How To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN

  Рет қаралды 1,549,898

Rob VK8FOES

Rob VK8FOES

Жыл бұрын

EDIT: Please see my latest GSM cracking video that showcases a more streamlined workflow and eliminates the requirement of Airprobe! • Not Sentenced To Priso...
My GSM cracking content has been getting quite a lot of attention lately. Previous videos of mine relating to this topic were only boring screen recordings with no real explanation on what steps are required to crack the A5/1 stream cipher and decrypt GSM traffic by obtaining the Kc value.
I was bored one day and decided to present a live-style workflow of how hackers and security researchers 'crack' 2G cellular communications in real-time. Be warned that if you don't have an interest in cryptography or cellular network security, you might find this video rather boring.
The GSM capture file used in this video, to my knowledge, has never been publicly cracked before. 'capture_941.8M_112.cfile' was recorded and uploaded with permission by the owner of the data themselves as a decoding example for testing Airprobe.
I make a few mistakes in the video that I can't be bothered editing out. But they are not critical, just myself misreading a number at the 10 minute mark somewhere, and saying the wrong name of a software tool at 17 minutes.
Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.
However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.
Thanks for watching!
Archive Download (GSM capture file, cracking notes etc.)
drive.google.com/file/d/1yeMo...
LAUNCH WIRESHARK:
sudo wireshark -k -Y '!icmp && gsmtap' -i lo
AIRPROBE DECODING USAGE:
cd /home/username/airprobe/gsm-receiver/src/python
sudo ./go.sh capture_941.8M_112.cfile 112 0B
sudo ./go.sh capture_941.8M_112.cfile 112 1S & bursts.txt
(put a greater-than symbol after the '&')
XOR.PY USAGE:
cd /home/username/kraken/Utilities/
./xor.py 000000011111010101010000100000010001010111010101000010100001010001111101010001000010000000000101110101010100000010 100011101110001001000110001101001001111100001001010110010011000010101111111010010011101101110000100110100111000111
KRAKEN USAGE:
cd kraken/Kraken
sudo ./kraken ../indexes/
crack 100011110001011100010110101101011000101011011100010100110010010011010010101011010001101101110101010011110011000101
FIND_KC USAGE:
cd /home/username/kraken/Utilities/
./find_kc 10931293685685996799x 11 2580567 2580534 100101111101011101100011100001001101001010111110000011110101110000010010011100000100001000100010111110010101100000
AIRPROBE DECYPTION USAGE:
sudo ./go.sh capture_941.8M_112.cfile 112 1S 10A29FC292C8D7EF
A (VERY STRONG) DISCLAIMER:
THIS VIDEO WAS MADE FOR THE PURPOSES OF EDUCATION AND EXPERIMENTATION ONLY. IMSI-CATCHING, SMS-SNIFFING AND VOICE CALL INTERCEPTION ON CELLULAR NETWORKS IS ILLEGAL AND PUNISHABLE BY HEFTY FINES AND IMPRISONMENT!

Пікірлер: 1 500
@Thph793
@Thph793 Ай бұрын
"Educational Purposes" are the only 2 words keeping this video save
@RobVK8FOES
@RobVK8FOES Ай бұрын
The two words keeping my entire channel from being scrubbed from the interwebz!
@I_imperium
@I_imperium 25 күн бұрын
​@@RobVK8FOES😮
@Designer_TopG
@Designer_TopG 22 күн бұрын
​@@RobVK8FOES Whats a GSM capture file.
@RobVK8FOES
@RobVK8FOES 4 күн бұрын
@Designer_TopG a recording of 2G / GSM mobile phone radio waves as received by a software defined radio on a PC
@your-mom-irl
@your-mom-irl Жыл бұрын
Thanks I'm in jail now.
@RobVK8FOES
@RobVK8FOES Жыл бұрын
Me too, maybe we could be cell mates?
@linuxinside6504
@linuxinside6504 Жыл бұрын
@@RobVK8FOES lol🤣🤣🤣
@zazugee
@zazugee Жыл бұрын
@@RobVK8FOES what's your cell id? xd
@4N07H3R_1
@4N07H3R_1 9 ай бұрын
Lmao 😂
@StabilizerTech
@StabilizerTech 9 ай бұрын
We are going to jail
@FeralFlare
@FeralFlare 8 ай бұрын
Citizens: "THIS IS ILLEGAL!" Intelligence branches: "NOT FOR ME!"
@iansmith8234
@iansmith8234 8 ай бұрын
they have to gain intelligence somehow like what. are you dumb? its legal for them so they can catch criminals. and its illegal for citizens so criminals can't get intel on you.
@ShaferHart
@ShaferHart 8 ай бұрын
Literally. Cellular encryption could've been better but the NSA through NIST (I think) got them to weaken the standards. This was done at the outset of the rollout of cellular networks. It's as clear as plaintext to them and black hats.
@DrexSux
@DrexSux 8 ай бұрын
You're not using it to save lives or stop terrorism, you're using it to stalk your ex. The government has bodies that literally audit and make sure that spying powers aren't abused too, they don't just have access to do whatever the fuck they want. Stop spreading your ignorance.
@ChristopherJamesGowett
@ChristopherJamesGowett 8 ай бұрын
ACTUALLY XDDDDDD
@c0rnch1p
@c0rnch1p 7 ай бұрын
And service providers
@3amshenanigans157
@3amshenanigans157 4 ай бұрын
Fun fact: You didn't searched for this
@wcarthurii
@wcarthurii 2 ай бұрын
Truth.
@00ruy00
@00ruy00 2 ай бұрын
Indeed. An example of KZbin algorithm at work
@danhenley977
@danhenley977 2 ай бұрын
For you page
@BINX-RR
@BINX-RR Ай бұрын
Sassyyy maaaaate!
@LuluZia2
@LuluZia2 Ай бұрын
Algorithm style search lmao.
@thebitterbeginning
@thebitterbeginning 8 ай бұрын
I love how governments declare it highly illegal to intercept private internet traffic, yet their violation of that law is a MUST, a requirement. We are pets, we are their property, we are owned.
@elfnetdesigns702
@elfnetdesigns702 8 ай бұрын
Governments that get to big tend to have "rules for thee but not for me" based policies..
