GSM Sniffing: SMS Decryption – Software Defined Radio Series #10

GSM Sniffing: SMS Decryption – Software Defined Radio Series #10 In this video I show how to capture GSM traffic over the air, and decrypt our own SMS! It’s highly recommended to check out the previous videos, in case this is the first time you’re doing GSM sniffing and decryption. Topics covered: – Switching USB mode on a Samsung Galaxy phone – ARFCN conversion to downlink and uplink frequencies – Testing the GSM downlink frequency – Capturing RTL-SDR GSM traffic for later use – Decoding RTL-SDR GSM traffic – GSM packets (Immediate Assignment, Cipher Mode Command, etc.) – Decrypting GSM traffic with a known Kc (symmetric encryption key) Tools: – usbswitcher (http://ift.tt/1T3NYAr) – minicom – kalibrate-rtl (kal) – grgsm_livemon – grgsm_capture – grgsm_decode – wireshark Hardware requirements: – RTL-SDR (Default antenna) – Cellphone that has an AT interface you can access. Stay tuned and subscribe for more upcoming videos showing actual hacks! Twitter: @CrazyDaneHacker Facebook: http://ift.tt/2pmxABB Patreon: http://ift.tt/2nyA3MK Many thanks to RTL-SDR.com for sharing the GSM Sniffing & Hacking video playlist! (http://ift.tt/2aVnfX9) https://youtu.be/sCwBDIEexqo https://www.youtube.com/watch?v=sCwBDIEexqo&feature=youtu.be http://ift.tt/2aM8QhC
Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s