Stealing a Mobile Using Wormholes

Stealing a Mobile Using Wormholes

BruCON Security Conference via YouTube Direct link

Intro

1 of 18

1 of 18

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Stealing a Mobile Using Wormholes

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What we will learn
  3. 3 Birds Eye View
  4. 4 Baseband Overview
  5. 5 Baseband Hardware
  6. 6 Baseband Firmware - DEMO
  7. 7 Communicating With Baseband
  8. 8 Accessing the SIM-Card from the AP
  9. 9 SIM-Card-Access via AT+CSIM
  10. 10 Command-APDU via AT+CSIM
  11. 11 What is a Wormhole
  12. 12 Wormholes in your Phone
  13. 13 Shadow SIM - Overview
  14. 14 ShadowSIM - Concept
  15. 15 ShadowSIM - Baseband Communication
  16. 16 ShadowSIM - Firmware Modification
  17. 17 Defense - unintended SIM-Usage
  18. 18 Results-Recap

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.