@Krischi6
@Krischi6 8 ай бұрын
wtf are you talking? I pay taxes to be protected. Don't use the services if you are against it and shut up.
@billyzee261
@billyzee261 8 ай бұрын
@@elfnetdesigns702 and they have been working on 'effective' ways to reduce the number of 'pets'. Surviving pets, including the enforcers will become slaves. Many will not see this until it is too late.
@Username-2
@Username-2 8 ай бұрын
Have to keep the tax payers “safe.”
@johndoe1274
@johndoe1274 8 ай бұрын
@@billyzee261 what the hell are you talking about
@HeardItOnTheX
@HeardItOnTheX 4 ай бұрын
Studied the video to find out whether or not she actually was cheating on me, ended up getting headhunted for a cyber security role. Thanks dude. Thumbs up.
@GG-td5gt
@GG-td5gt 4 ай бұрын
This Is Crazy 😂😂😂
@anon88091
@anon88091 4 ай бұрын
so did you find out? was she cheating on you?
@shinymew2887
@shinymew2887 4 ай бұрын
@@anon88091of course she was, it’s 2024.
@HeardItOnTheX
@HeardItOnTheX 4 ай бұрын
@@anon88091 As it turned out, I was cheating on her.
@PenguinsAreColdish
@PenguinsAreColdish 4 ай бұрын
@@anon88091it’s made up bro
@kebman
@kebman 8 ай бұрын
Funny story from Norway. A newspaper, Aftenposten, found IMSI catchers all around Oslo, the capital of Norway. They started following the case, and eventually called up the security police. And suddenly they stopped writing more articles about it.
@jonathanbarkins8480
@jonathanbarkins8480 8 ай бұрын
The story of every government ever in a nutshell
@KOOBA2137
@KOOBA2137 8 ай бұрын
can you share more info about it? like articles or something
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Just do a google search for commercial GSM interceptors... There are hundreds of these devices on the market available to governments, SIGINT agencies, law enforcement etc. All for the "greater good", of course. Lol
@kebman
@kebman 8 ай бұрын
@@KOOBA2137I think the link to Aftenposten got snipped... But just google IMSI Catcher and Aftenposten and get Google Translate ready.
@godlia_
@godlia_ 8 ай бұрын
Var det staten som sto bak det?
@oaklyfoundation
@oaklyfoundation 5 ай бұрын
I'm not sure why you say that this is boring content, if you actually wanna learn something this is the content that's needed, I'm not here for tiktok speed content. I really appricate this type of content it's really good.
@RobVK8FOES
@RobVK8FOES 5 ай бұрын
It is very heart-warming to hear that there are still people out there who have the ability to concentrate and focus on a video with a length of greater than 34 seconds!
@jaydenwhitmore7756
@jaydenwhitmore7756 4 ай бұрын
@@RobVK8FOES there are lots more than you think! I was fascinated by the number-cracking while using the xor script. Makes me wanna check out the source code.
@Daloshka
@Daloshka 4 ай бұрын
​@RobVK8FOES we are here, just share your content
@chinBTT
@chinBTT 4 ай бұрын
@@RobVK8FOES I have the ability, im just dumb
@BoxHillAbo
@BoxHillAbo 4 ай бұрын
@@chinBTT😂😂
@martin_santos
@martin_santos 8 ай бұрын
Crazy how hackers are capable of this possessing this much knowledge and coding jargon in the hacking/cracking repertoire. Not only is it interesting but it really is a testament to software skill when it comes to using a computer. Great and informative stuff, hope to see more vids like this!
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Hi, I definitely do not consider myself to be a 'hacker'. I just enjoy testing out already established hacking attacks against RF communication systems. Thanks for the positive feedback about this video :)
@ShaferHart
@ShaferHart 8 ай бұрын
The NSA made it easy to do this because they wanted it to be easy for them to do as well. Cellular network standards could've been stronger but they weakened them on purpose.
@heinrich6294
@heinrich6294 8 ай бұрын
​@@RobVK8FOESI think most people consider hackers as those kids who are sitting 24/7 at their basement xD
@wasd3108
@wasd3108 8 ай бұрын
skill, or knowledge?
@kamiyal
@kamiyal 8 ай бұрын
it's only like .5% of software geeks who can do this shit. you have to really love it cause like he mentions, it's fucking boring if you don't. I'm more into distributed systems and computer vision and just puke when i watch videos like this.
@DDBAA24
@DDBAA24 Жыл бұрын
I've been waiting for a channel like this for a couple years.. I bought a SDR and I couldn't find a way to learn beyond basics that held my interest. We're there. Thanks.
@RobVK8FOES
@RobVK8FOES Жыл бұрын
Hi, thanks for the feedback! I was in the same predicament that you were, I bought a HackRF and an RTL-SDR Blog V3. Never evolved to anything beside HF and analog VHF/UHF listening. I slowly learned that these things were about 0.0000025% of all the stuff SDR could do. I've never looked back!
@MastermindAtWork
@MastermindAtWork 9 ай бұрын
This video is the reason why text and call encryption formats should be standard on all devices by default. SMS is a transparent messaging system and works with all devices with a cellular network but it's too transparent since anybody can look and sniff out those messages and calls through methods like this
@RobVK8FOES
@RobVK8FOES 9 ай бұрын
2G was conceived all the way back in the late 1980's I believe. When computing power was minuscule compared to today, and everyone thought that 64-bit key length for encryption would be future proof. Oh how they were wrong! Luckily, ETSI/3GPP learnt their lessons from the hilariously broken 2G standard, and ensured that 3G, 4G and 5G did not suffer from these security issues like their predecessor did. They all have 128-bit key lengths for their encryption algorithm and to the best of my knowledge, no practical attacks against their ciphering functions have been publicly released. 4G/LTE with VoLTE enabled, or 5G/NR with VoNR are the best options for mobile security (in my opinion). Without VoLTE/VoNR, 4G and 5G networks commonly fall back to 2G for the handling of calls and SMS. Very dangerous!
@daomingjin
@daomingjin 8 ай бұрын
you should be using Private Key encryption on your SMS/Text/IMs and you share the decryption key with people you want to communicate with. That's the only way to have secure communication.
