DragonOS Focal SS7 Any Time Interrogation (SigPloit, GSMEvil2)

  Рет қаралды 47,145

cemaxecuter

cemaxecuter

Күн бұрын

Пікірлер
@pmccoin
@pmccoin Жыл бұрын
please help me if you can tell me what programs you use, I am a beginner USR/SRC/TESTING/SERVER/ATTCKS/FRAUD/ ...Please continue with the vlogs, I like what you do. Thank you very much
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
Honestly, while this tool interested me, I’ve not really done much in this area. My focus is mainly software defined radios.
@crasuTravi
@crasuTravi 10 ай бұрын
Hey Aaron, Would you or any of your linux buddies be interested in a paid project to reverse engineer a mobile app API? It's not nearly as complicated as the work you do on this channel, just tedious nested protobuf layers.
@AIPenetraGuard
@AIPenetraGuard 8 ай бұрын
U mean hack an app ))
@geraldamasi1559
@geraldamasi1559 2 жыл бұрын
Hello the sigploit repository seems to be deleted but in that case i saw your comment that it was built in dragon os. Can you share how to find it on dragon os
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
It’s actually in a folder on the DragonOS Pi64 build in /usr/src/sigploit . I wonder why the repo was deleted? sourceforge.net/projects/dragonos-pi64/files/
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
Would it still be there on the wayback internet archive site?
@alfatech8604
@alfatech8604 Жыл бұрын
can u do a video on how to connect gsmevil with osmocombb thanks☺
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
I can try, make take me a a week or so. To setup osmcombb is a little more involving for me, since I have to make my own gsm network to sync to.
@husinhmada7618
@husinhmada7618 Жыл бұрын
Can I build a GSM network with IMSI Catcher via motorola cXX and do 4G routing for that network by Limesdr mini. And is This right: LimeSDR-Mini + 2 Motorola (C1XX series osmocom-bb compatibles) or BladeRF-xA4+2 Motorola or BladeRF-xA4 + LimeSDR-Mini Kali Linux 2019.4 (Gnome AMD64)
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
I’m not exactly sure I understand the setup part of the lime and 4g.
@user-gj6dw3ot1u
@user-gj6dw3ot1u 2 жыл бұрын
How do I get the private local_gt of my location,please answer me❤
@kenanqemberli7637
@kenanqemberli7637 15 күн бұрын
hi sir, had you figured it out?
@endremurti
@endremurti 2 жыл бұрын
Is it all just a simulation? Not tested on to live back bone telecom ?
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
Correct, simulation using the provided jar server files. I have no access to a real ss7.
@endremurti
@endremurti 2 жыл бұрын
@@cemaxecuter7783 I follow your linux os development & i also interested on telecom pentest ,perhaps you can try to get deeper ,like rooting some baseband modem device or buying used microwave antenna to sniff signal on the air ( R , K band ) 😬
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
I want to get a C band 6 foot+ dish haha
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
I think you’d like osmcombb, for old phones but still useful.
@endremurti
@endremurti 2 жыл бұрын
@@cemaxecuter7783 osmocombb can only sniff & can never touching those real GT or something like GRX backbone? (as i know) . I have collect some data to begin like what you did but i want do in real ecosystem, daydream bruh 😬
@pmccoin
@pmccoin Жыл бұрын
Good evening, please can you help me with SigPloit information, where can I find the program outside of github (DragonOS Focal is not), thank you very much for your reply and you can give us information
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
It’s contained inside DragonOS Pi64. You could flash to sd card and take it out or you may find this version works. I don’t know if it’s the same as I think the original project was removed github.com/ethicalhackeragnidhra/SigPloit-ss7/tree/master
@pmccoin
@pmccoin Жыл бұрын
@@cemaxecuter7783 Thank you very much
@ngdi_
@ngdi_ 3 жыл бұрын
Hello how can i take SDR-TDR and can you give me the link? ❤️
@joseandresgarciagarcia5360
@joseandresgarciagarcia5360 2 жыл бұрын
@cemaxecuter hello, good, the github link is no longer found any other way to be able to log in to the repository for cloning
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
This may work, but if not the repo is contained in the DragonOS Pi64 build itself. github.com/ethicalhackeragnidhra/SigPloit-ss7
@joseandresgarciagarcia5360
@joseandresgarciagarcia5360 2 жыл бұрын
@@cemaxecuter7783 thanks
@joseandresgarciagarcia5360
@joseandresgarciagarcia5360 2 жыл бұрын
@@cemaxecuter7783 Hello, I have tried with the link that you left me but I have not been successful since it seems that the programming has an error and the os that you recommend I have not been able to mount it because it is img and not iso any ideas that you can give me I need the ss7
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
If you burn the img to sd card with etcher and then insert it into a Linux machine you’ll be able to browse the file structure. The sigploit repo is in the /usr/src directory. You can grab it but you’ll also need whatever dependencies it requires. The img is for the Raspberry Pi
@joseandresgarciagarcia5360
@joseandresgarciagarcia5360 Жыл бұрын
@cemaxecuter Hello, I need the hackrf one device to be able to obtain the firmware info and it would be mandatory to make the ss7 work for the interception of SMS and if it works over the network or only in the network of my country
@QuantumSec
@QuantumSec 2 жыл бұрын
Hey can i sms intercept on sigploit without an HackRF or anything like that?
