Join me in unraveling the intriguing realm of 5G security testing with the latest video on 5Ghoul! 👻 This Proof of Concept (PoC) delves into potential 5G New Radio (NR) attacks against smartphones, CPE routers, USB modems, and more. 5Ghoul represents a family of implementation-level 5G Denial of Service (DoS) vulnerabilities affecting Qualcomm and MediaTek mobile platforms.
I show the step-by-step process of setting up the WarDragon, a robust box equipped with DragonOS. Discover the ins and outs of installing 5Ghoul within a Docker environment, showcasing its capabilities with a quick demonstration of the attack process. While the WarDragon doesn't actually come with a B210, it can easily handle it.
For more technical details and insights, check out the disclosure page at asset-group.github.io/disclos....
It's crucial to note that this content is intended for solo security testing research purposes. It is extremely import to conduct experiments in a controlled and lawful environment. This video aims to share details of my experience so far as well as shed light on potential vulnerabilities.
WarDragon available here (when in stock):
cemaxecuter.com/?post_type=pr...
Don't miss out on staying connected:
Catch updates on Twitter: / cemaxecuter
Supporting the channel:
If you appreciate the value this content brings, I invite you to consider extending your support through Patreon: / cemaxecuter
Негізгі бет Ғылым және технология WarDragon 5Ghoul: Setup for 5G NR Vulnerabilities and Security Testing (B210, GL-M2)
Пікірлер: 27