Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
5G TECHNOLOGIES
a) Access Network
All Course Calendar
Archives
b) Core Network
BASIC TRAININGS FOR PROFESSIONALS
BUSINESS & PROJECT MANAGEMENT
Carrier Ethernet Program
CERTIFICATION PROGRAMMES
CYBERSECURITY TRAININGS
DATA ANALYTICS
Demo
FIBER OPTICS COMMUNICATIONS
Forms
INTERNET OF THINGS (IoT)
IP, ETHERNET, MPLS / TRAFFIC ENGINEERING
IPTV, OTT MEDIA TECHNOLOGIES
LTE / 4G TECHNOLOGIES
Member
NETWORK OPERATIONS & SUPPORT
NETWORK QoS & OPTIMIZATION
Old content from Joomla
SDN NFV / DATA CENTRE TECHNOLOGIES
SIP / IMS / ROAMING
Telefocal Certification Programmes
Testimonials
Training Course Calendar
Training Courses
TRANSMISSION TECHNOLOGIES

Mobile Network Vulnerabilities & Pentesting

Share this page on:

Course Objectives:

This workshop aims at introducing penetration testing methods and principles for Sigtran/MAP-based signaling systems in mobile networks.

During the course participant will gain insight into the signaling protocol related network vulnerabilities by actively using the Kali-Linux pentesting tools, modified and extended for mobile networks environment.

Practical exercises and lecturer guided signaling trace analysis will provide a strong foundation for further studies in the field.

Pre-requisite for Participants:

Participants should have a basic understanding of SS7/Sigtran-based signaling protocols and procedures used in mobile networks core network environment.

A working-level knowledge in Linux environment is recommended for the practical exercises.

Some basic knowledge in C++ and Python is an added advantage.

Course Duration:

3-day instructor-led training.

Course Outlines:

Day 1

  • SS7 and Sigtran Vulnerabilities
  • Purpose and goals of a SS7 pentesting exercises
  • Information gathering, network mapping and enumeration
  • The SS7 and Sigtran protocol stack for mobile networks
  • Sigtran (SCTP and M3UA) description
  • Sigtran protocol analysis with Wireshark
  • Introducing Kali-Linux and the lab setup
  • Exploiting Sigtran

Day 2

  • SCCP, TCAP, MAP and CAP description
  • Important Core Network signaling procedures and parameters
  • Core Network protocol analysis with Wireshark
  • Exploiting Protocols

Day 3

  • Informative: The SigFW Open Source SS7 / Diameter Firewall project
  • Exploiting core network node software: Memory overflow exploits
  • Testing software: Fuzzing (Fuzz-testing)
  • The Smartphone Pentest Framework
  • Exploring remote access and malicious apps (Android based)
  • Mobile post exploits

All practical exercises will be supported by signaling message flow charts and references to the 3GPP technical specifications and a detailed Wireshark trace discussion.

Related Course Topics

5G Security Overview Duration and Training Format 2 days, Instructor-led Training   Introduction Full deployment of 5G will happen very soon, probably in 2020. Expectations are high, as are security concerns. Significantly more devices and increased use of ...
An Overview of Cyber Security Course Objectives: After attending this "An Overview of Cyber Security" training, participants will be able to: Describe the principal types of security threat which individual computer users, governments, SMEs and large corporations ar...
Cyber Fundamentals Training with Hands-On Labs Course Overview: The main objectives of this course is to address some fundamentals of Cyber Security topics, and provide insights into the modern security environment. It seeks to explain the cyber threat landscape and attackers' mentality, in...
Internet of Things (IoT) Security Workshop Duration and Training Format: 3-day instructor-led training Course Overview The central role that IoT plays in the technology world and the growth of IoT devices is an undeniable fact. IoT is bringing the network to our daily lives - our cars, ...
LTE Security Course Overview: This "LTE Security" course is designed to enable participants understand the security issues surrounding LTE networks. It will list and explain in-depth the various encryption algorithms used in LTE networks so that the participants...

COURSE ENQUIRY

BASIC TRAININGS FOR PROFESSIONALS

    IP, ETHERNET, MPLS / TRAFFIC ENGINEERING

      NETWORK SECURITY

        SDN NFV / DATA CENTRE TECHNOLOGIES

          DATA ANALYTICS

            IPTV, OTT MEDIA TECHNOLOGIES

              Business & Project Management

                CERTIFICATION PROGRAMMES

                  5G Technologies

                    LTE / 4G Technologies

                      INTERNET OF THINGS (IoT)

                        SIP / IMS / ROAMING

                          TRANSMISSION TECHNOLOGIES

                            FIBER OPTICS COMMUNICATIONS

                              Network QoS & Optimization

                                NETWORK OPERATIONS & SUPPORT

                                  top
                                  Telefocal Asia Pte Ltd © www.telefocal.com. All rights reserved.
                                  Website Terms & ConditionsPrivacy Statement

                                  Setup Menus in Admin Panel