WS - 1

Mobile Radio Access Network Exploitation

WS - 1

Mobile Radio Access Network Exploitation


Workshop Objective:

The most accessible segment of a mobile network is Radio Access Network or RAN, which handle the subscriber signals. In this talk, we will demonstrate mobile Radio Access Network concepts and talk about weaknesses, vulnerabilities, risks and practical hacking scenarios.

Course Content (ToC):

  • Mobile network architecture
  • Radio Access Network, Telecom basics and core concepts
  • Radio Access Network Vulnerabilities and attack vectors
  • Radio Access Network Information discloser attack
  • Radio Access Network fraud attacks
  • Radio Access Network availability disruption
  • Radio Access Network Security Hardening Solutions


All attendees must have a basic knowledge of computer networks, information security or penetration testing.

Participants’ Requirements:

Attendees must bring their own laptop with virtualization environment with a Linux OS like Kali. Also may need hard drive like: USB flash or external HDD.

Who should attend:

  • Security Researchers
  • Penetration Testers
  • Telecom Experts
  • Network Security Consultants

What to expect:

At the end of this training, you will be able to perform security assessment, penetration test and provide hardening solutions on mobile networks. In this workshop, we will cover the following :

  • Mobile radio network basics and core concepts
  • Mobile radio threats and vulnerabilities
  • Mobile radio practical security assessment and penetration test
  • Mobile radio network security hardening solutions

What not to expect:

All attendees should not expect to run the exercise and practical Labs on a live radio signal.

Speaker Profile:

Abdollahi , Senior Cyber Security Consultant

Ali Abdollahi a Network and Information security consultant with over 8 years of experience working in a variety of security fields. Currently the cyber security division manager, Board of review at Hakin9, Pentest &eForensic magazine and instructor at eForensic magazine. Ali is a self-confessed bug hunter, publisher of many vulnerabilities and CVEs and author of two books and some articles in field of cyber security. Ali has a unique knowledge originated from the excellent projects and a passion to present in field of telecom security.

Conference Partners

  • ISRA
  • Clients
  • Clients

Platinum Sponsors

  •  Bharat Petroleum |Oil & Gas Companies
  •  GAS (India) Limited
  •  South Indian Bank
  •  R P Group
  •  Cochin Shipyard Ltd

Gold Sponsors

  •  VenSec
  •  Federal Bank
  • IT Mission
  •  National Technical Research Organisation (NTRO)

Silver Sponsors

  •  Dell
  •  State Bank of India
  •  CyberARC
  •  Palo Alto Networks
  • Ramada Resort, Kochi
  • Indian Oil Corporation
  • Petronet LNG

Bronze Sponsors

  •  CloudSEK
  •  Geogit
  •  Trend Micro
  • Vodafone
  • Aster Medicity
  •  azr


  • Fortinet
  •  Zenletics Cyber Security Solutions Pvt. Ltd


  • Cloud Security Alliance
  • ISC2 Bangalore