Star Path
Animated Circle

Where independent research meets industry impact

Research

Ethon Shield maintains continuous research across telecom security, 5G networks, and cybersecurity. Our findings and tools are shared through publications, open-source projects, and presentations at international security conferences including Black Hat, DEF CON, and RootedCON.

main-bg-image

Research & Publications

Ethon Shield maintains continuous research across telecom security, focusing on protocol vulnerabilities, 5G architecture flaws, and ethical exploitation techniques. Our findings contribute to industry security standards through responsible disclosure.

We share our research through peer-reviewed white papers, open-source tools, and presentations at international security conferences including Black Hat, DEF CON, and RootedCON. Our work helps the telecom industry understand and mitigate emerging threats.

01/

Ghost SIM Attack: How to take advantage of weak authentication policies in 2G, 3G, 4G and 5G mobile networks

accordion-icon
October 2025

Comprehensive analysis of SIM card authentication vulnerabilities enabling fraud across mobile network generations through AT command exploitation.

Download

02/

SUCI Probing in the Wild

accordion-icon
July 2024

Real-world analysis of 5G subscription identifier vulnerabilities across European commercial networks, demonstrating practical SUCI-Cracker attacks.

Download

03/

A Telco Odyssey 5G SUCI Cracker and SCTP Hijacker

accordion-icon
November 2022

Advanced exploitation framework covering 5G core network attacks, SCTP protocol hijacking, and practical SUCI cracking techniques.

  • SCTP-Hijacker:The SCTP protocol is still vulnerable to perform a radio node hijacking attack in 5G networks.
  • SUCI-Cracker:The AKA procedure in 5G is still vulnerable to probing attacks, where victims can be identified by relating an IMSI with its encrypted SUCI identity.
  • Downgrade attack:The renowned downgrade attacks still work on 5G networks.
  • SUPI-Catcher:Obtaining the 5G identity with open-source implementations is still possible.
Download

5G Sharp Orchestrator

Network orchestration and testing tool. Simplifies deployment and analysis of 5G networks using open-source software.

Ver en GitHub