@MastermindAtWork
@MastermindAtWork 8 ай бұрын
@@daomingjin I'm pretty sure your average joe doesn't understand what that is nor know what messaging/email services support that. That's why I saying e2ee should be default in standard messaging apps similar to iMessage, Google Messages* *Some devices aren't supported.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
@daomingjin The safest way to secure your private communications and data is to just not use a mobile phone at all.... Sad that it has to be that way, since modern society is so reliant on them now...
@MastermindAtWork
@MastermindAtWork 8 ай бұрын
@@RobVK8FOES Yeah, cause most cell tower carriers track all the communications when turned on. There is a reason why law enforcement use tactics like Cell Triangulation and or get a warrant for phone records with the all the metadata included.
@sirdilly
@sirdilly 6 ай бұрын
Outstanding. I'll have to sit down and watch it again, thanks for the educational demonstration. I actually sat out to get serious about my pentesting again, and wanted today to be the day it starts. Fun and knowledgeable vid to watch. Subbed and liked the vid.
@SRG-Learn-Code
@SRG-Learn-Code 5 ай бұрын
Really interesting, I assumed this kind of communications weren't private just for the reason that many people must have studied and tried to decoded for years. Watching the workflow is very educative. Thanks for sharing.
@mully89
@mully89 11 ай бұрын
That's great, just found your channel really interesting content. You make a great tutor, thanks for sharing. Still a bit Complex for me but I'm trying to learn!
@RobVK8FOES
@RobVK8FOES 11 ай бұрын
Hi, thanks for the feedback on my videos. I am glad you find my content interesting, I enjoy making it also!
@SleazyRoseWalker
@SleazyRoseWalker 5 ай бұрын
I don't understand any of this, but still i find it highly fascinating. To me this is like looking into a bizarre realm where my understanding of what i see is nil
@voodoo5191
@voodoo5191 8 ай бұрын
I understand absolutely nothing but I'm super glad I've found your channel. The stuff you're doing is quite interesting. How do you even gather the knowledge for this kinda stuff though?
@jaxorgate
@jaxorgate 8 ай бұрын
maybe look into cybersecurity for beginners, then go from there. or take a class.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
@voodoo5191 I don't work in cyber security, nor have I ever had a job in information technology. Utilizing web search engines and reading the readme file of software tools really helps. As does some rudimentary skills in operating Linux operating systems. Send me and email to vk8foes@gmail.com and I will send you some resources ;)
@IrrationalDelusion
@IrrationalDelusion 7 ай бұрын
@@RobVK8FOESCuriosity, time and internet 💎
@ashrimpcouldnotdothis
@ashrimpcouldnotdothis 5 ай бұрын
youtube is recommending videos to me that'd put me on a list now
@RobVK8FOES
@RobVK8FOES 5 ай бұрын
How do you know if this channel is a honeypot, or not? ;)
@kormannn1
@kormannn1 8 ай бұрын
30:25 I heard the knock-knock sounds. Glad they're so polite to let you finish this video for extra five minutes.
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
They are letting me use the prison computer right now, I just want to say thanks for watching!
@PW-72648
@PW-72648 9 ай бұрын
I just simply wanted to say I was amazed you pretty much responded to all of people in the comments 😊🎉. I'll deep dive into vid later, thanks!
@RobVK8FOES
@RobVK8FOES 9 ай бұрын
Hi, thanks for your comment. I hope you enjoy the video!
@Nex-ky9uy
@Nex-ky9uy 2 ай бұрын
You have no idea how much I , as a professional cybersecurity appreciate these long videos. Please make more ❤️❤️❤️❤️
@kuhafiq4928
@kuhafiq4928 7 ай бұрын
This is really good example how are we not really secure in the outside world. Thank you! You are really great.
@RobVK8FOES
@RobVK8FOES 6 ай бұрын
Thanks for watching, dude! Glad you enjoyed it!
@DavidStringham
@DavidStringham 7 ай бұрын
It's nice that you provide the capture file seeing as GSM no longer exists in the US.
@RobVK8FOES
@RobVK8FOES 6 ай бұрын
You are very welcome. GSM has also been switched off in Australia as of 2023. The only way I can play around with this stuff is with these files that others generously uploaded.
@SooSmokie
@SooSmokie 4 ай бұрын
GSM absolutely still exists and is functional and still used in the US.
@RobVK8FOES
@RobVK8FOES 4 ай бұрын
@SooSmokie Thank you for this info. I don't know what to believe. I read online that 2G is unequivocally switched off in the US, but I see countless individuals online reporting that some cellular providers still operate GSM networks...
@jamesrustle7536
@jamesrustle7536 28 күн бұрын
@@RobVK8FOES they do
@helloiamfocus
@helloiamfocus 4 ай бұрын
i did enjoy watching this video, i did understand not a single thing u did, but thanks alot for the calm tutorial.
@Pseudonaym
@Pseudonaym 8 ай бұрын
10/10. Highly recommended. Writing this whilst on Death Row. Worked a charm.
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
Are you able to appeal your sentence?!?!
@JustAPersonWhoComments
@JustAPersonWhoComments 7 ай бұрын
This guy's enthusiasm for cautionary tales is unmatched
@bobnspace
@bobnspace 8 ай бұрын
Great tutorial! The food isn't what I expected but my roommate looks kinda friendly, I need to write this really quick before my free-time on this computer runs out bye
@oldpain7625
@oldpain7625 9 ай бұрын
Great video! Learned a lot in a little time!
@RobVK8FOES
@RobVK8FOES 9 ай бұрын
Hi, I am glad you found my video helpful!
@mikehunthunt8269
@mikehunthunt8269 8 ай бұрын
Slowly but surely we can work our way to the death sentence with just a parking ticket. We just need to have this video in our youtube history
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Society does seem to be heading that way...
@mojotmn
@mojotmn 8 ай бұрын
I was expecting FBI craking your door open at the end of the video :)
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Maybe next time?
