Category: Uncategorized
-
How to Install a Rogue BTS
A Rogue BTS can be beneficial, here I will show you how to install one and how to configure your network for security research. First, let’s update our system, I will use a Debian Buster for RPI3 with 1G of RAM and a BladeRF xA9. Step 1 – Requirements Build your own rogue GSM Pack…
-
Intercepting and Decrypt SMS Messages
SMS decryption has become a topic of increasing interest in recent years, as individuals and organizations seek to intercept and decode encrypted SMS messages transmitted over GSM networks. Despite the apparent security of these messages, they are often vulnerable to interception and decryption using specialized software-defined radio techniques. To better understand all parameters and technology terminology read my article…