00_index

📡 Open5GS Telecom Security Lab Guide

A comprehensive hands-on guide to 4G/5G networks, Kubernetes, and threat modeling for security engineers


🎯 Learning Objectives

By completing this lab guide, you will:


📚 Guide Structure

Theory Sections

Part File Description
1 4G/LTE Fundamentals EPC architecture, CUPS, interfaces (S1, S5, S6a, S11, Gx)
2 5G NSA Architecture EN-DC, dual connectivity, eNB+gNB integration
3 5G SA Architecture SBA, NRF, all NFs, N-series interfaces, slicing

Hands-On Labs

Part File Description
4 Docker Lab: 4G EPC Build 4G LTE EPC with Open5GS on Docker (MME, HSS, PCRF, SGW, PGW)
5 Docker Lab: 5G NSA NSA/EN-DC conceptual exercise (UERANSIM cannot simulate NSA)
6 Docker Lab: 5G SA Build full 5G SA core with all NFs + UERANSIM gNB/UE end-to-end
7 Kubernetes Deployment Deploy Open5GS on K8s with Helm charts

Threat Modeling

Part File Description
8 4G Threat Model STRIDE analysis of 4G EPC attack surface
9 5G Threat Model STRIDE analysis of 5G SA attack surface
10 K8s + Telecom Threats Container, orchestration, and supply chain threats

Real-World Attack Case Studies

Part File Description
11 Core Signaling Attacks (SS7/Diameter/GTP) SS7 OTP theft, location tracking, Diameter exploitation, commercialized interception, GTP roaming abuse
12 Subscriber Identity & SIM Attacks Carrier PII breaches, targeted SIM swapping, insider fraud, metadata abuse, smishing with carrier data
13 SMS Abuse, Malware & MFA Bypass Android SMS stealers, OTP interception services, phishing+SS7 combos, A2P abuse, premium SMS fraud
14 APT & Gang Mobile Operations State surveillance, APT spear-phishing, ransomware SMS extortion, CaaS operations, coordinated carrier targeting
15 Attack Matrix & Defense Roadmap Master comparison matrix, combined STRIDE profile, standards mapping, prioritized defense roadmap

🛠️ Prerequisites

Hardware

Software

Optional (for K8s labs)

Important

Docker Image Sources: The labs use per-NF images from borjis131/docker-open5gs (e.g., borieher/open5gs-amf:v2.7.6). There is no single monolithic Open5GS Docker image.

Warning

UERANSIM Limitation: UERANSIM simulates 5G NR only (gNB + 5G UE). It cannot simulate 4G eNBs. Part 4 (4G EPC) deploys the core network and references srsRAN 4G for the RAN side. Part 6 (5G SA) uses UERANSIM for full end-to-end testing.


  1. Read Parts 1-3 (Theory)
  2. Complete Parts 4-6 (Docker Labs)
  3. Complete Part 7 (Kubernetes)
  4. Study Parts 8-10 (Threat Modeling)
  5. Study Parts 11-15 (Real-World Attack Case Studies)

Path 2: Hands-On First (For Experienced Engineers)

  1. Skim Part 1 (4G basics)
  2. Complete Part 4 (4G Docker Lab)
  3. Read Part 3 (5G SA theory)
  4. Complete Part 6 (5G SA Docker Lab)
  5. Jump to Parts 8-10 (Threat Modeling)
  6. Study Parts 11-15 (Real-World Case Studies)

Path 3: Security-Focused (For Threat Modelers)

  1. Skim Parts 1-3 (Architecture overview)
  2. Read Parts 8-10 (Threat Models)
  3. Study Parts 11-15 (Real-World Attack Case Studies)
  4. Complete Parts 4-6 (Labs to validate threats)

📖 How to Use This Guide

Reading Tips

Lab Tips

Threat Modeling Tips


🔗 External Resources


🤝 Contributing

Found an error or want to improve this guide? Contributions welcome!


Let's build some mobile networks! 🚀

Start with → Part 1: 4G/LTE Fundamentals