Attacking 5G infrastructure and Defense by ToolsWatch

Numbers of days 3
address 28 avenue George V 75008, Paris
Course in English

5G Penetration testing is a critical part of maintaining and fortifying your IP, network and physical security. This Training course prepares participants to conduct successful 5G penetration testing and ethical hacking. Participants will learn about tools and techniques to analyze 5G vulnerabilities, and how to perform detailed 5G reconnaissance. ENISA’s threat landscape for 5G Networks and NIST 5G cybersecurity/RMF prepares you with a secure evolution to 5G. The goal of this practical course is to give the participant a strong and intuitive understanding of what cybersecurity in the 5G systems is and how the security functions are implemented in the 5G, 5G NR, Cloud RAN, MEC, 5GC, Service Based Architecture (SBA), HTTP2/JSON, REST API, and network slices.

65% of the course is practical (12 labs).

Syllabus

Day 1 Introduction

  • 5G different architectures (SA/NSA) and impact on security
  • Components of 5G deployments and danger areas
  • 5G Domain Security Overview
  • 5G RAN and virtualized RAN
  • 5G UE, SIM & Handsets and SoCs
  • 5G NR Radio access and security principles applied to 5G subscribers
  • Anonymization of subscriber’s fixed identity
  • Authentication and Key Agreement (AKA)
  • Encryption and integrity protection of control-plane and user-plane traffic
  • Activation of the security and related signaling procedures
  • Impact of new 5G protocols in term of security:
    • X2 extensions for NSA deployment F1AP
    • E1AP
    • PFCP
  • 5G Core, Service Based Architecture (SBA), Roaming and Interconnect Security
  • Infrastructure level deployment, security & risk of NFV (Network Functions Virtualization)
  • Benefit and risk of 5G slicing in term of Security
  • Understand the risks and attacks on isolation in a 5G multi-tenant environment (Slicing, NFV, SDN)

Day 2

  • 5G threat model and risk area
  • 5G Intrusion Detection
  • Issues with Access Network Flash Network Traffic
  • Radio interface key management
  • User plane integrity
  • DOS Attacks Against Network Infrastructure
  • Overload of the signaling plane security issues
  • CORE and MEC Threat
  • Testbeds and network stacks security preparation
  • 5G pentest process and procedure

Day 3

  • Overview of 5G Testing Tools
  • Penetration from Air interface and RAN
  • Hands-on exercises for CORE and MEC network testing
  • Voice over LTE attack and testing 5G attack
  • Case study: 5G Forensics Analysis
  • Auditing 5G Security Controls

Top 3 take aways:

  • This training will help to conduct successful 5G penetration testing and ethical hacking. Participants will learn about tools and techniques to analyze 5G vulnerabilities, reconnaissance
  • Understanding and implementation of ENISA’s threat landscape for 5G Networks and NIST 5G cybersecurity/RMF a secure evolution to 5G.
  • Understand the 5G architecture and the challenges it poses to testing. Select and utilize the technology, tools, and applications available for 5G development and testing. Implement 5G testing practices to prevent failures at any of the different elements of a 5G network.

Requirements:

  • This course assumes an engineering or IT background
  • An understanding of LTE security procedures would be an advantage as would a basic understanding of mobile network architecture
  • Good knowledge of 4G architectures (LTE & EPC)
  • Basic knowledge of telecom & network principles: What is 2G, 3G; OSI network layers
  • Good knowledge and usage of Wireshark

What student should bring & provide with

  • Laptop with 4 Gb ram and 200 GB HDD with Ubuntu OS
  • Virtual machine and admin right
  • Virtual machine with all Testing Tools

Who should take this course

This course is for students, working professionals, or anyone interested to learn more about the exciting topic of 5G mobile network security challenges and solutions.This course assumes an engineering or IT background. An understanding of LTE security procedures would be an advantage as would a basic understanding of mobile network architecture.