In this paper, we investigate the capabilities and limitations of manipulating DNS and spoofing geolocation within telecom networks (2G to 5G). By simulating user behavior in controlled environments using testbeds like Open5GS and srsRAN, we explore how DNS resolution paths, IP allocation, and CGNAT pools influence location-based identity. We also analyze DNS tunnel potential, protocol bypassing, and network-level impersonation challenges. The research provides insights into how telecom networks expose or mask location, and proposes defensive mechanisms for secure DNS handling in mobile ecosystems
Study of DNS behavior in telecom networks (2G–5G)
IP geolocation spoofing techniques using mobile IP/APN manipulation
Security risks like DNS tunneling, phishing, and location fraud
Simulation of attacks using Open5GS, srsRAN
Evaluation of defenses: DNSSEC, encrypted DNS (DoH/DoT), anomaly detection
Key Findings:
DNS settings are often insecurely configured via APN profiles.
IP address changes are inconsistent across carriers, making some spoofing easier.
Geofencing can be bypassed via VPN + mobile IP spoofing.
DNS tunneling can occur through weak mobile network filtering.
Blueberry vignesh4303, He has a few security hall of fames and a few CTF wins. He has worked on a wide range of topics in security, some of them include Red teaming, Infrastructure Pentest, Purple Teaming, Forensics and Incidence Response, Cyber Threat Intelligence, Cyber Footprint Assessment, Application Penetration testing.
Pentester and just another guy whom plays around 0 and 1.