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
Sigploit doesn’t require an SDR, but for the real world, you’d have to have some kind of access to ss7 and even then, I don’t know what/if anything would work.
@QuantumSec
@QuantumSec 2 жыл бұрын
@@cemaxecuter7783 any other way I can SMS intercept do you know? Seems most ways are unreliable
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
Most likely do to encryption
@rifkyrifky581
@rifkyrifky581 3 жыл бұрын
Hello, Need your kindly help to copy that sudo apt-get install the lksctp etcetera in the description of this Youtubue, because it's not exist in any github
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Hello and thank you for your feedback. I think today I’ll be able to review and see if I can get you an answer.
@rifkyrifky581
@rifkyrifky581 3 жыл бұрын
@@cemaxecuter7783 Thank you so much Sir
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
@@rifkyrifky581 I sat down real quick and on DragonOS Focal the latest I just typed in sudo apt-get instal lksctp-tools and it pulled lksctp-tools from the archive.ubuntu.com/ubuntu focal/universe amd64
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
If you need it from GitHub though, I suppose this would work github.com/sctp/lksctp-tools
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Oh sorry I just realized what you were saying. I read it wrong. You were asking for me to copy and paste the command, not that you couldn’t find it. I’ll put it in the description here today.
@MicroArabs
@MicroArabs Жыл бұрын
Hello sir, can I communicate with you personally? I have a hackrf one device and I need to intercept sms messages.
@mohanadhussain3467
@mohanadhussain3467 3 жыл бұрын
Hi , thanks about what you are sharing it with us , I like the stuff that you do . about this video at 08:33 exactly the ( [-] Error : MAP InvokeTimeout for Dialog=1 and invokeId=0 ) can you tell how to fix or Upload part 2 of (SS7 Any Time Interrogation) communicate with you ...... replay plz
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
I’ve not seen or remember the error you mention. I’ll have to find some time to test again. Are you using DragonOS and following these steps?
@mohanadhussain3467
@mohanadhussain3467 3 жыл бұрын
@@cemaxecuter7783 Yes i am using DragonOS and (SigPloit, GSMEvil2) with (RTL2838 DVB-T) and doing my own number (9647822245450) .... thank for answering
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
I see. In this video or is not using a real ss7. It is using the included sigploit server side examples, so using your own number I don’t this will work as you would expect when having access to a real ss7 connection.
@mohanadhussain3467
@mohanadhussain3467 3 жыл бұрын
@@cemaxecuter7783 Oh ok honey i though it can be possible if i used my own number as another example than that appear in the structures , also I've noticed that difference between my real info and the structure info(s) . Honestly am looking for any thing that i a phone number So, It gives me back ( MNC , MCC , LAC AND CID )
@alwaqassharif
@alwaqassharif 3 жыл бұрын
@@cemaxecuter7783 did u not use real Rtl-sdr device in this example?
@janubaba7300
@janubaba7300 2 жыл бұрын
Sir plz upload mor stuff on this topic....
@ataywaris7075
@ataywaris7075 2 жыл бұрын
I want receive notifications any other person OTP any mobile number capture
@ilimguseinov5831
@ilimguseinov5831 3 жыл бұрын
Does SMS interception work? .Because I failed to intercept sms
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Me too in testing with YateBTS. I was able to read the sms with wireshark. The developer was questioned here but immediately closed the ticket github.com/ninjhacks/gsmevil2/issues/6
@Venkateshvenkatesh-ls9jo
@Venkateshvenkatesh-ls9jo 3 жыл бұрын
Pip2 command not found showing error bro Please help me
@rifkyrifky581
@rifkyrifky581 3 жыл бұрын
Not all SMS interception is work, because if the BTS/Operator using encryption A5/1 A5/2 A5/3, GRGSM not capable to decrypt that, but if the BTS using A5/0, supposedly is working, although never try again
@angelmunoz6332
@angelmunoz6332 Жыл бұрын
Any chance to find out who is attacking me with this kind of exploit ?
