5G Network and System Red Team Workshop by Tonex
This intensive one-day workshop is designed for cybersecurity professionals focusing on the offensive security aspects of 5G networks. Participants will delve deep into advanced exploitation techniques tailored specifically for attacking and assessing the security of 5G systems.
The workshop will bypass basic architectural overviews and instead concentrate on hands-on exploitation, identifying vulnerabilities, and simulating attack scenarios that Red Teams might encounter in real-world 5G environments.
This workshop is tailored to provide participants with an aggressive, attack-centric perspective on 5G security, equipping them with the skills to effectively challenge and enhance the security measures of current and future 5G deployments.
Learning Objectives: By the end of this workshop, participants will be able to:
- Identify and exploit vulnerabilities specific to 5G networks.
- Understand the common attack vectors and threat landscape associated with 5G technologies.
- Conduct advanced penetration tests and security assessments on 5G networks and systems.
- Develop strategies for bypassing security mechanisms in 5G infrastructures.
- Simulate adversarial attacks to evaluate the effectiveness of current security protocols.
- Provide actionable insights and recommendations for enhancing the security posture of 5G deployments.
Target Audience:
- Red Team members
- Penetration testers
- Network security professionals
- Cybersecurity consultants
- Telecommunications security specialists
- Advanced cybersecurity academics
Workshop Schedule:
5G Exploitation Fundamentals
- Overview of the 5G threat landscape and common vulnerabilities.
- Discussion on exploiting the unique features of 5G, such as network slicing, edge computing, C-RAN and the increased use of software-defined networking.
- 5G Radio and Next-Generation Core Networks Hacking.
Advanced Exploitation Techniques
- Deep dive into the specific attack vectors that can be leveraged against 5G networks.
- Overview of known vulnerabilities in 5G core networks and RAN (Radio Access Network).
Penetration Testing and Red Teaming in 5G
- Conducting structured Red Team operations targeting 5G systems.
- Utilizing custom tools and scripts for penetration testing in a 5G context.
Bypassing Security Mechanisms in 5G
- Techniques to bypass security features unique to 5G, including the use of virtualization and cloud-native functions.
- Discussion on post-exploitation strategies and maintaining persistence in a 5G network.
- Hunting and intruding exposed nodes
- Finding and exploiting vulnerabilities to intrude the service
- REST API attacks
- Attacking the API to get persistent
- Hijack communications
- Map devices in remote from the exposed network
- Find and exploit vulnerabilities on devices
- OpenRAN’s architectures
- Introduction to containers and Kubernetes
- Current tools and attacks
- Fingerprinting OpenRAN network
- Mapping OpenRAN assests
- Enumerating vulnerabilities
- Looking for interesting vectors
- Intruding a network
- Backdooring applications
- Avoid misconfigurations
Workshop Materials Provided:
- Comprehensive course materials detailing exploitation techniques and testing procedures.
- A certificate of completion for participants who successfully complete all workshop components.