5G AttackSimulator

Interactive 5G network attack simulation tool. Learn about vulnerabilities, attack vectors, and defense strategies through realistic scenarios.

Rogue gNodeB Attack
Intermediate
Demonstrates how attackers can set up fake 5G base stations to intercept communications and perform downgrade attacks.
Category:
Radio Access
Duration:
45 min
Severity:
High
Steps:
5
Attack Techniques:
IMSI Catching
Traffic Interception
Downgrade Attacks
Location Tracking
Prerequisites:
  • SDR Hardware
  • 5G Protocol Knowledge
  • RF Analysis Skills
Network Slice Isolation Breach
Advanced
Demonstrates how attackers can break network slice isolation to access data from other slices or steal resources.
Category:
Core Network
Duration:
50 min
Severity:
Critical
Steps:
5
Attack Techniques:
Slice Enumeration
Resource Manipulation
Cross-Slice Access
QoS Exploitation
Prerequisites:
  • 5G Core Knowledge
  • Network Slicing Understanding
  • API Security Skills
5G Core API Exploitation
Advanced
Demonstrates exploitation of vulnerabilities in 5G service-based architecture APIs to compromise network functions.
Category:
Service-Based Architecture
Duration:
40 min
Severity:
High
Steps:
5
Attack Techniques:
API Enumeration
Authentication Bypass
Injection Attacks
Privilege Escalation
Prerequisites:
  • REST API Security
  • HTTP/2 Protocol
  • 5G SBA Knowledge
Multi-Access Edge Computing (MEC) Attack
Intermediate
Demonstrates attacks against 5G edge computing infrastructure to compromise edge applications and data.
Category:
Edge Computing
Duration:
35 min
Severity:
High
Steps:
5
Attack Techniques:
Container Escape
Privilege Escalation
Data Exfiltration
Lateral Movement
Prerequisites:
  • Container Security
  • Edge Computing Architecture
  • Kubernetes Knowledge