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
Not that I can think of, maybe talk with the provider?
@angelmunoz6332
@angelmunoz6332 Жыл бұрын
@@cemaxecuter7783 such a simple but adequate suggestion 😂 thanks !
@libyantornado
@libyantornado Жыл бұрын
Armadillo phone provide identification of an attack only. Others pinphone might be
@terrymarshall5318
@terrymarshall5318 3 жыл бұрын
Hello professor, please what do you mean by the (local_GT) in setting up the location tracking, I don't understand it..
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Sure, I think some info here would help. I know for sure there’s so much to learn that I often go down rabbit holes trying to understand things en.m.wikipedia.org/wiki/Global_title
@terrymarshall5318
@terrymarshall5318 3 жыл бұрын
@@cemaxecuter7783 ohh, thanks alot sir ..
@terrymarshall5318
@terrymarshall5318 3 жыл бұрын
Please professor, which way do I know the kind of encryption my network is using, so I can determine if it is A5/1 or A5/2 OR A5/3
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
I think you’d have to dig into packets captured with wireshark and grgsm perhaps. Some info or at least screen shots of wireshark captures are here www.blackhillsinfosec.com/gsm-traffic-and-encryption-a5-1-stream-cipher/ I don’t know much in this area without trying various tools.
@terrymarshall5318
@terrymarshall5318 3 жыл бұрын
@@cemaxecuter7783 thank you professor, that link really helped, I love your work ...🤗
@terrymarshall5318
@terrymarshall5318 3 жыл бұрын
How did you get the local_GT, sir ...
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Ah now I see what people were referring to. In this video the local GT was just an arbitrary number I believe. This was not on a real network, as that’d require some level of access. I plan to redo this video and test it all again on a Pi4 image I’ve been working on.
@terrymarshall5318
@terrymarshall5318 3 жыл бұрын
@@cemaxecuter7783 ok sir, thanks
@pmccoin
@pmccoin Жыл бұрын
hello, please tell me what you did about that error and the same thing happened to me and I don't know what to do, I've tried many times, thank you
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
If you mean the error in the video, there’s really nothing to do except type all the info in again and rerun it. That’s what I had to do during the filming, but I figured people would be bored seeing me type it all over again.
@pmccoin
@pmccoin Жыл бұрын
@@cemaxecuter7783 ok thanks I did this and still the same error probably I have an error in the program
@pmccoin
@pmccoin Жыл бұрын
Hi, I also have a question, can we intercept an sms of a target subscriber with SigPloit
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
Most likely no.
@sagisar
@sagisar 5 ай бұрын
@@cemaxecuter7783Why not?
@cemaxecuter7783
@cemaxecuter7783 5 ай бұрын
I mean if you’ve got some way into a telecom ss7 and you do whatever is necessary to redo/refactor/l is needed for sigploit to work, I suppose anything is possible.
@yogisuthar
@yogisuthar 2 жыл бұрын
which hardware is perfect for this simulation ?
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
Since it’s just a simulation, the only hardware you really need is the Pi3 b+ or Pi4 running the DragonOS Pi64 build as it has the SigPloit software built in. If you’re wanting to do it on a desktop you’d have to grab a copy of sigploit. If you’re talking about Gsmevil2, then you’d need something like a rtlsdr or hackrf to run grgsm_scanner and livemon.
@MicroArabs
@MicroArabs Жыл бұрын
@@cemaxecuter7783 Hello sir, can I communicate with you personally? I have a hackrf one device and I need to intercept sms messages.
@joseandresgarciagarcia5360
@joseandresgarciagarcia5360 Жыл бұрын
@@cemaxecuter7783 And since I can put this in a real environment, not a simulated one, some guide of the steps to follow to achieve this
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
I feel that would require custom programming and probably more to meet that goal. I would venture to say every network/provider has differences, this code is aged, and also unclear if it’s ever worked in a real environment.
@roger8386-no1
@roger8386-no1 7 күн бұрын
how to run in practice
@djnikx1
@djnikx1 3 жыл бұрын
Cheers!
