This chapter discusses attacks over GSM, by targeting the Um interface of the telecommunication control unit (TCU) (the air interface of mobile devices that communicate over GSM). The Um interface of any cellular device is the interface between the mobile station (MS) and the base transceiver station (BTS). The chapter explains how to actually find the TCU by hunting for it on local base stations in an area. It also discusses some of the more common issues found at the file system level of TCUs. On encryption keys, it details some of the findings from previous penetration tests once shell access had been to the file system of the TOE. The chapter considers a situation where the weak password is used on the initial certificate to impersonate the vehicle by importing the regular certificate into a keychain so as to begin initiating sessions with the manufacturer's backend.


    Zugriff

    Zugriff prüfen

    Verfügbarkeit in meiner Bibliothek prüfen

    Bestellung bei Subito €


    Exportieren, teilen und zitieren



    Titel :

    Exploitation


    Beteiligte:
    Knight, Alissa (Autor:in)

    Erschienen in:

    Erscheinungsdatum :

    2020-03-10


    Format / Umfang :

    26 pages




    Medientyp :

    Aufsatz/Kapitel (Buch)


    Format :

    Elektronische Ressource


    Sprache :

    Englisch




    Post Exploitation

    Knight, Alissa | Wiley | 2020


    Extraterrestrial Resource Exploitation

    Welch, C. / Wade, D. / International Space University | British Library Conference Proceedings | 1998


    The Envisat Exploitation Policy

    Kohlhammer, G. | Online Contents | 2001


    Tactical reconnaissance image exploitation

    Wycoff, G.L. | Tema Archiv | 1979


    Jason-2 Exploitation Review

    Ly-Hollins, Lisa | NTRS | 2016