conference logo

Playlist "29C3: Not my department"

Let Me Answer That for You

Nico Golde

In the last years, mobile security and specifically GSM has been attacked in many different ways. It was demonstrated how to sniff and crack traffic, how to impersonate a subscriber by placing a fake call and the general security characteristics of this mobile protocol stack have been evaluated.

In this presentation, we will check out a part of the protocol procedures that hasn't been looked at yet, specifically Mobile Terminated services.