@cbsdba
@cbsdba 3 жыл бұрын
sir SDR device is required right for ss7?
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Not that I know of. For this you can do everything internally as it’s just a virtual server.
@cbsdba
@cbsdba 3 жыл бұрын
@@cemaxecuter7783 when I do it says sccp protocol failed? Thats why I think of sdr device
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
If you have issues and followed exactly as I’ve shown, sometimes it just fails. If you see the same output as me on the server side then that’s fine. What someone has told me is best way to avoid a failure is to run the server with sudo and if it gives a nullpoit exception shut the server down and try again.
@herrymaster4643
@herrymaster4643 Жыл бұрын
brother if i dont watn to simulation like i want to do this attach like on my person number what can i do and which devices i need
@marwonmahommed2735
@marwonmahommed2735 3 жыл бұрын
Destination web gsmevil2 popping up but i can't enter
@alfatech8604
@alfatech8604 Жыл бұрын
please is it possible to send gsm packets from scapy to gsm network using osmocombb
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
That’s a good question. OsmocomBB can send messages, but I don’t think scapy can go through osmocombb.
@alfatech8604
@alfatech8604 Жыл бұрын
@@cemaxecuter7783 please how can i do it can you please make a video I want to check whether its possible to send and recieve an hlr query
@alfatech8604
@alfatech8604 Жыл бұрын
@@cemaxecuter7783 please how can i do it can you please make a video I want to check whether its possible to send and recieve an hlr query
@alfatech8604
@alfatech8604 3 жыл бұрын
nice video but pls how do u get config files
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
The config files were just for testing on the simulated lab for research. You’d have to pay for some sort of service to most likely need any sort of other config file. Unfortunately I don’t have knowledge on that.
@alfatech8604
@alfatech8604 3 жыл бұрын
@@cemaxecuter7783 thanks
@viralislamicvideo6530
@viralislamicvideo6530 3 жыл бұрын
Hello Sir .. Have you Use and SDR Device For This Project
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Hello. For gsmevil2 yes, for Sigploit no.
@viralislamicvideo6530
@viralislamicvideo6530 3 жыл бұрын
@@cemaxecuter7783 Sir Have no Transmitter For test GSM ss7 . There Any Way to Do Real SS7 Network Exploit With Out Device Interaction With Sigpoilt Sir
@viralislamicvideo6530
@viralislamicvideo6530 3 жыл бұрын
@@cemaxecuter7783 Hello sir can you give you email
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
This demonstration is with the server part of SigPloit. For something real, you’d have to have network access/permission from a company.
@viralislamicvideo6530
@viralislamicvideo6530 3 жыл бұрын
@@cemaxecuter7783 Sir ... I have SIP connection for ip phone from my isp use in favicon ip telephone .. can i use it for ss7 testing anyway with softwer sir . Can you give your email /whatsapp ./facebook fr contuct
@mervin9220
@mervin9220 4 жыл бұрын
Can you clarify this for me. When your catching SMS your not stopping the messages to its destination right? Your just logging sms that passes through?
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
Unless you were running your own BTS and doing something to block SMS then yes, you’d only be listening to traffic and logging it with something like wireshark. It would continue to its destination.
@mervin9220
@mervin9220 4 жыл бұрын
@@cemaxecuter7783 Thanks man!
@seanmcmahon2281
@seanmcmahon2281 2 жыл бұрын
Is it possible for me to do this on my own phone?
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
What’s shown here is only using sigploits included server/client. You’d have to somehow have access to a real ss7 gateway and even then I have no idea if in fact this open source application would yield a result.
@xpendraxproduction811
@xpendraxproduction811 2 жыл бұрын
Hey i Want find SIGPLOITER BUT SIGPLOITER IS DELETE OF GITHUB WHERE FOUND THIS SCRIPT BROWSER PLEASE 👌
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
It’s actually installed with source as well in this Pi image. sourceforge.net/projects/dragonos-pi64/files/
@bradfordltd
@bradfordltd 4 жыл бұрын
Gsmevil2 doesn't work, the doc is misleading module logging is in the python3 base install. The code is full of bugs and unusable unless you what to fix it. Great concept but too it simply doesn't work.
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
bradfordltd yes logging is included, that’s why I left that off the install. At any rate, the web interface for IMSI does work, meaning it shows the IMSI in the correct column by line. Besides that, yes it does seem a little buggy.