@DrexSux
@DrexSux 8 ай бұрын
Strange placement for a smile emote
@JCarey1988
@JCarey1988 7 ай бұрын
2G is old as sh!t and being phased out wherever possible. I wouldn't even post a video of 3/4/5G cracking on KZbin if I could do it. To make a comparison it's the phone equivalent of WEP wifi networks - old and already broken to hell and back by numerous parties. Versus a video that showed step by step with tools to do so, how to break WPA-E ("enterprise" wifi) or the very new WPA-3. That would definitely get you a black-suit visit.
@Yellow-lx8dj
@Yellow-lx8dj 4 ай бұрын
man ...
@omarjimenezromero3463
@omarjimenezromero3463 Ай бұрын
@@JCarey1988 man you can break a wep nowadays with a potato phone and a dictionary XD
@johnmiller4750
@johnmiller4750 4 ай бұрын
Cheers for that now I'm new to the encrypted gsm mode I used to capture comms for our data link back in the early 90's
@rngsus4002
@rngsus4002 8 ай бұрын
Thanks for taking the time to make this
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Thanks for watching, dude!
@will_irs
@will_irs 8 ай бұрын
Very impressive, well done sir. Hats off to you.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Thank you very much!
@griffonboi
@griffonboi Жыл бұрын
Very nice tutorial but I wouldn't describe this as real-time lol Also we do still have 2G as GSM-R that's used on Melbourne and Sydney's rail networks. But I wouldn't even think about cracking those since it's critical infrastructure and could carry a much harsher sentence :)
@RobVK8FOES
@RobVK8FOES Жыл бұрын
Well, you don't intercept GSM communications in real time. You capture and transcribe the GSM radio waves to a file on a PC, and then you demodulate, decrypt and decode them later with the software tools. I meant to say that the cracking of the capture file was in real-time, though it does take a while when doing it manually! Wow, I had no idea that GSM-R was still in use in Sydney and Melbourne! That's awesome! I wish we had something like that up here in the Territory :( It's hard to play around with GSM when there is no 2G networks anymore.
@drbkd1144
@drbkd1144 8 ай бұрын
good that most of people no longer use 2G; imagine seeing your internet connection drop to 2g and below xD great video, taught me a lot how easily these could be done in real time; and yes it is possible to do these in real time; just a few lines of code and voila
@technofi2554
@technofi2554 8 ай бұрын
Aus Rail network already got a bit of a wake up call last year due to their horrible security 😂 Not sure if they actually fixed anything they were told about or not. O well, You can lead a horse to water but accountants will always complain about the price of security upgrades.
@dimka11ggg
@dimka11ggg 8 ай бұрын
2G is still in use everywhere, at least in Russia. 3G, 4G have small base station coverage that bad for rural areas
@drbkd1144
@drbkd1144 8 ай бұрын
@@dimka11ggg no wayyy
@Erinthegato
@Erinthegato 5 ай бұрын
Wow I love that this showed up on my new KZbin account. I used to watch a lot of cybersecurity videos back when I was studying for my security+ cert(I passed☺️)
@isaacmackey1406
@isaacmackey1406 2 ай бұрын
"I've done little to no preparation for this video" somehow this is reassuring to hear at the start of a video
@kotopiu4694
@kotopiu4694 8 ай бұрын
idk what the fuck is going on but this dude seems to know what hes talking about so imma like the video.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
I Appreciate it! Thanks for watching!
@raulgalets
@raulgalets 9 ай бұрын
this officer, this is the video I watched
@RobVK8FOES
@RobVK8FOES 9 ай бұрын
Put your hands behind your back!
@JohnJoseph26
@JohnJoseph26 4 ай бұрын
WOW. Brilliant brother! Absolutely fùcking phenomenal.
@RobVK8FOES
@RobVK8FOES 4 ай бұрын
You are very welcome. Thanks for watching!
@Thelxiee
@Thelxiee 7 ай бұрын
What's the best way to gain you knowledge? What can we do to improve in programming and everything? Amazing video although I didn't understand much!
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
Hi, could you please watch this video from the timestamp: kzbin.info/www/bejne/jpWwmmCDbcp1gLM
@purplemg1812
@purplemg1812 4 ай бұрын
"this may not be very interesting to watch" Broski, I came here to see shit get done, and get done shit did, more than happy!
@yuzu494
@yuzu494 8 ай бұрын
Hackers in movies: im in
@MVPMTKING
@MVPMTKING 8 ай бұрын
Oh shit he said the thing
@Xploited
@Xploited 4 ай бұрын
This was very interesting content. Great work! The only ones thinking this content is boring are people that don't understand it or want to understand it and therefore shouldn't be viewing this video in the first place. They're the ones looking to have the answer handed to them without putting in the work. Which anyone who truly shares interest and passion for this type of knowledge, knows that those types of people wont make it far. Nor will the community surrounding this information be willing to help them either. Great channel by the way.
@deadshxll
@deadshxll 4 ай бұрын
this is awesome, thank you for sharing this!
@-C4-
@-C4- 8 ай бұрын
Thank you for the tutorial I needed this
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
You’re welcome 😊
@colly6022
@colly6022 8 ай бұрын
Everyone talks about sniffing packets, but no one ever discloses what they smell like...
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
I can never smell a packet, because I keep dropping them!
@user-xj8br1mb4x
@user-xj8br1mb4x 2 ай бұрын
Expected a swat intrigue by the end of the video!! 🙃
@ButHehe
@ButHehe 4 ай бұрын
I didn't understand anything that he showed and explained, but it was a great video!
@jacobanderson2669
@jacobanderson2669 4 ай бұрын
Get arrested in under just 1 minute by punching a police officer.
@mehmetemincicek3266
@mehmetemincicek3266 8 ай бұрын
One of the fastest ways to get arrested!! Thanks for the tutorial.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Thanks for watching mate!
@rory1653
@rory1653 4 ай бұрын
Brilliant bro - great video
@LukeValentino
@LukeValentino 7 ай бұрын
Well done! Thanks for sharing!
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
You are very welcome!
@adamjutras7024
@adamjutras7024 8 ай бұрын
Tell that to the government. As soon as they start following the rules they set for everyone else I'll start respecting their authority.
@assmonkey9202
@assmonkey9202 8 ай бұрын
On jah
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
They pass one law prohibiting the citizens to do, it and the next law they pass is them excluding themselves from it...
