/31C3-Mobile_Self_Defense.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/31C3-Mobile_Self_Defense.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/31c3-SS7-Locate-Track-Manipulate.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/31c3-SS7-Locate-Track-Manipulate.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/BH-EU-2007_SCTPscan_Finding_entry_points_to_SS7_Networks_Telecommunication_Backbones.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/BH-EU-2007_SCTPscan_Finding_entry_points_to_SS7_Networks_Telecommunication_Backbones.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/BH-EU-2009-Gassira-Piccirillo-Hijacking-Mobile-Data-Connections.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/BH-EU-2009-Gassira-Piccirillo-Hijacking-Mobile-Data-Connections.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Eko2009_Attacking_SS7_applications_SCCP_hacking_and_mapping_the_phone_system.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Eko2009_Attacking_SS7_applications_SCCP_hacking_and_mapping_the_phone_system.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HES2010-Attacking-SS7.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HES2010-Attacking-SS7.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HES2014_Hacking_telco_equipment_The_HLR_HSS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HES2014_Hacking_telco_equipment_The_HLR_HSS.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HES2014_Worldwide_attacks_on_SS7_network.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HES2014_Worldwide_attacks_on_SS7_network.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HITB2011_Attacking_3G_and_4G_Networks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HITB2011_Attacking_3G_and_4G_Networks.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HITB2012_6000_Ways_and_More.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HITB2012_6000_Ways_and_More.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HITB2014-GRX_and_a_Spy_Agency.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/HITB2014-GRX_and_a_Spy_Agency.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Hacklu2012-Remotely_crashing_HLR.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Hacklu2012-Remotely_crashing_HLR.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/IAS2001-Securing_SS7_Telecommunications_Networks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/IAS2001-Securing_SS7_Telecommunications_Networks.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/PHDays2014_How_to_Intercept_a_Conversation_Held_on_the_Other_Side_of_the_Planet.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/PHDays2014_How_to_Intercept_a_Conversation_Held_on_the_Other_Side_of_the_Planet.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/SyScan2015-Attacks_on_telecom_operators_and_mobile_subscribers_using_SS7.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/SyScan2015-Attacks_on_telecom_operators_and_mobile_subscribers_using_SS7.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Telecom_Security_from_SS7_to_all_IP_all_open_LTE_and_3G.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Telecom_Security_from_SS7_to_all_IP_all_open_LTE_and_3G.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Troopers2012_Attacking_GRX.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Troopers2012_Attacking_GRX.pdf -------------------------------------------------------------------------------- /documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Troopers2013-Remotely_crashing_hlr_or_why_it_took_telecom_industry_20_years_to_recognize_the_problems_with_ss7.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/2G_3G_SS7_SIGTRAN_GRX/Troopers2013-Remotely_crashing_hlr_or_why_it_took_telecom_industry_20_years_to_recognize_the_problems_with_ss7.pdf -------------------------------------------------------------------------------- /documentation/presentations/LTE/2015-Practical_attacks_against_privacy_and_availability_in_LTE.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/LTE/2015-Practical_attacks_against_privacy_and_availability_in_LTE.pdf -------------------------------------------------------------------------------- /documentation/presentations/LTE/32C3-Dissecting_VoLTE.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/LTE/32C3-Dissecting_VoLTE.pdf -------------------------------------------------------------------------------- /documentation/presentations/LTE/CCS2015-Insecurity_of_Voice_Solution_VoLTE_in_LTE_Mobile_Networks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/LTE/CCS2015-Insecurity_of_Voice_Solution_VoLTE_in_LTE_Mobile_Networks.pdf -------------------------------------------------------------------------------- /documentation/presentations/LTE/Shmoocom2016_LTE_security_and_protocol_exploits.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/LTE/Shmoocom2016_LTE_security_and_protocol_exploits.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/2010-Authentication_and_Secure_Communication_in_GSM_GPRS_and_UMTS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/2010-Authentication_and_Secure_Communication_in_GSM_GPRS_and_UMTS.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/26C3-Cracking_GSM_Encryption.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/26C3-Cracking_GSM_Encryption.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/27C3-GSM_Sniffing.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/27C3-GSM_Sniffing.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/28C3-Reverse_engineering_a_Qualcomm_baseband.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/28C3-Reverse_engineering_a_Qualcomm_baseband.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/29C3-Let_Me_Answer_That_for_You!Adventures_in_mobile_paging.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/29C3-Let_Me_Answer_That_for_You!Adventures_in_mobile_paging.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/30C3-Mobile_Network_Attack_Evolution.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/30C3-Mobile_Network_Attack_Evolution.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/BH-US-2010-Attacking_the_GSM_baseband_and_base_station.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/BH-US-2010-Attacking_the_GSM_baseband_and_base_station.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/BH-US-2010-Breaking_GSM_Phone_Privacy.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/BH-US-2010-Breaking_GSM_Phone_Privacy.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/CCCamp2015-Advanced_Interconnect_Attacks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/CCCamp2015-Advanced_Interconnect_Attacks.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/CCS2015-Defeating_IMSI_Catchers.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/CCS2015-Defeating_IMSI_Catchers.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/DeepSec2011-SMS_Fuzzing_Attack.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/DeepSec2011-SMS_Fuzzing_Attack.pdf -------------------------------------------------------------------------------- /documentation/presentations/Radio_and_Baseband/Master-Thesis-2010-Catching_and_Understanding_GSM_Signals.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/Radio_and_Baseband/Master-Thesis-2010-Catching_and_Understanding_GSM_Signals.pdf -------------------------------------------------------------------------------- /documentation/presentations/SIM_Cards/2002-Advances_in_Smartcard_Security.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/SIM_Cards/2002-Advances_in_Smartcard_Security.pdf -------------------------------------------------------------------------------- /documentation/presentations/SIM_Cards/30C3-Mobile_Network_Attack_Evolution.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/SIM_Cards/30C3-Mobile_Network_Attack_Evolution.pdf -------------------------------------------------------------------------------- /documentation/presentations/SIM_Cards/BH-US-15_Cloning_3G_4G_SIM_Cards_With_A_PC_And_An_Oscilloscope_Lessons_Learned_In_Physical_Security.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/SIM_Cards/BH-US-15_Cloning_3G_4G_SIM_Cards_With_A_PC_And_An_Oscilloscope_Lessons_Learned_In_Physical_Security.pdf -------------------------------------------------------------------------------- /documentation/presentations/SIM_Cards/BH-US-2013-Rooting-sim-cards.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/SIM_Cards/BH-US-2013-Rooting-sim-cards.pdf -------------------------------------------------------------------------------- /documentation/presentations/SIM_Cards/BH-US-2015-Advanced_IC_Reverse_Engineering_Techniques_In_Depth_Analysis_Of_A_Modern_Smart_Card.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/SIM_Cards/BH-US-2015-Advanced_IC_Reverse_Engineering_Techniques_In_Depth_Analysis_Of_A_Modern_Smart_Card.pdf -------------------------------------------------------------------------------- /documentation/presentations/SIM_Cards/Defcon21-2013-The_secret_life_of_SIM cards.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/SIM_Cards/Defcon21-2013-The_secret_life_of_SIM cards.pdf -------------------------------------------------------------------------------- /documentation/presentations/SIM_Cards/PacSec2015-Root_via_SMS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/yodresh/Telecom-Security/285270ee87888c3127755f56ff655017616b1801/documentation/presentations/SIM_Cards/PacSec2015-Root_via_SMS.pdf --------------------------------------------------------------------------------