Unlimited WordPress themes, plugins & video downloads!

Research

Research – The Preferred Roaming List Zero Intercept Attack

Whitepaper discussing how to not get man-in-the-middled at Defcon / Blackhat. Attackers in position to carry out Monkey-in-the-Middle against CDMA2000 links between customer stations and their carrier BTS equipment can leverage silent push PRL updates to apply a routing list preferring paths through malicious “tower(s)” carrying the subscriber voice and data traffic under threat. The use of a specific PRL version Zero (0), aka Preferred Roaming List Zero Intercept Attack, implements the rogue tower associations with least potential interference to legit carrier bands and devices present in broadcast domain of attack.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/127750/preferred-roaming.txt

Source: https://packetstormsecurity.com/files/127750/The-Preferred-Roaming-List-Zero-Intercept-Attack.html

Related posts
Research

Research - IDS For Grid And Cloud Computing

Research

Research - IETF I-D: Implications Of Oversized IPv6 Header Chains

Research

Research - IMMM 2011 Call For Papers

Research

Research - Indexed Blind SQL Injection

Sign up for our Newsletter and
stay informed