Summary

  • The 5G network has been termed the most complicated wireless protocol ever made, which could make it difficult for hackers and researchers to analyse it.
  • However, researchers at the ASSET Research Group have created a 5G sniffer and downlink injector, which enables real-time sniffing using two Universal Software Radio Peripherals (USRPs) and machine power.
  • The data can be filtered using Wireshark, and the injection framework has various attack vectors including turning an SDR into a malicious 5G base station, downgrading connections to 4G, fingerprinting and more.
  • It can also be used to exploit the widely publicised 5Ghull vulnerability, which can cause devices to require the removal of their SIM cards.
  • The research group has shared a sample capture file, as well as the code on GitHub for those who want to analyse the 5G protocol.

By Fenix Guthrie

Original Article