About The Training
Hyderabad 2025 | Trainings
< Training Title />
Attacking and defending 5G core networks
< Training Schedule />
Start Date: Jun 12, 2025
End Date: Jun 14, 2025
< Training Objectives />
5G core networks are increasingly essential in industries such as manufacturing, healthcare, smart cities, and defense, making their security critical. However, telecom-specific threats like protocol vulnerabilities, signaling flaws, and insecure network slicing require specialized security skills beyond traditional IT.
This training addresses these challenges through intensive hands-on learning in a controlled environment. Participants will explore real-world attack vectors, including vulnerabilities in network slicing, and rogue network functions.
Practical exercises incorporate penetration testing, reconnaissance, intrusion detection, and fuzzing techniques. Upon completion, attendees will possess the skills necessary to secure and maintain robust 5G core networks.
< Training Level />
Intermediate
< Training Outlines />
Module 1: 5G Architecture and Security Foundations
- 5G architecture and UE registration
- Security requirements for UE, NRF, AMF, UDR, UDM and other NFs
- SUCI, 5G-AKA, EAP-AKA, EAP-AKA', NAS, and AS crypto
- 3GPP 33.501 security specifications
- Securing backhaul, interconnect over SEPP, private 5G, and MEC
- Authentication, authorization, and cryptography for network functions
- Open RAN (ORAN) architecture, interfaces, and security
Module 2: Threat Modeling and Risk Assessment
- Knowing the threat actors, and their motivations and capabilities
- Identifying security challenges and risks in the 5G core interfaces
- Using MITRE FiGHT and MOTIF framework for attack tactics and techniques
- Analyzing new attack patterns for 5G sliced networks (MEC, NFV)
- Strategies for 5G core and RAN assessments with 5G EU toolboxEnsuring security compliance and assurance with 3GPP SCAS/SECAM
- Conducting audits using network equipment security assurance (NESAS)
Module 3: 5G System Vulnerability Research
- Understanding stages of core exploitation and entry points
- Examining attacks on user-to-network and network-to-network interfaces
- Assessing reconnaissance, exploitation, and persistence strategies
- Vulnerabilities key protocols like PFCP, NGAP, GTP, and HTTP/2 (SBI)
- Using rogue network functions, spoofed slices, and 3GPP 5GC_APIs
- Digging into supply chain security for cellular network components
Module 4: Pentesting 5G infrastructure
- Tools and techniques for pentesting 5G interfaces and endpoints
- Probing network functions through SBI, N1, N2 and N3 interfaces
- Conducting core network intrusion via N1/N2, NEF
- Special focus on rogue node attacks over interfaces N2 and N3
- Securing IoT service platforms and applications (northbound APIs)
Module 5: Practical attacks on 5G networks
- Intrusion to 5G core network via a multitude of attack vectors
- Conducting slice attacks to exploit cross-slice vulnerabilities
- Hijacking the 5G core by deploying rogue network functions
- Disrupting services to UEs, NFs, and connected services
- Gaining reverse shell access to 5G core over hidden back door
Module 6: Defending 5G networks
- Enforce network slice isolation policies and access control methods
- Analyzing suspicious traffic patterns in the core
- Mutual authentication and encryption for NFs
- Hardening core NFs with security policies & access controls
- Rate limiting and filtering on critical interfaces to mitigate DoS attacks
- Zero trust principles in 5G network design and operations
< WHAT TO BRING? />
- A laptop with at least i5, 16GB configuration or similar, and 100 GB free space.
- Linux OS as a host and support for running Virtual Box, Docker, and Kubernetes
< Training PREREQUISITE />
- A basic understanding of wireless communications and/or security is recommended
- Knowledge of basic concepts in telecom technologies like 2/3/4/5G systems, containers, and APIs
- Usage of Wireshark, Linux, networking, basic hacking skills, and one or more programming/scripting languages
< WHO SHOULD ATTEND? />
- This course is ideal for wireless and mobile network security architects, and telecom engineers.
- Security researchers/practitioners, and anyone interested in understanding 5G security aspects, new security improvements, and how they contribute to building secure next-generation networks.
< WHAT TO EXPECT? />
- Gain deep expertise in 5G core security and protocols to perform effective penetration testing and safeguard networks.
- Master practical skills in 5G pen-testing tools and techniques for vulnerability assessments, exploit development, and defenses.
- Understand 5G security challenges and best practices, including network slicing and NFV security, to protect 5G networks.
Note: This training program ensures a legal and compliant environment by explicitly excluding the use of cellular RF equipment and refraining from transmitting in licensed frequencies. Participants engage in a secure and simulated learning experience that adheres to regulatory guidelines and ethical standards.
< WHAT ATTENDEES WILL GET? />
- Pentesting tools are custom-made for recon, core intrusion, & PFCP testing.
- Access to a 5G virtual lab that models a multitude of threats inside a sliced core network.
- 5G Network traffic monitoring and analysis tools for core and devices.
- Case studies and real-world examples like exploits for IoT service platforms, and API traffic samples.
- Virtual machine files packaged with all proprietary test, audit, and evaluation tools.
< About the Trainer />
Dr. Altaf Shaik is a senior researcher at the Technische Universität Berlin in Germany and conducts advanced research in telecommunications esp. in 6G security architecture, openRAN, and 5G radio access and core network security. He holds more than 13 years of experience in Telecom security and combines a professional background in embedded programming, wireless communications, and offensive network security.
Dr. Shaik spent his career as a security engineer and expert at various leading telecommunication companies including Gemalto (currently Thales), Deutsche Telekom (Germany), and Huawei Technologies (Sweden). His PhD research assisted in improving the 3GPP 4G security standards and also exposed several vulnerabilities in commercial mobile networks affecting millions of base stations, networks, and handsets worldwide. His post-doctoral research exposed vulnerable API designs in the latest 5G networks and slicing vulnerabilities in the 5G security specifications leading to serious attacks.
Dr. Shaik is a frequent speaker and trainer at various prestigious international security conferences such as Blackhat, T2, SECT, Nullcon, Hardware.io HITB, 44CON, and many others. His accomplishments landed him in the hall of fame of organizations like Google, Qualcomm, Huawei, and GSMA. He is also the founder of Kaitiaki Labs and FastIoT trains international companies and governmental organizations in exploit development and also building secure mobile and IoT networks including their testing and security assessment.