oran-testing / soft-t-ue

Open source O-RAN 5G security testing tool
https://rantesterue.org
GNU Affero General Public License v3.0
2 stars 3 forks source link

Develop Attacks for the MAC Layer #56

Open cueltschey opened 2 months ago

cueltschey commented 2 months ago

We need attacks for the medium access control layer researched and developed. As a reference here is a list of some possible attacks in this layer that we have researched thus far:

  1. Jamming Attack

    • Description: An adversary transmits radio signals to interfere with the wireless communication channels, causing collisions or preventing communication.
    • Impact: Disrupts the availability of the wireless network.
  2. Eavesdropping

    • Description: An attacker listens to the wireless communication without the need for physical access to the network, often used to gather sensitive information like MAC addresses and SSIDs.
    • Impact: Breaches confidentiality of wireless communications.
  3. Deauthentication Attack

    • Description: An attacker sends forged deauthentication frames to disconnect clients from an access point.
    • Impact: Causes denial of service (DoS) by disconnecting users from the network.
  4. Authentication Flooding

    • Description: The attacker floods the access point with a large number of authentication requests, overwhelming the AP and preventing legitimate users from connecting.
    • Impact: Denial of service for legitimate users.
  5. Advanced Procedural Fuzzing Attack

    • Description: Fuzz the SDU buffer of the MAC using files and cli arguments
    • Impact: May lead to crash or malfunction of the gNB

These attacks may or may not be usable for the MAC

kirchnerandre commented 2 months ago

Okay!

Get Outlook for iOShttps://aka.ms/o0ukef


From: Charles Ueltschey @.> Sent: Wednesday, September 11, 2024 7:27:08 AM To: oran-testing/soft-t-ue @.> Cc: kirchnerandre @.>; Assign @.> Subject: [oran-testing/soft-t-ue] Develop Attacks for the MAC Layer (Issue #56)

We need attacks for the medium access control layer researched and developed. As a reference here is a list of some possible attacks in this layer that we have researched thus far:

  1. Jamming Attack

    • Description: An adversary transmits radio signals to interfere with the wireless communication channels, causing collisions or preventing communication.
    • Impact: Disrupts the availability of the wireless network.
  2. Eavesdropping

    • Description: An attacker listens to the wireless communication without the need for physical access to the network, often used to gather sensitive information like MAC addresses and SSIDs.
    • Impact: Breaches confidentiality of wireless communications.
  3. Deauthentication Attack

    • Description: An attacker sends forged deauthentication frames to disconnect clients from an access point.
    • Impact: Causes denial of service (DoS) by disconnecting users from the network.
  4. Authentication Flooding

    • Description: The attacker floods the access point with a large number of authentication requests, overwhelming the AP and preventing legitimate users from connecting.
    • Impact: Denial of service for legitimate users.
  5. Advanced Procedural Fuzzing Attack

    • Description: Fuzz the SDU buffer of the MAC using files and cli arguments
    • Impact: May lead to crash or malfunction of the gNB

These attacks may or may not be usable for the MAC

— Reply to this email directly, view it on GitHubhttps://github.com/oran-testing/soft-t-ue/issues/56, or unsubscribehttps://github.com/notifications/unsubscribe-auth/ADY2LXPBEWN4SHLPUEHNL2LZWBHLZAVCNFSM6AAAAABOBDKKWKVHI2DSMVQWIX3LMV43ASLTON2WKOZSGUYTSOJRGE2DQOI. You are receiving this because you were assigned.Message ID: @.***>