The 5G network has been termed the most complicated wireless protocol ever made, which could make it difficult for hackers and researchers to analyse it.
However, researchers at the ASSET Research Group have created a 5G sniffer and downlink injector, which enables real-time sniffing using two Universal Software Radio Peripherals (USRPs) and machine power.
The data can be filtered using Wireshark, and the injection framework has various attack vectors including turning an SDR into a malicious 5G base station, downgrading connections to 4G, fingerprinting and more.
It can also be used to exploit the widely publicised 5Ghull vulnerability, which can cause devices to require the removal of their SIM cards.
The research group has shared a sample capture file, as well as the code on GitHub for those who want to analyse the 5G protocol.