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
One additional note, depending on what you’re trying to install and run it on.. for Gsmevil2 to work relies on a correctly setup gr-gsm. I’ve already taken care of this using gr-gsm for gnuradio 3.8 in DragonOS. The next release I upload will have Gsmevil2 preinstalled, but again all I’ve heard from users that works is the IMSI part. I don’t expect sms to work if there’s any sort of encryption on the network.
@bradfordltd
@bradfordltd 4 жыл бұрын
@@cemaxecuter7783 I got grgsm working fine on Ubuntu and some gsm traffic. The web interface just doesn't work. Noticed that issue on github are immediately closed by the arrogant dev. Same on twitter many people confirm that. Did you get the web GUI working? V1 works fine but nothing different from the existing simple imsi catcher python script.
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
So you know what’s interesting? I went and looked at the github page this morning and a new updated removed logging from the requirements section.. maybe they saw your post or the video? So I personally haven’t seen the webpage getting info but I’ve been told by two people it works and has the IMSI info being shown. I have all day tomorrow to do testing and if all goes well I want to upload another ISO by the weekend that’ll have iridium live, gsmevil2, updated crocodile hunter and more.
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
So I literally just now got it all setup and can confirm the webpage version works and I am receiving the IMSI in both the terminal and webpage along w/ the info in the other columns.
@flygrandjan6677
@flygrandjan6677 4 жыл бұрын
which hardware you use to SigPloit
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
There’s no hardware per say. For this video it’s simulated, as if I had access to an ss7 gateway.
@flygrandjan6677
@flygrandjan6677 4 жыл бұрын
Raven XE H2295E-W will be ok? What do you think?
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
I’m not sure. You’d still need actual access to a provider and that I don’t think is going to happen.
@endremurti
@endremurti 3 жыл бұрын
@@flygrandjan6677 interesting
@alfatech8604
@alfatech8604 3 жыл бұрын
Is it posdible to buy ss7 access pls if not then what if hacking i need to track down thiefs
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
My understanding is it’s possible, but I double it’d be for consumer use and allow this type of manipulation. Maybe but I don’t know.
@jatmirhusen7751
@jatmirhusen7751 4 жыл бұрын
Wow brother
@musaashabatt1963
@musaashabatt1963 3 жыл бұрын
Hello and thanks for this explanation, but sms sniffing does not work and does not show any messages despite the imsi catcher work. I want help. The device used to hackrf
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
No problem. I think it’s going to be highly unlikely you’ll find a network where it’s possible to actually read the sms messages. You could try to save the data and do things to it afterwards, but I’m not familiar with the techniques. If you have your own network, with Yate for example, you can turn on GSM tap and see your own SMS going across your own network with wire shark.
@sasansasan6662
@sasansasan6662 4 жыл бұрын
Please upload part 2 sniff sms
@danidaneibr
@danidaneibr 4 жыл бұрын
I did a Google search and I'm still in doubt about the local gt
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
What’s the local gt?
@alwaqassharif
@alwaqassharif 3 жыл бұрын
Dear it is global title address
@chidambarpujari4211
@chidambarpujari4211 3 жыл бұрын
How can I get gt
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Sorry I’m not sure.
@bhagiyarajmahesh8972
@bhagiyarajmahesh8972 3 жыл бұрын
Can you share SS7 documents to read?
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
I don’t have anything in particular to refer to, but I have seen some really good papers available with a Google search.
@rifkyrifky581
@rifkyrifky581 2 жыл бұрын
Hello Bhagiyaraj Mahesh, you google the 3GPP standard relevant GSM MAP (one of them is anytimeinterrogation) kindly google this from 3gpp or etsi -> 3GPP TS 29.002 www.etsi.org/deliver/etsi_ts/129000_129099/129002/09.11.00_60/ts_129002v091100p.pdf or do you need also basic ss7 stack protocol info document from MTP level SCCP, TCAP and Application layer ?
@alwaqassharif
@alwaqassharif 3 жыл бұрын
How to get local-GT ??
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Hi. That’s a good question, I’m not sure and never tried 🤔
@alwaqassharif
@alwaqassharif 3 жыл бұрын
@@cemaxecuter7783 how did u take that?
@Prince-xk8ez
@Prince-xk8ez 3 жыл бұрын
java -jar AnyTimeInterrogation.jar doesn't works
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Hi, doesn’t work on what? DragonOS? Or something else.
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
I just installed it on DragonOS Focal and it starts. I’d have to check the Pi version of DragonOS as it already has it installed.