@adamjutras7024
@adamjutras7024 8 ай бұрын
@@RobVK8FOES as far as I'm concerned their actions excuse any victimless "crime" and most non-violent crimes. Leaders lead by example and between lobbying (bribery that devalues the advantage of democracy) and the unlawful spying they put corporations up to they have no moral ground to stand on. I'm so angry that I'd sooner donate to Putin then support Ukraine. ANYTHING to keep the alphabet agencies of the five eyes busy.
@cx6894
@cx6894 8 ай бұрын
Jokes on you I'm watching from the ocean, I'm free from such laws
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Diplomatic immunity!
@kostaftp
@kostaftp 4 ай бұрын
Pirate! 😊
@pa32779
@pa32779 Ай бұрын
My network security lecturer mentioned the possibilities of cracking Cellular networks but the AFP i forgot what he said, they use a prepaid tracking software to crack and intercept your connection. Well said and explained
@Antin0myAbsoluti0n
@Antin0myAbsoluti0n 4 ай бұрын
Thank you! I love learning.
@RobVK8FOES
@RobVK8FOES 4 ай бұрын
Thanks for watching!
@chrisjordan7592
@chrisjordan7592 Ай бұрын
You'd think the calculations would be factored in automatically, and all these "target " steps programmed in, knowing what step comes next, and what you end up with is your phone conversation in text. (Like you said probably exist). Let's stay with phone cloning 😂. Great video!❤❤
@RobVK8FOES
@RobVK8FOES Ай бұрын
Hi. This entire process can be automated, but the developers of the method and hacking tools deliberately left it convoluted and complex in order to thwart script kiddies attempts at using it. Thanks for watching!
@chrisjordan7592
@chrisjordan7592 Ай бұрын
@@RobVK8FOES skript kiddies 🤣. So true. Thanks for the reply 👍
@McaCasey
@McaCasey 8 ай бұрын
Welcome to The Watchlist gentlemen
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
I'm definitely on some kind of list!
@momo23461
@momo23461 8 ай бұрын
IM ON THE SPECTRUM
@xbiohazardx7312
@xbiohazardx7312 8 ай бұрын
Arrest me officer
@jimothyus
@jimothyus 8 ай бұрын
Very cool video. I only watched 29 minutes of it hopefully im safe from jail...
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Can confirm. You won't get arrested until after 29 min 59 sec.
@heyyhi993
@heyyhi993 4 ай бұрын
This is VERY entertaining to watch
@-someone-.
@-someone-. 5 ай бұрын
Well done! I subbed 👍
@ddddsasawwfdwafaw
@ddddsasawwfdwafaw 8 ай бұрын
I like your funny words wizard man
@BillAnt
@BillAnt 9 ай бұрын
What about decrypting 4G and LTE traffic, is that even possible with amateur equipment? The biggest threat I see if capturing 2FA codes but even that's unlikely unless you're within the same physical cell site as the target. There have been some attacks using SS7 signaling which worked from anywhere in the world as long as the IMSI was known. ;)
@RobVK8FOES
@RobVK8FOES 9 ай бұрын
Hi. At this time, it is not possible to decrypt 4G/LTE traffic because there is no publicly known attacks/exploits against the 128-bit EPS Encryption Algorithm yet. Same for 3G UMTS and 5G NR. There probably won't be any vulnerabilities for these for a very very long time (maybe not in our lifetimes) because ETSI and 3GPP learnt their lessons from the laughably broken 2G GSM standard, these systems are VERY secure. Maybe 3G is slightly broken because of SS7 exploits, but 4G and 5G now use the 'Diameter' protocol. There is probably some theoretical 4G, 5G and Diameter attacks from academia, but to my knowledge, nothing is publicly known. It should always be assumed that no matter what cellular communication generation you are using, your data is NEVER safe. The best way to secure your digital communications is to not use a mobile phone at all. Thanks for commenting.
@BillAnt
@BillAnt 9 ай бұрын
​@@RobVK8FOES - Even if some 3G vulnerability is found in the near future, by the that time 3G is already outdated are seldom used, maybe in some 3rd world countries. lol Since 4G/5G is already very secure, and fast enough for use with a real time secondary encryption app, which should provide another layer of privacy. Of course law enforcement has access at the switch level, that's why encryption apps are useful for privacy.
@RobVK8FOES
@RobVK8FOES 9 ай бұрын
Yes, that is correct, there are some countries in the world who have retired 2G and 3G already. They purely rely on 4G and 5G, which I think is the positive way forward in terms of cellular data privacy. One thing that does worry me though, is countries whose cellular providers use 4G / LTE and don't implement VoLTE. These networks without Voice-Over-LTE more often than not fall back to 2G / GSM for the handling of voice calls and SMS messages. Very dangerous considering 2FA and banking OTP's are regularly transmitted over SMS!
@ThermalWorld_
@ThermalWorld_ 9 ай бұрын
​@@RobVK8FOES4G can't be decrypt until you buy a Chinese fake carrier for 9k that can decrypt everything for you, even load malware directly on the phone victim ;)
@BillAnt
@BillAnt 9 ай бұрын
​@@RobVK8FOES - I've been in the phone repair business since 1999, and I've seen phones with cloned IMEI/MEID numbers on the old 2G/3G CDMA networks (Verizon here in the US). Interestingly when the active phone is receiving an SMS, the other inactive one is also receiving the same SMS at the same time. In this case, both were sitting on a desk next to each other, basically served by the same tower. Not sure what would happen if locked onto different towers, but can't test it since the old 2G/3G CDMA network has been phased out at the end of 2022. Thankfully this is not happening on 4G/5G networks.
@fridofridolin
@fridofridolin 7 ай бұрын
Just one word: Subbed! :)
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
Thanks for the sub, mate!
@Darkkorex
@Darkkorex 4 ай бұрын
Thank you. Great explanation.
@grumpent
@grumpent 8 ай бұрын
You owe my grandmother a new door. The fbi had kicked it in to get me from her basement.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Sorry about the door, mate! :P
@John-McAfee
@John-McAfee 8 ай бұрын
Messaging from my jail cell to confirm that this is actually legit.
