
Introduction To Baseband
Over the years, there has been a steady rise in mobile devices operating worldwide. In 2021 this number stood at almost 15 million. While the architecture of modern mobile devices varies from manufacturer to manufacturer, almost all of these 15 million devices will use a baseband implementation in one form or another—as it is this technology that allows for radio communication via cell networks and base stations.
As this technology underpins so many devices, is used by millions, and is quite complex it is pertinent for security researchers to understand the technology so that vulnerabilities can be identified and defense mitigations can be put in place.
This training covers the background of baseband technologies, how they’re used today, and starting points for reverse engineering modern baseband systems.
Curriculum
- 5 Sections
- 13 Lessons
- 0 Quizzes
- 0 Assignments
- 35m Duration
Introduction
- What The Course Will Cover
Fundamentals
- Baseband Implementations and Devices
- Cell Towers, Base Stations, and Radio Networks
- Generations of Mobile Technology
Baseband Internals
- RTOS Tasks
- Baseband Processor
- Baseband Protocol Stack
- Information Elements
Starting Points For Baseband Reverse Engineering
- Introduction
- Acquire Firmware
- Load Firmware Into a Disassembler
- Static Analysis of Baseband Firmware
- Dynamic Analysis – Fuzzing and Emulation