{"id":14983,"date":"2024-02-22T02:58:34","date_gmt":"2024-02-22T02:58:34","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/"},"modified":"2024-02-29T03:51:54","modified_gmt":"2024-02-29T03:51:54","slug":"attacking-and-defending-5g-cores-auh2024","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/","title":{"rendered":"Attacking and Defending 5G Cores"},"content":{"rendered":"<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span>: <\/strong><strong>Onsite at Abu Dhabi<\/strong><\/h4>\n<h4><strong>DATE: 25-27 Nov 2024<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 GST\/GMT+4<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>25 Nov<\/td>\n<td>Monday<\/td>\n<td>09:00 to 17:00 GST\/GMT+4<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>26 Nov<\/td>\n<td>Tuesday<\/td>\n<td>09:00 to 17:00 GST\/GMT+4<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>27 Nov<\/td>\n<td>Wednesday<\/td>\n<td>09:00 to 17:00 GST\/GMT+4<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>5G core networks, with their promise of tailored connectivity and enhanced capabilities, have become increasingly popular across industries from diverse sectors ranging from manufacturing, healthcare and smart cities to defense networks. With the integration of mission- critical systems and sensitive data transmission, organizations face an urgent need to fortify their 5G core networks against evolving cyber threats.<\/h5>\n<h5>One of the critical challenges here lies in the shortage of expertise and the requisite skillset to effectively secure 5G networks. This gap manifests in various stages, from the initial deployment phase to ongoing testing and adaptation. The need for specialized knowledge in mobile network attacks, secure deployment practices, and testing methodologies becomes apparent and our training is your key to mastering the art of safeguarding private 5G networks.<\/h5>\n<h5>This training program is not just about theory; it&#8217;s a journey through practical application and real- world scenarios. Get ready to immerse yourself in hands-on exercises, simulations, and practical demonstrations that mirror the challenges faced by 5G security professionals. The training will cover a wide range of topics, including 5G network architecture, threat modeling, risk assessment, defense-in-depth strategies and 5G security features and their role in protecting the modern day virtualized core networks against potential attacks.<\/h5>\n<p>Through practical exercises and case studies, hackathon experiences, participants will learn about new ways to attack core networks by exploiting device and network authentication issues, vulnerabilities in network slicing, by deploying rogue network functions, container breakouts, and invesitgate the potential for data interception and manipulation. This hands-on experience is achieved entirely in an ethically controlled test environment with security testing tools and techniques, including reconnaissance, penetration testing and vulnerability scanning. The training will also cover advanced topics such as fuzzing the service based and Telecom APIs.<\/p>\n<p>By the end of this training, participants will be equipped with the technical expertise to design, implement, and maintain secure 5G core networks. They will have the confidence to tackle the security challenges posed by 5G technology and ensure the availability, integrity and confidentiality of their networks.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5><strong>What will be provided with<\/strong><\/h5>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>\u2022 Pentesting tools custom-made for recon, core intrusion, &amp; PFCP testing<br \/>\n\u2022 Access to 5G virtual lab that models a multitude of threats inside a sliced core network \u2022 5G Network traffic monitoring and analysis tools for core and devices<br \/>\n\u2022 Case studies and real-world example like exploits for IoT service platforms, API traffic \u2022 Virtual machine files packaged with all proprietary test, audit and evaluation tools<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>Key Learning Objectives<\/p>\n<ul>\n<li>Technical expertise in 5G core security and protocols: Gain an in-depth understanding of 5G core network security and protocols, which will enable them to perform effective penetration testing on 5G networks. They will be able to identify and exploit vulnerabilities in 5G core networks, and devise strategies to secure these networks against potential attacks.<\/li>\n<li>Practical skills in using 5G pentesting tools and techniques: Learn how to use the latest 5G pentesting tools and techniques to perform vulnerability assessments, penetration testing, and exploit development on 5G networks. They will also learn how to evaluate and select the most appropriate tools and techniques for specific testing scenarios.