@dmx0410
@dmx0410 8 ай бұрын
wait so you didn't pass away?!? hehe
@RobVK8FOES
@RobVK8FOES 6 ай бұрын
@John-McAfee Can you please re-confirm that you are not suicidal? We're worried that you will get epsteined again.
@John-McAfee
@John-McAfee 6 ай бұрын
@@RobVK8FOESI am not suicidal
@gunnergun2077
@gunnergun2077 6 ай бұрын
great job mate!!!!Can you please show us how to find were all stingrays are located???
@VivoJefindo-id4cj
@VivoJefindo-id4cj 2 ай бұрын
Best channel, real i learn from you
@RobVK8FOES
@RobVK8FOES 2 ай бұрын
Thanks for the positive feedback!
@slowedversion6393
@slowedversion6393 6 ай бұрын
Me at 2 am watching and listening to a load of shit I’m not able to comprehend or understand in any way but I’m trying lmaooo
@RobVK8FOES
@RobVK8FOES 6 ай бұрын
Nothing better than a late-night KZbin sesh watching a random Aussie feller doing obscure RF hacking tutorials, am I right?
@user-um9te4yn9g
@user-um9te4yn9g 7 ай бұрын
Instructions unclear, i now have a reverse shell in an fbi agents computer.
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
Maybe you can google yourself in the shell to find out if the Five-Eyes are spying on you?
@mirkfish8114
@mirkfish8114 7 ай бұрын
Man i dont even know why is this recommended to me but fine i will watch and learn
@RobVK8FOES
@RobVK8FOES 6 ай бұрын
The algorithm was promoting this video heavy for quite some time. It seems to have died off now. Sorry if this video wasn't to your tastes.
@smc-susan
@smc-susan 4 ай бұрын
i really didn't know anything about GSM(2G) and cracking could occur and... wow decrypting process is amazing it's like in the dark place, without any light, finding a way to unlock the secret door thanks for uploading this video and thanks again for making my curiocity about privacy
@RobVK8FOES
@RobVK8FOES 2 ай бұрын
This method is very old at this point in time, and most 2G network operators have patched the exploit.... But I am guessing there is a few smaller carriers exist in that world that haven't upgraded their equipment to patch this vulnerability ;)
@smc-susan
@smc-susan 2 ай бұрын
@RobVK8FOES oh that's quite surprising that it didn't upgraded so long 2G conversation nowadays is used in military right? That makes even nonsense (i'm not sure about this one) And thankyou for answering
@S14M07
@S14M07 8 ай бұрын
I don’t know jack shit about coding or computer shit, but this was entertaining as hell!
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Thanks for watching, mate! Glad you enjoyed it!
@zazugee
@zazugee Жыл бұрын
i got it to work, but for from the 2000 imsi codes there i coudn't find mine, even tho i made sure using a cell id app on my phone to know what frequency and the cell id it connected to
@RobVK8FOES
@RobVK8FOES Жыл бұрын
Did you take note of the TMSI value (not IMSI) that your mobile phone was provided by the base-station at the time you recorded the data? If so, in Wireshark you can click on the Edit menu -> Find Packet. Under 'find by', select 'string' and then enter your TMSI value into the search box (in the format of 0x1234abcd). That should show you all the packets relating to your mobile phone. Try it on the BCCH, and SDCCH8 channels. Good luck!
@Xendrius
@Xendrius 2 ай бұрын
Nice one adam jensen.
@user-jap84tlv24sq
@user-jap84tlv24sq 6 ай бұрын
Another watchlist i'd like to be part of
@pajeetsingh
@pajeetsingh 8 ай бұрын
It's illegal, while the Five Eyes consortium does it everyday.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Rules for thee and not for me...
@WilliamLDeRieuxIV
@WilliamLDeRieuxIV 9 ай бұрын
@10:53 My takeaway it that it's basically using a known cleartext attack to expose the encryption key. You compare the difference between the plaintext of a known frame with one that is suspected to be the encrypted version (it only works because the frame is repeated at fixed intervals and are identical)-- the difference would expose the encryption key. So using an unpredictable repeat interval (ie. not a fixed one) might be enough to mitigate this type of attack.
@RobVK8FOES
@RobVK8FOES 9 ай бұрын
Hi. Yes, that is correct. It is a known plaintext attack. This method of GSM cracking is very old now, so most modern production 2G GSM networks I have played around with implemented randomisation of the known-plaintext and the ciphertext (after encryption was turned on). This, of course, will render this method obsolete. But there is still a few real GSM networks out there which haven't turned on these mitigations, yet.
@Slickthenick
@Slickthenick 5 ай бұрын
Thank you for giving me a place to stay
@tombanditnook9230
@tombanditnook9230 8 ай бұрын
With that title I was convinced you were gonna edit in a knock at your door right when the video ends lol.
@24thCenturyBuff
@24thCenturyBuff 5 ай бұрын
Rob: Don't ever do this! Gov't: Ya, what he said. Also Gov't: Better tap this guy's whole life now.
@crylune
@crylune 4 ай бұрын
This is why I tell privacy freaks that if you own a SIM card you’re screwed anyway
@RobVK8FOES
@RobVK8FOES 4 ай бұрын
Exactly! Using VPN's, proxy's, end to end encrypted VOIP/messaging apps doesn't mean anything once your voice and SMS data begins to flow over the Cellular Network Operators infrastructure. It's in their hands from that point!
@LakeE.
@LakeE. 4 ай бұрын
Great video!
@ciyusmiapah7071
@ciyusmiapah7071 Жыл бұрын
Hello, thanks for the video, for the rainbow table how is the storage that we need to provide? second question, i know internet speed is very variant, but may i know how long you need to download these files?
@RobVK8FOES
@RobVK8FOES Жыл бұрын
Hi, thanks for watching! You will need a storage device of at least 1.6 Terabytes. And you need two separate HDD's for setting up Kraken and the rainbow tables. The first HDD is the 'source' drive that contains the downloaded ***.dlt files, and the second HDD is the 'destination' drive that will have the rainbow table ***.dlt files written to it in RAW format. If you are following The Crazy Danish Hackers tutorial, he doesn't make it clear enough that two HDD's are required. Here in Australia, we have pretty poor internet speeds on average. On my 100mbps fiber connection, I remember it taking about 3 or 4 days to download 1.6 TB. I lost all my downloaded ***.dlt files twice following The Crazy Danish Hackers tutorial. So in the end, I ended up purchasing the HackerWarehouse.com A5/1 rainbow table HDD because I think my ISP was getting mad at my excess data usage....