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
Have a look at the bottom of this videos description, it’ll show you what additional packages to install before using pip2 to install requirements.
@jatmirhusen7751
@jatmirhusen7751 4 жыл бұрын
Please upload more
@shinobilamine8361
@shinobilamine8361 3 жыл бұрын
How can I download the ss7 program ?
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
It looks like the GitHub page is gone. It is however built into DragonOS.
@z9fr
@z9fr 4 жыл бұрын
don't we need to use hackrf for this
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
Sigploit is meant to use if/when you had access to the SS7. It also comes with a simulated SS7 environment. No hackrf there. With gsmevil2, yes you could use a Hackrf or even a rtlsdr as long as the gsm freqs are within each radios range.
@sasansasan6662
@sasansasan6662 4 жыл бұрын
how sniff sms ?
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
Have a look here for directions github.com/sharyer/gsmevil2 I don’t know if it works as I haven’t tested it.
@bradfordltd
@bradfordltd 4 жыл бұрын
@@cemaxecuter7783 it doesn't work at all, time wasting even in v1
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
bradfordltd it actually does work, I’ve had two people confirm v2 gets IMSI. Still waiting to hear about sms which most likely won’t work since they’re probably encrypted.
@cemaxecuter7783
@cemaxecuter7783 4 жыл бұрын
sasan sasan it’s likely sms has some level of encryption which this won’t do anything for - you’d need something else for sms. Like Kraken etc. I’ve been told this does work for IMSI on GSM.
@bradfordltd
@bradfordltd 4 жыл бұрын
@@cemaxecuter7783 I got grgsm working fine and simple imsi catcher grabbing info. Have a look at the v2 code it's bad.
@hackerheart4912
@hackerheart4912 3 жыл бұрын
Bro Can you help Me... Can we use the tools without HackRF? Please Please Please answer bro
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
There’s no need for a HackRF. There’s no need for any hardware, except what’s needed to run the operating system.
@hanimaged6754
@hanimaged6754 3 күн бұрын
Hi
@kuratermux5910
@kuratermux5910 3 жыл бұрын
upload part 2 bro
@cemaxecuter7783
@cemaxecuter7783 3 жыл бұрын
I’ll see what else I can do, maybe one of the other attacks.
@kuratermux5910
@kuratermux5910 3 жыл бұрын
my bro please help me how i can talk with you
@computertec511
@computertec511 3 жыл бұрын
Hlo
@ahmadfikrimasyhur
@ahmadfikrimasyhur 2 жыл бұрын
Hi, is ss7.dev is verivied website to shop ss7?
@cemaxecuter7783
@cemaxecuter7783 2 жыл бұрын
I’ve not used any sites yet, only the built in simulation server for testing.
@RupSarkar-k6i
@RupSarkar-k6i Жыл бұрын
Hello sir, could please help me, could I use rtl sdr for ss7 attack instead of hacker rf?
@cemaxecuter7783
@cemaxecuter7783 Жыл бұрын
Neither are used, it’s based on having a network connection into services that are unlikely provider outside a providers control. That’s my understanding.
КОГДА К БАТЕ ПРИШЕЛ ДРУГ😂#shorts
00:59
BATEK_OFFICIAL
Рет қаралды 6 МЛН
Family Love #funny #sigma
00:16
CRAZY GREAPA
Рет қаралды 34 МЛН
СОБАКА И  ТРИ ТАБАЛАПКИ Ч.2 #shorts
00:33
INNA SERG
Рет қаралды 2 МЛН
这是自救的好办法 #路飞#海贼王
00:43
路飞与唐舞桐
Рет қаралды 104 МЛН
Tobias Engel: SS7: Locate. Track. Manipulate.
1:00:57
media.ccc.de
Рет қаралды 78 М.
ثغرة Simjacker - أقوى وأسهل من ثغرة SS7
14:48
الهاكر الأسود
Рет қаралды 14 М.
Demonstrating the New Linux Exploit (9.9 CVSS)
35:12
MalwareCube
Рет қаралды 13 М.
Enquête | SS7 à l'écoute
23:06
Radio-Canada Info
Рет қаралды 28 М.
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 2,1 МЛН
DragonOS Focal YateBTS Calls + SMS w/ BladeRFxA4 (Yate RC2) part 1
16:35
КОГДА К БАТЕ ПРИШЕЛ ДРУГ😂#shorts
00:59
BATEK_OFFICIAL
Рет қаралды 6 МЛН