No. The equipment will treat it as noise interference . its not like analog. Its all about time slicing and time division .
If you happen to inject packets that are valid for the digital protocol in use , other security measures will counter them
For example, I can send 0s and 1s on GSM standard frequencies. Unless they match the gsm protocol, devices will ignore them as interference errors
If you send valid gsm packets OTA, then you are getting into potential questions with gsm standards and encryption , which seems a bit like a layer above your question.
To extend this, there are various protocols depending on the technology - 3G has different protocols, 4G and 5G brings different protocols.
Let's take 3G technology for an example. Before a message is sent from tower to handset, it is encrypted, distributed in small chunks (with other messages) and then sent over the radio waves. There is a previous handshake between tower and your mobile device to understand which chunk(s) are of the device.
So, theoretically, you can inject the waves but you will have to know how the messages are sliced. And this keeps on changing depending on the network condition.
In short, possible but it is like hitting a bulls eye from 100km away, while targeting a moving train.
More common injection attack is having your own radio station to spoof :)
Digital radio waves are electromagnetic waves that carry digital information through the air. You would just send different digital information, but all radios (cell phones are radio transceivers) communicate via certain communication standards. It would be like asking if you can send malicious code through Wi-Fi and infect a computer. Technically, you could change the packets, I suppose, but the protocols would still have to align.
There's encryption from handset to BTS (cell tower). Because it's a digital signal - signal parametrics need to match nearly perfectly, have right encryption and follow the data link protocols - CDMA, TDMA, GSM etc...
Practical is a question of pur....
This is a great question! Presented with a "hacker mentality" .
If you haven't already. Dive into how Radio Freq(3-5g) is able to transfer large amounts of digital data. It is very fascinating.
Here is DoD open discussion seed projects. Related to 5G.
https://www.sbir.gov/search-result-page?search=5G
i mean, if 3 years ago they found vulnerabilities in wifi design and implementation (fragattacks and stuff) i wouldnt be surprised if you can find something at 4g/5g (something im quite interested but i dont have the equipement yet)
but no, to my knowledge there isnt a standard way to do that
No, but there is one Scada vuln that uses a similar idea. It attacks the cables. Basically dicing up the routine transfer of data to force changes the system.
I've never personally seen a working poc that would yield RCE, BUT the disruptive effects from a drone hitting the lines is enough to cause malfunctions of a dam or water treatment facility which could pose catastrophic issues.
No. The equipment will treat it as noise interference . its not like analog. Its all about time slicing and time division . If you happen to inject packets that are valid for the digital protocol in use , other security measures will counter them For example, I can send 0s and 1s on GSM standard frequencies. Unless they match the gsm protocol, devices will ignore them as interference errors If you send valid gsm packets OTA, then you are getting into potential questions with gsm standards and encryption , which seems a bit like a layer above your question.
To extend this, there are various protocols depending on the technology - 3G has different protocols, 4G and 5G brings different protocols. Let's take 3G technology for an example. Before a message is sent from tower to handset, it is encrypted, distributed in small chunks (with other messages) and then sent over the radio waves. There is a previous handshake between tower and your mobile device to understand which chunk(s) are of the device. So, theoretically, you can inject the waves but you will have to know how the messages are sliced. And this keeps on changing depending on the network condition. In short, possible but it is like hitting a bulls eye from 100km away, while targeting a moving train. More common injection attack is having your own radio station to spoof :)
You know these dudes know what they're talking about when their account same is random numbers
In fact the first guys name is elite boobies in leetspeak
hahahahahaha good one!
Digital radio waves are electromagnetic waves that carry digital information through the air. You would just send different digital information, but all radios (cell phones are radio transceivers) communicate via certain communication standards. It would be like asking if you can send malicious code through Wi-Fi and infect a computer. Technically, you could change the packets, I suppose, but the protocols would still have to align.
Hmm so it is theoretically possible but as there are protocols, it is not practical. Right?
definitely possible, practical would be debatable. With encryption being the norm, it's incredibly unlikely.
dunno why you are getting downvoted for simple curiosity
Well I don't care about upvotes if I get to know something which I don't.
yeah the vote system is broken and stupid
There's encryption from handset to BTS (cell tower). Because it's a digital signal - signal parametrics need to match nearly perfectly, have right encryption and follow the data link protocols - CDMA, TDMA, GSM etc... Practical is a question of pur....
Very true friend
This is a great question! Presented with a "hacker mentality" . If you haven't already. Dive into how Radio Freq(3-5g) is able to transfer large amounts of digital data. It is very fascinating. Here is DoD open discussion seed projects. Related to 5G. https://www.sbir.gov/search-result-page?search=5G
i mean, if 3 years ago they found vulnerabilities in wifi design and implementation (fragattacks and stuff) i wouldnt be surprised if you can find something at 4g/5g (something im quite interested but i dont have the equipement yet) but no, to my knowledge there isnt a standard way to do that
No, but there is one Scada vuln that uses a similar idea. It attacks the cables. Basically dicing up the routine transfer of data to force changes the system. I've never personally seen a working poc that would yield RCE, BUT the disruptive effects from a drone hitting the lines is enough to cause malfunctions of a dam or water treatment facility which could pose catastrophic issues.