Description
In this video I demonstrate how to identify the signals for GSM Downlinks and Uplinks. It is important that we cover some of the very basics, before we go deep into installing all the tools we need, and of course how to use them.
Topics covered:
– GSM Downlinks & Uplinks
– GSM Frequency Bands
– GSM Downlink Signal Identification
– GSM Channel Hopping Signal Identification
Tools:
– SDR# (SDR Sharp)
Stay tuned and subscribe for more upcoming videos showing actual hacks!
Have you ever seen the GitHub repo SigPloit ? I got a Hackrf however I didnt realize at the time of buying it the SigPloit sources are not supported anymore and I was reading A paper done by a few students how they couldn’t execute any of the work from that GitHub page on SigPloit. All they could do was the simulation mode, and I actually had a reason for doing this. Ive now researched all kinds of links and spent the last 7 months almost fully dedicated to this project. Im basickly down to getting a modem to execute AT commands remotely and I was looking at your Samsung Videos for UART because I have a note 5 I was going to try it with but its got that FRP lock set off and it does a boot loop not even allowing anywhere to enter the Gmail account because I have the creds, it was my early days of Rooting and I didnt know what FRP was then. So I was wondering if a UART will unbrick that boot loop on rooted Samsung if you know. and or anything about hwo to get SigPloit working. I really dont want to hack the telecommunications carriers in USA using AT commands so SigPloit is my better options to use with HackRF because I own the hardware on both sides of the SigPloit Exploit..
Also I liek understand the idea and need to wireless hacking. but I feel remote hacking is always more important. I mean if your close enough to the target to scan them with a rtl-sdr or wifi antenna, then your close enough to just go stick a .357 revolver in their face and take what ever it is you need. I mean that’s how a criminal sees it. not me….
I haven’t used SigPloit but you won’t be able to reach the SS7 network that easily: https://github.com/SigPloiter/SigPloit/wiki/2–Mobile-Network-Architecture
It may be possible to bypass FRP or fix a boot loop with the UART cable, but I have not researched this and it’s generally not an interest of mine. If you want to experiment with and learn AT commands then just buy a breakout module for the SIM808 or SIM800L and a UART cable to control it. Make sure you connect power the right way if you buy this type of module. A USB to UART cable provides 5v DC.
Also, hacking wireless is sometimes required when you cannot hack remotely over the Internet. This is rare in terms of “professional pentest services” but it does happen. Also, you don’t have to be a gang member or carrying a firearm to get what you need during an assignment. I am aware that things are different across the world though, but I am speaking purely about professional settings where you are a consultant providing a pentest service to a legal organization.