Nytro Posted February 17, 2015 Report Share Posted February 17, 2015 VULNERABILITIES OF MOBILE INTERNET (GPRS)Dmitry KurbatovSergey PuzankovPavel Novikov2014Contents1. Introduction2. Summary3. M obile network scheme4. GTP protocol5. Searching for mobile operator’s facilities on the Internet6. Threats6.1. IMSI brute force6.2. T he disclosure of subscriber’s data via IMSI6.3. Dis connection of authorized subscribers from the Internet6.4. B locking the connection to the Internet6.5. Internet at the expense of others6.6. D ata interception6.7. DN S tunneling6.8. Substitution of DNS for GGSN7. C onclusion and recommendationsDownload: http://www.ptsecurity.com/download/Vulnerabilities_of_Mobile_Internet.pdf Quote Link to comment Share on other sites More sharing options...
nosph3rat Posted February 21, 2015 Report Share Posted February 21, 2015 VULNERABILITIES OF MOBILE INTERNET (GPRS)Dmitry KurbatovSergey PuzankovPavel Novikov2014Contents1. Introduction2. Summary3. M obile network scheme4. GTP protocol5. Searching for mobile operator’s facilities on the Internet6. Threats6.1. IMSI brute force6.2. T he disclosure of subscriber’s data via IMSI6.3. Dis connection of authorized subscribers from the Internet6.4. B locking the connection to the Internet6.5. Internet at the expense of others6.6. D ata interception6.7. DN S tunneling6.8. Substitution of DNS for GGSN7. C onclusion and recommendationsDownload: http://www.ptsecurity.com/download/Vulnerabilities_of_Mobile_Internet.pdfThnx man Quote Link to comment Share on other sites More sharing options...