This chapter covers cellular communication technologies and the threats to the confidentiality, integrity, and availability of those communications. So you’re conversant in cellular communication, we explore the basic concepts within the scope of the protocols and standards used in cellular communication and give you an architectural overview of modern cellular infrastructure. Finally, we discuss the attacks against the various components of this architecture.
Unlike other chapters in this book where we hope you will apply the discussed techniques in your own penetration tests, in this chapter, you ...
Get Hacking Exposed Wireless, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.