<\/li>\n<li>Awareness of 5G security challenges and best practices: Exposure to the latest 5G security challenges and best practices, including network slicing security, network function virtualization security, and secure communication between 5G core network entities. They will gain an understanding of how these challenges can be mitigated using best practices, and be able to apply these practices in their own organizations to ensure the security of their 5G networks.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Topics Covered<\/strong><\/h5>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong>Module 1: 5G architecture and security<\/strong><\/p>\n<p>\u2022 5G architecture and network IDs<br \/>\n\u2022 5G Security Requirements by 3GPP for UE, AMF, SEAF, UDM \u2022 SUCI, 5G-AKA, EAP-AKA, NAS and AS crypto<br \/>\n\u2022 33.501 standards and NIST guidelines for 5G security<br \/>\n\u2022 Security over backhaul, interconnect SEPP, private 5g, MEC<br \/>\n\u2022 Authentication, authorization and crypto for network functions<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 2\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>&nbsp;<\/p>\n<p><strong>Module 2: Threat Modeling and Risk Assessment<\/strong><\/p>\n<p>\u2022 Security challenges, risks for 5G core<br \/>\n\u2022 MITRE FiGHT framework for attack tactics, and techniques<br \/>\n\u2022 New attack patterns for 5G sliced networks (MEC, NFV)<br \/>\n\u2022 5G core and RAN assessment strategies and 5G EU toolbox<br \/>\n\u2022 Security compliance and assurance from 3GPP SCAS\/SECAM \u2022 Auditing &#8211; network equipment security assurance (NESAS)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Module 3: 5G System Vulnerability Analysis:<\/strong><\/p>\n<p>\u2022 5G System and network attacks<br \/>\n\u2022 Stages of core exploitation, &amp; entry points<br \/>\n\u2022 Attacks on User-to-network interfaces and network-to-network interfaces \u2022 Reconnaissance, exploitation, persistence<br \/>\n\u2022 Rogue network functions, rogue APIs, &amp; spoofed slices<br \/>\n\u2022 Protocol tunneling, MEC<br \/>\n\u2022 Exploiting public facing applications<br \/>\n\u2022 Supply chain security for network function containers<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Module 4: 5G Security Pentesting:<\/strong><\/p>\n<p>\u2022 Tools and techniques for pentesting 5G interfaces, endpoints \u2022 Probing network functions over HTTP\/2<br \/>\n\u2022 Fuzzing 3GPP core interfaces NGAP (N1\/N2)<br \/>\n\u2022 Fuzzing core service based APIs<br \/>\n\u2022 Core network intrusion (via N1\/N2, SEPP), and container breakouts \u2022 IoT service platform application security (Northbound APIs)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Module 5: Hands-On Exercises:<\/strong><\/p>\n<p>\u2022 Simulate end-to-end 5G multi-slice network<br \/>\n\u2022 Network recon, intrusion to an on-site 5G core network testbed \u2022 5G core vulnerability scanning<br \/>\n\u2022 Inter-slice compromise attacks via NRF\/AMF\/SEAF\/UDM<br \/>\n\u2022 Insider data theft on UPF\/UDR<br \/>\n\u2022 5G AMF auditing using SECAM 33.512<br \/>\n\u2022 PFCP exposure, DoS, &amp; hijacking<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Module 6: Defense-in-Depth Strategies:<\/strong><\/p>\n<p>\u2022 Network function (container) access and monitoring rules \u2022 Network border firewall rules for MNO interconnect<br \/>\n\u2022 5G network analytics and log monitoring (NWAF)<br \/>\n\u2022 Secure communication proxy for 5G core<br \/>\n\u2022 NEF\/SCEF security via Telecom API Top 10 \u2022 Supply chain security testing and monitoring<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Module 7: Case studies:<\/strong><\/p>\n<p>\u2022 5G core network protocol security assessment<br \/>\n\u2022 Intrusion to 5G core via commercial exposure function (NEF\/SCEF) \u2022 5G private core configurations and security settings<\/p>\n<p>Overall, this advanced 5G practical security training will provide attendees with a comprehensive understanding of the security risks and vulnerabilities associated with 5G networks, as well as the knowledge and tools to implement effective security measures to protect their networks and data.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<h5>This training program is not just about theory; it\u2019s a journey through practical application and real- world scenarios. Get ready to immerse yourself in hands-on exercises, simulations, and practical demonstrations that mirror the challenges faced by 5G security professionals. The training will cover a wide range of topics, including 5G network architecture, threat modeling, risk assessment, defense-in-depth strategies and 5G security features and their role in protecting the modern day virtualized core networks against potential attacks.