@ciyusmiapah7071
@ciyusmiapah7071 Жыл бұрын
@@RobVK8FOES Hello Rob, thank you very much for your details answer, and you are right im aware of the Crazy Da** channel not share that details surely was gap before, so it’s quitr challenge to provide storage that nearly 2Tb for some peoples they mighr not have this resource storage, other wise spend some more money to buy it, in your country the challenges are no 2G (and also the unlawfully act) in other place they still have 2G but using the A5/3 which is more difficult to decrypt, thanks again i will just check the link that you provided 🙏🏻🙏🏻
@RobVK8FOES
@RobVK8FOES Жыл бұрын
My Kraken setup isn't the best, I was just lucky I had an old working PC laying around and an unused 3.5TB NAS drive from another project that I lost interest in. If you purchase the HackerWarehouse.com HDD, you have a source drive ready to go, then you just need a destination drive to write the rainbow tables to. Money is definitely the hurdle getting into amateur cryptography as a hobby! Recently, I was made aware by someone on the east coast of Australia that GSM-R is used in the larger cities on the railway system. But we have nothing like here where I live, unfortunately :(
@ciyusmiapah7071
@ciyusmiapah7071 Жыл бұрын
@@RobVK8FOES thank you Rob 🙏🏻
@chevetebranco3351
@chevetebranco3351 10 ай бұрын
@@RobVK8FOES onde baixo as rainbow tables
@TheSkepticSkwerl
@TheSkepticSkwerl 7 ай бұрын
Listening to air waves. And cracking it will never land you in jail. They can't know you did that. Period. Especially with an offline device.
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
Of course, but I still need to warn people not to do it to keep the KZbin censors happy....
@RatKingTerry
@RatKingTerry 5 ай бұрын
Clueless surely it wont
@TheSkepticSkwerl
@TheSkepticSkwerl 5 ай бұрын
@@RatKingTerry it's 100% impossible to track a passive listener. Using gained knowledge later is where the risk is.
@RobVK8FOES
@RobVK8FOES 5 ай бұрын
Australia law prohibits the installation and operation of a telecommunications interception device. Of course, it is common knowledge that the passive reception of a wireless signal can't be tracked. However, I am guessing the only reason my KZbin channel hasn't been nuked yet is because of the disclaimers I give. If I say in the opening remarks of my video "Hey guys, today I am going to show you how to listen to your girlfriends 2G phone calls...." KZbin would nuke my channel in a heartbeat.
@st1cky953
@st1cky953 8 ай бұрын
How do they want to track you down if you receive GSM (Or similar radio waves) and then decrypt it? Isn't it almost impossible because you only receive but don't send anything? As long as you don't use antennas that have very high power consumption and long range distance, I think it will be difficult to find out that you are doing something like that. I can still remember the case where they caught the hacker with a Stingray and he did everything possible to get it declared illegal in court because receiving and analyzing private data was illegal.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Of course, passive receiving of GSM-modulated radio waves can't be tracked. But due to the nature of intercepting telecommunications being very contentious from a legal standpoint, I have to give these disclaimers...
@qntkallure
@qntkallure 7 ай бұрын
@@RobVK8FOES so its only illegal if they catch you which they cant really catch you if you dont send anything
@lmaoroflcopter
@lmaoroflcopter 7 ай бұрын
Just because you can get away with murder, doesn't make it legal. 😅
@Gr8Poseidon
@Gr8Poseidon 6 ай бұрын
😂 he’s covering himself with the disclaimer🤦🏾‍♂️
@svampebob007
@svampebob007 5 ай бұрын
You would not be roaming around the city passively listening if you were to do this, you would rather set up your own antenna to avoid wasting a lot of time.
@nimaonta1725
@nimaonta1725 5 ай бұрын
Great Video!
@pr0pancakes150
@pr0pancakes150 2 ай бұрын
By the title I was half expecting the FBI to bust in at anytime during the video.
@wojciechsobiesiak
@wojciechsobiesiak 8 ай бұрын
Well written code cannot be read by people that are not allowed to do it. Size and time are factors that make it impossible. And If You think You obtain access to some data not commonly avaible for all, You should ask what is "why this happend".
@sudowtf
@sudowtf 7 ай бұрын
The only way to make your code difficult/impossible to read is by obfuscating it or encrypting it. If someone possesses the decryption key or wants to de-obfuscate your code, they can read it. Hell, they might even try to crack your code using brute force techniques. The fuck are you on about saying that we’ll written code cannot be read by people that are not allowed to read it? It’s not typed in Minecraft Enchanting runes.
@wojciechsobiesiak
@wojciechsobiesiak 7 ай бұрын
@@sudowtf It's ok with to make public test if You are so self confident. My today task I planned is to (plan minimum) is to wriat windows bat file to create C code then to compile it to create html file to be displayed by web browser sth like hello world OR maybe add creating not html file but php that will create bat file - with onlu CMD xD
@Gameplayer55055
@Gameplayer55055 9 ай бұрын
That's how you appear in the cell messing with other cells
@csifisz7271
@csifisz7271 8 ай бұрын
i have no idea what i just watched but i enojoyed every second of it so hell yeah
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
Thanks for watching, mate!
@abhigyanshree5676
@abhigyanshree5676 4 ай бұрын
Title: How to get Arrested in 30min. Intro: This video is only for educational purpose.
@fmdev1239
@fmdev1239 9 ай бұрын
18:06 A bash script with sed would be enough to automate this manual section.
@RobVK8FOES
@RobVK8FOES 9 ай бұрын
Hi, I did make a bash script for brute forcing LAPDm packets (it requires slight editing of the input and copying and pasting) as shown in this video: m.kzbin.info/www/bejne/jYq7iGl7jMeDmq8 Not as efficient as it could be though! I wish I knew more about Bash scripting!
