ATTACK CATEGORIES
Explore our comprehensive research and analysis across the fundamental domains of telecommunications security.
User Land Attacks
Exploitation techniques targeting mobile devices, applications, and end-user hardware within telecommunications networks. Includes baseband exploitation, SIM card attacks, and malicious carrier applications.
- >Baseband Exploitation
- >Malicious SIM Toolkits (STK)
- >Carrier App Over-the-Air (OTA) Updates
- >+ 1 MORE...
Signaling Attacks
Vulnerabilities and exploits within telecom signaling protocols such as SS7, Diameter, and GTP. Covering location tracking, call interception, SMS routing, and denial of service at the protocol level.
- >SS7 Location Tracking
- >Diameter Bypasses
- >GTP-C Tunnel Hijacking
- >+ 1 MORE...
Transmissions Attacks
Physical and logical layer transmission security. Research into radio frequency interception, jamming, rogue base stations (IMSI catchers), and microwave link eavesdropping.
- >Rogue Base Stations (IMSI Catchers)
- >RF Interception & Decoding
- >Spectrum Jamming
- >+ 1 MORE...
Core Attacks
Security research targeting the heart of the cellular network. Includes exploitation of EPC (Evolved Packet Core) and 5GC (5G Core) network functions, billing systems bypass, and core network lateral movement.
- >EPC/5GC Function Exploitation
- >Billing System Bypasses
- >HSS/UDM Data Extraction
- >+ 1 MORE...
Cellular Networks Attacks
Systemic attacks against cellular network architectures (3G, 4G LTE, 5G architectures). Focusing on architectural flaws, inter-generation downgrade attacks, and cross-protocol vulnerabilities.
- >3G to 2G Downgrade Attacks
- >4G LTE Architectural Flaws
- >5G Network Slicing Bypasses
- >+ 1 MORE...