<\/h5>\n","protected":false},"featured_media":14982,"template":"","meta":{"_acf_changed":false},"product_cat":[61,90,92,57],"product_tag":[],"class_list":{"0":"post-14983","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-3-day-training","7":"product_cat-auh2024","8":"product_cat-auh2024-training","9":"product_cat-in-person","11":"first","12":"outofstock","13":"featured","14":"shipping-taxable","15":"purchasable","16":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Attacking and Defending 5G Cores - HITBSecConf2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attacking and Defending 5G Cores - HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"This training program is not just about theory; it\u2019s a journey through practical application and real- world scenarios. Get ready to immerse yourself in hands-on exercises, simulations, and practical demonstrations that mirror the challenges faced by 5G security professionals. The training will cover a wide range of topics, including 5G network architecture, threat modeling, risk assessment, defense-in-depth strategies and 5G security features and their role in protecting the modern day virtualized core networks against potential attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-29T03:51:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/altaf-shaik-training-action.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/\",\"name\":\"Attacking and Defending 5G Cores - HITBSecConf2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/altaf-shaik-training-action.jpg\",\"datePublished\":\"2024-02-22T02:58:34+00:00\",\"dateModified\":\"2024-02-29T03:51:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/altaf-shaik-training-action.jpg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/altaf-shaik-training-action.jpg\",\"width\":1280,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Attacking and Defending 5G Cores\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\",\"name\":\"HITBSecConf2024 - Abu Dhabi\",\"description\":\"Nov 25 - 28, Abu Dhabi, UAE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attacking and Defending 5G Cores - HITBSecConf2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/","og_locale":"en_US","og_type":"article","og_title":"Attacking and Defending 5G Cores - HITBSecConf2024 - Abu Dhabi","og_description":"This training program is not just about theory; it\u2019s a journey through practical application and real- world scenarios. Get ready to immerse yourself in hands-on exercises, simulations, and practical demonstrations that mirror the challenges faced by 5G security professionals. The training will cover a wide range of topics, including 5G network architecture, threat modeling, risk assessment, defense-in-depth strategies and 5G security features and their role in protecting the modern day virtualized core networks against potential attacks.","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/","og_site_name":"HITBSecConf2024 - Abu Dhabi","article_modified_time":"2024-02-29T03:51:54+00:00","og_image":[{"width":1280,"height":960,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/altaf-shaik-training-action.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/","name":"Attacking and Defending 5G Cores - HITBSecConf2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/altaf-shaik-training-action.jpg","datePublished":"2024-02-22T02:58:34+00:00","dateModified":"2024-02-29T03:51:54+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/altaf-shaik-training-action.jpg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/altaf-shaik-training-action.jpg","width":1280,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/attacking-and-defending-5g-cores-auh2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/shop\/"},{"@type":"ListItem","position":3,"name":"Attacking and Defending 5G Cores"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/","name":"HITBSecConf2024 - Abu Dhabi","description":"Nov 25 - 28, Abu Dhabi, UAE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product\/14983"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media\/14982"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media?parent=14983"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product_cat?post=14983"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product_tag?post=14983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}