@renatop.4324
@renatop.4324 Ай бұрын
I found it so interesting, for some reason. But I understand nothing on what was done and how. Could someone please explain it to me? I'm so curious!
@RobVK8FOES
@RobVK8FOES Ай бұрын
Hi. Glad you found this video interesting! What I am doing in this video is basically decrypting 2G mobile phone communications. If you're too young to know what a 2G is, it was the cellular generation before 3G, 4G and 5G. Old people like me used 2G extensively in the 2000's and early 2010's.
@Decomposing_Corpse
@Decomposing_Corpse Ай бұрын
​@@RobVK8FOES >old people like me >looks like 30 yo Btw, Isnt 2G used when you call someone?
@RobVK8FOES
@RobVK8FOES Ай бұрын
@Decomposing_Corpse I am actually in my late 30's! Because this video struck the algorithm gold, I get a lot of normies commenting on this video asking "what is a GSM?" and "what is a 2G?". A lot of zoomers follow my channel, surprisingly! It depends how the cellular network operator configures their network. If they don't enable VoLTE on 4G, or VoNR on 5G, the network will fall back to 2G or 3G for the handling of calls and SMS. Here in Australia, we use VoLTE and VoNR, thank goodness. We switched off our 2G networks in 2017, and we have already begun our 3G switch off in late 2023.
@robins3352
@robins3352 8 ай бұрын
Your a beast... very impressive!
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Thanks for watching!
@lmaoroflcopter
@lmaoroflcopter 7 ай бұрын
Nice. Might have done a similar presentation when exploring this myself a few years back (not public). The demo capture is one thing, then someone may be tempted to go to the effort of standing up a test rig and find that those few remaining providers using GSM use channel hopping along with extra randomisation to mitigate this attack. I would guess that it's rather frustrating to find that bit out, not that I would know of course because that would be illegal against commercial carriers, unless you ran your own base station, which whilst completely possible may not have the same mitigations in place. This is a super fun exercise though if you're into figuring out how things work.
@KennY157
@KennY157 8 ай бұрын
Could this somehow relate to 4G or 5G? Not that it would work in a similar way like what you have shown here, but how much harder is it if you would try intercept and read phonecalls etc. on todays technology standards? Pretty sure there are better safety measures in place, just asking out of curiosity. Thanks for the video, even though i didn't understand alot.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
Hi. To my knowledge, there is no publicly-known way to crack 3G, 4G and 5G encryption at this time. Yes, there may be some theoretical attacks from academic security research published. But as for real-world practical attacks against these mobile communication standards, we are fairly safe for now. 2G/GSM was envisioned in the late 1980's and begun deployment in the 1990's. It was horrendously broken and insecure-by-design. ETSI and the 3GPP (the governing bodies of mobile phone standards) learnt their lessons from 2G and ensured that it's successors were secure enough to be future-proof from these kinds of attacks. Of course, the best way to secure your private cellular data is to just not use a mobile phone at all. It's very sad that it has to be this way, but that is just the nature of the connected world that we live in....
@yakov5776
@yakov5776 8 ай бұрын
@@RobVK8FOES You should look into the Harvest now, decrypt later act. We may think we're safe now but we may not be safe later as quantum computing quickly matures.
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
@yakov5776 Absolutely, I am aware of Harvest Now, Decrypt Later attacks. However, I honestly think that the near-future threat of quantum computers has been overhyped... I am dubious of the practicality of real-world quantum PC's that could brute force a 128-bit key-length cipher in our lifetimes... Maybe companies/governments with insane funding and unlimited resources could achieve it in 50 years or so, but your local script-kiddie down the road? I'm not buying it, for at least a hundred years...
@bmbiz
@bmbiz 8 ай бұрын
@@RobVK8FOES Tricky business, that, predicting the future but I'm with you for the simple reason that when something has a lot of hype it pretty much _never_ lives up to expectations. Case in point, AI. Take a breath, people! 🙄
@defeatSpace
@defeatSpace 8 ай бұрын
Dropping by and saying hello to my FBI agent
@RobVK8FOES
@RobVK8FOES 8 ай бұрын
"FBI subscribed to your channel!"
@user-dz2wi5uo4g
@user-dz2wi5uo4g 7 ай бұрын
This is the best honeypot video ever
@RobVK8FOES
@RobVK8FOES 7 ай бұрын
Maybe I'm a fed? Or maybe I'm not? Who knows....
@Furanku13
@Furanku13 8 ай бұрын
i dont even know why im here, but here i am enjoying my orange while watching.
@RobVK8FOES
@RobVK8FOES 6 ай бұрын
Nothing better than kicking back behind the PC, eating a fresh orange and watching highly complex RF communication hacking videos! Life is good.
Using My Python Skills To Punish Credit Card Scammers
7:13
Engineer Man
Рет қаралды 4,8 МЛН
🍟Best French Fries Homemade #cooking #shorts
00:42
BANKII
Рет қаралды 65 МЛН
Универ. 10 лет спустя - ВСЕ СЕРИИ ПОДРЯД
9:04:59
Комедии 2023
Рет қаралды 1,9 МЛН
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 1,1 МЛН
How do SIM Cards work? - SIMtrace
11:09
LiveOverflow
Рет қаралды 1,8 МЛН
Listening to Phone Calls on Wireshark
1:23
Hackitron
Рет қаралды 7 М.
Cracking Software with Reverse Engineering 😳
8:01
nang
Рет қаралды 1,5 МЛН
Easiest Way to make IMSI Catcher to find your Mobile Phone
13:58
Muhammed Mustaqim
Рет қаралды 23 М.
Remotely Control Any PC with an image?!
12:42
Loi Liang Yang
Рет қаралды 109 М.
14 BANNED GADGETS YOU STILL CAN BUY ON AMAZON
12:17
TechZone
Рет қаралды 10 МЛН
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,1 МЛН
Is this the best OSINT tool out there?!
17:10
stuffy24
Рет қаралды 304 М.
Настоящий детектор , который нужен каждому!
0:16
Ender Пересказы
Рет қаралды 434 М.
One To Three USB Convert
0:42
Edit Zone 1.8M views
Рет қаралды 440 М.
Разряженный iPhone может больше Android
0:34