Talks, CTFs & Workshops

TELECOM VILLAGE

@c0c0n 2025

10-11

October

Buy Ticket

Welcome to Telecom Village

What is Telecom Village?

Telecom Village is a hub for telecom security enthusiasts, uniting professionals, hackers, and researchers. Whether you're an expert or a newcomer, it's the perfect space to learn, hack, and collaborate.

Join us for insightful talks, hands-on workshop, CTFs, and engaging conversations on telecom security.

Expand your knowledge, test your skills, and connect with like-minded professionals. Welcome to Telecom Village!

What to expect from Telecom Village?

At Telecom Village, we foster a community-driven approach to telecom security, with a strong focus on 5G networks. Our goal is to inspire creative thinking, guiding participants through the process of target selection, in-depth research, and strategic information gathering.

We offer insightful talks, hands-on workshops, CTFs, challenges and engaging conversations on the latest threats and defenses in telecom security. Through collaboration and knowledge sharing, we empower participants with critical skills like patience, stealth, and adaptability to navigate this evolving landscape.

TELECOM VILLAGE - Schedule & Agenda

Stay Informed & Engaged

Workshop   Anotomy Of telecom Malware

Anatomy of Telecom Malware” is a Telecom Village talk spanning 2G, 3G, 4G/LTE and cloud-native 5G. It dissects how attackers weaponise every layer of the stack—SS7/SIGTRAN, Diameter, GTP, SMPP and SBA APIs—while adding three critical lenses:

Supply-chain infiltration: poisoned firmware builds and compromised eSIM-provisioning servers that let implants enter the core before day 0.

Transit-based backdoors: malware such as the LightBasin “GTPDoor” family that hides its C2 inside roaming GTP-C/U tunnels, crossing operator boundaries unnoticed.

Field-proven attacks: campaigns like SIMjacker’s SS7/S@T-browser exploitation for OTP interception and recent SS7-redirect bank-fraud cases, plus roaming-hub spyware and diameter peer-scraping seen in the wild.

Attendees leave with a telecom-specific kill-chain map, protocol-aware detection tricks, and a 10-point hardening checklist to protect both legacy and future networks."


Case Study   Telecom Security Under Risk: SKT Story

  • Overview of Exploited Vulnerabilities
  • Breakdown of the Cyberattack
  • Impact and Consequences
  • Incident Response & Mitigation
  • Key Lessons for Cybersecurity Preparedness


Workshop   Breaking the Backbone: SS7 and GTPdoor Malware Exploits

This workshop demonstrates how SS7 signaling can be intercepted and manipulated to retrieve a mobile user's location without user interaction using custom-developed malware. Additionally, it demonstrates how the GTPdoor malware creates a hidden backdoor by abusing GTP signaling in roaming networks.


Case Study   Wap Droper Case Study

The session is a case study about how the WAPDropper Android malware abuses premium telecom calling services. It explains how a user unknowingly installs the malware and then gets billed without their consent. The session also demonstrates how a legitimate-looking application can be used to exploit WAP billing mechanisms.


Talk   SIP security - VoIP and beyond

  • Basics of the SIP protocol
  • Application of the SIP protocol
    • Fixedline VoIP networks
    • International VoIP Networks
    • Mobile networks VoLTE/VoWIFI/VoNR
  • Security vulnerabilities is the SIP and RTP
  • Vulnerability beyond the protocols
  • What mobile networks ignores which makes it big area of attack
  • 6- Ways to secure the SIP - VoIP , VoLTE, VoWIFI/VoNR


Workshop   MalSIM: Building

Deep dive into Android’s eSIM management APIs and how they can be abused.

Building and analyzing a proof-of-concept malware for silent eSIM installation and location harvesting.

Understanding telecom backend provisioning vulnerabilities enabling malicious profile injection.

Detection techniques, anomaly signals, and defensive engineering against malicious SIM profile abuse.

Live demonstration on extracting call metadata and geolocation from compromised profiles without raising alarms."

Workshop   GPON & Discovery

workshop on GPON network security weakness and different attack use cases on GPON network

Workshop    SIMurai: The Stealth of Exploits 

Decode the Signal: Breaking Down the PDU Format Learn how to dissect the raw PDUs used in SMS-based communication. Weaponize the Message: Crafting Custom PDU Payloads Dive into the dark arts of crafting malicious SMS payloads. Hunt the Signal: Detecting SIMjacker Through Forensic PDU Analysis Learn to identify signs of SIMjacker attacks in PDU traffic.

Talk    Post 2G sunset - Fence the LTE before the 5G

Reasons to secure the LTE/4G Network

  • All IP Network - Internet style attack surface
  • LTE Network - IMSI catching is not gone yet
  • Diameter carries the legacy SS7 risks
  • GTP Still exists and risks too
  • No intermediate node between eNB and MME - more risks core network
  • VoLTE/VoWIFI threat surface

Ways to secure the LTE -

  • Perimeters and interfaces level security
  • Securing the IMS - VoLTE
  • Gi Interface security.
  • Security the Air interface
  • Back haul security
  • SMSC interworking with SIP or SMS over SIP

Talk    SYN-ister Channels: Exploring Data Exfiltration and Offensive Abuse of TCP SYN Packets

Deep protocol clarity – Audience will understand TCP packets at a granular level, including why the SYN stage is often treated as “safe” and how that assumption can be dangerous. Problem awareness – Learn how incomplete handshakes can still carry hidden data, with a real-world telecom billing server scenario illustrating the risk. Hands-on perspective – See a controlled lab demonstration proving that data can be exfiltrated even without completing the 3-way handshake. Telecom relevance – Gain insight into telecom-specific use cases where such covert channels could appear.

CTF    Malvynox

At Malvynox, we run a series of advanced Capture the Flag (CTF) competitions designed to push the boundaries of telecom network security research and skills development, we are coming up with the details very soon

VILLAGE CREW
How to reach

Direction To The Venue