c0c0n 2026

c0c0n is a 19 years old platform that is aimed at providing opportunities to showcase, educate, understand and spread awareness on Information Security, data protection, and privacy...

Venue & Date

c0c0n 3-Day Professional Training

Telecom Network Exploitation: Pentesting Across 4G/5G Stacks

Course Objective:

The Telecom Security Training course aims to equip participants with a comprehensive understanding of 5G network security, covering core network threats, RAN security, penetration testing, and advanced exploitation techniques. Through a mix of theory and hands-on training, attendees will explore 3GPP standards, O-RAN architectures, vulnerability assessments, attack surface mapping, and modern security frameworks like MITRE ATT&CK and FiGHT. By engaging in real-world security scenarios, and exploit research in a controlled environment, participants will develop practical skills in reconnaissance, network enumeration, API security, authentication attacks, and protocol fuzzing—ultimately preparing them to identify, mitigate, and respond to security risks in telecom infrastructures.

Course Content

    • xG of Telecom: Evolution from 2G to 5G and beyond.
    • 4Gvs. 5G Core Differences: Key differences in architecture and security.
    • 5G Deployment Modes: NSA vs. SA deployment models.
    • 3GPP & O-RAN Specifications: Overview of industry standards and compliance.
    • xHauling in Telecom Networks: Analyzing fronthaul, midhaul, and backhaul security.
    • Threat Modelling & Risk Assessment
    • MITRE ATT&CK Framework& MITRE FiGHT Strategy: Security frameworks for telecom.
    • Twin Circle Approach for Modern Telco Security: Advanced risk assessment methodologies.
    • Security Architecture & Requirements
    • RAN (Radio Access Network) Security: Addressing threatsin RAN infrastructure.
    • Edge Security: Protecting gNB and edge computing environments.
    • Core Network Security: Strategies for securing the telecom core.
    • 3GPP & O-RAN Security Standard
    • Standardization&Compliance: Understanding security compliance requirements.
    • 3GPP & O-RAN Security Guidelines: Best practicesfor network security.
    • Key Working Groups: Focus on 3GPP SA3 (33.xxx series) and related standards.

Day 1 : Foundational& Practical Training
Theory & Fundamentals
  • 5G Network Architecture Overview
  • Deep Dive into TS 33.117
  • Telecom Network Architectures & Protocols
  • Key RAN Components & interfaces
  • Lab Setup & Hands-on Explanation
RAN Security & Penetration Testing
  • Scanning Techniques
  • Mass Scanning
  • Passive Reconnaissance
  • UE Environment Mapping
  • Tools: nmap, massscaner,zenmap
  • Network Topology Discovery
RAN Security Assessment (Grey &white box)
  • Grey Box Testing
  • Exploiting Public CVEs & Known Vulnerabilities
  • Hard Testing Against Exposed Attack Surfaces
  • Comprehensive Enumeration & Analysis
  • Attack Surface Mapping:
  • Vulnerability Discovery
  • Exploiting UE & gNB Vulnerabilities
Day 2: Advanced Security & Exploitation (White Box Testing)
Model-Based Security Testing
  • Core Network Attacks - Understanding Threat Vectors: Identifying threats in the core network.
  • Service-Based Architecture (SBA) Risks: Examining weaknessesinmod telecom architecture.
  • Core Network (CN) Elements & Vulnerability Mapping: Identifying attacking surfaces within the CN.
  • Configuration Manipulation & Password Attacks in CN: Exploiting weak configurations.
Hands-on Security Testing
  • Intercepting Packets in CN: Analyzing network traffic for vulnerabilities.
  • HTTP/2 Traffic Analysis & API Endpoint Targeting: Finding security flaws in communications.
  • Reverse Engineering HTTP/2 Transactions: Identifying weak implementation
  • Blue CN Model (Intentionally Vulnerable CN for Exploit Research): Safe environment for testing exploits.
CN Side Testing & Exploitation
  • Discovery& Initial Recon: Identifying core network vulnerabilities.
  • Scanning Techniques for WeaknessIdentification: Using specialized tools to find flaws.
  • Enumeration for Exploitable Services: Mapping out vulnerable services.
Day 3:
CN Side Testing & Exploitation (Cont....)
  • JWT-based Exploit Scenarios: Attacksleveraging JWT vulnerabilities.
  • HTTP/2 Injection (Downgrading of HTTP): Exploiting HTTP/2 weaknesses
Advanced Telecom Attacks
  • SMF (Session Management Function) Attack Scenarios: Exploiting session management vulnerabilities.
  • AMF (Access& Mobility Function) Authentication Attacks: Unauthorized and authentication bypass.
  • TCP Flooding for Session Disruption: Conducting denial-of-service attacks
  • Unauthorized Authentication Exploits: Gaining accessthrough misconfigurations.
Case Studies & Group Exercise
  • Real-world telecom breach analysis and incident response strategies
  • Simulation exercise: Conducting a full incident response and forensic analysis within a telecom environment
  • Session Hijacking &DoS Flooding: Interfering with active network session
  • Fuzzing (Second-Layer Security Testing): Advanced testing techniques for protocol security.
  • Additional Topics Covered Core Concepts & Introduction
  • Current Core Evolution: Understanding the transition from traditional co API-driven core networks.
  • AI Integration in Core: Exploring AI-based security mechanisms for private networks.
Participants Requirements

  • Laptop with basic configuration (8gb ram)
  • Internet connection
  • Ubuntu 20.01 or 21.01 orDebian 10 (mandatory installed not virtual box or vmware) or latest version

Who should Attend & Pre-requisite

  • ECE students, M.Tech Students and Phd students, Faculties, IT Employees working in network and telecom domain
  • Basic Knowledge of IT Security
  • Beginner Level Python skills
  • Basics of Linux

What to expect:

Participants who complete this workshop will gain hands-on expertise in telecom security assessment, penetration testing, and threat mitigation for 5G networks, core security, and RAN infrastructure.

What not to expect:

Becoming an expert in telecom pentesting

Trainer(s)

Samarth Bhaskar Bhat

Technical Director

Reinfosec