This chapter discusses attacks over GSM, by targeting the Um interface of the telecommunication control unit (TCU) (the air interface of mobile devices that communicate over GSM). The Um interface of any cellular device is the interface between the mobile station (MS) and the base transceiver station (BTS). The chapter explains how to actually find the TCU by hunting for it on local base stations in an area. It also discusses some of the more common issues found at the file system level of TCUs. On encryption keys, it details some of the findings from previous penetration tests once shell access had been to the file system of the TOE. The chapter considers a situation where the weak password is used on the initial certificate to impersonate the vehicle by importing the regular certificate into a keychain so as to begin initiating sessions with the manufacturer's backend.
Exploitation
Hacking Connected Cars ; 107-132
2020-03-10
26 pages
Aufsatz/Kapitel (Buch)
Elektronische Ressource
Englisch
Wiley | 2020
|Extraterrestrial Resource Exploitation
British Library Conference Proceedings | 1998
|The Envisat Exploitation Policy
Online Contents | 2001
|Tactical reconnaissance image exploitation
Tema Archiv | 1979
|NTRS | 2016
|