BalCCon2k25

"Beyond Borders: Analyzing and Simulating DNS Manipulation and Geolocation Spoofing in Modern Telecom Networks"

In this paper, we investigate the capabilities and limitations of manipulating DNS and spoofing geolocation within telecom networks (2G to 5G). By simulating user behavior in controlled environments using testbeds like Open5GS and srsRAN, we explore how DNS resolution paths, IP allocation, and CGNAT pools influence location-based identity. We also analyze DNS tunnel potential, protocol bypassing, and network-level impersonation challenges. The research provides insights into how telecom networks expose or mask location, and proposes defensive mechanisms for secure DNS handling in mobile ecosystems


Study of DNS behavior in telecom networks (2G–5G)

IP geolocation spoofing techniques using mobile IP/APN manipulation

Security risks like DNS tunneling, phishing, and location fraud

Simulation of attacks using Open5GS, srsRAN

Evaluation of defenses: DNSSEC, encrypted DNS (DoH/DoT), anomaly detection

Key Findings:

DNS settings are often insecurely configured via APN profiles.

IP address changes are inconsistent across carriers, making some spoofing easier.

Geofencing can be bypassed via VPN + mobile IP spoofing.

DNS tunneling can occur through weak mobile network filtering.

The speaker’s profile picture
vignesh Chandrasekaran

Blueberry vignesh4303, He has a few security hall of fames and a few CTF wins. He has worked on a wide range of topics in security, some of them include Red teaming, Infrastructure Pentest, Purple Teaming, Forensics and Incidence Response, Cyber Threat Intelligence, Cyber Footprint Assessment, Application Penetration testing.

Pentester and just another guy whom plays around 0 and 1.

The speaker’s profile picture
Nagendran GS