An In-Depth Guide to Mobile Device Forensics.pdf
20.5 MB
An In-Depth Guide to Mobile Device Forensics
GSM . LTE . 5G . IMSI Catchers . SIM Cards . Jammers . iPhone Processor . ADB . Operating System Details . F2FS .
Oxygen Forensics . iCloud . JTAG . SQLite Forensic . Cell Tower . Steganography . Cryptographic Hash . Software Tracking . Smart Televisions ...
📡@hackLabel
GSM . LTE . 5G . IMSI Catchers . SIM Cards . Jammers . iPhone Processor . ADB . Operating System Details . F2FS .
Oxygen Forensics . iCloud . JTAG . SQLite Forensic . Cell Tower . Steganography . Cryptographic Hash . Software Tracking . Smart Televisions ...
📡@hackLabel
👍3
This media is not supported in your browser
VIEW IN TELEGRAM
• Using silent SMS to localize LTE users
• Route to RCE - Dissecting a cheap WiFi repeater
• MojoBox - yet another not so smartlock
projects: https://mandomat.github.io/
📡 t.me/HackLabel
• Route to RCE - Dissecting a cheap WiFi repeater
• MojoBox - yet another not so smartlock
projects: https://mandomat.github.io/
📡 t.me/HackLabel
⚀ Frequency : https://www.worldtimezone.com/gsm.html or https://en.wikipedia.org/wiki/GSM_frequency_bands
⚀ Sdr : https://en.wikipedia.org/wiki/Software-defined_radio
⚀ Sms : https://en.wikipedia.org/wiki/SMS#GSM
⚀ Imsi : https://fr.wikipedia.org/wiki/International_Mobile_Subscriber_Identity
⚀ Cell id : https://en.wikipedia.org/wiki/Cell_ID or https://unwiredlabs.com/
⚀ GSM : https://en.wikipedia.org/wiki/GSM
⚀ Frequency Calculator : https://www.cellmapper.net/arfcn
⚀ GR-GSM : https://github.com/ptrkrysik/gr-gsm
📡 t.me/HackLabel
⚀ Sdr : https://en.wikipedia.org/wiki/Software-defined_radio
⚀ Sms : https://en.wikipedia.org/wiki/SMS#GSM
⚀ Imsi : https://fr.wikipedia.org/wiki/International_Mobile_Subscriber_Identity
⚀ Cell id : https://en.wikipedia.org/wiki/Cell_ID or https://unwiredlabs.com/
⚀ GSM : https://en.wikipedia.org/wiki/GSM
⚀ Frequency Calculator : https://www.cellmapper.net/arfcn
⚀ GR-GSM : https://github.com/ptrkrysik/gr-gsm
📡 t.me/HackLabel
Mobile network hacking All over IP edition
https://deepsec.net/docs/Slides/2019/Mobile_Network_Hacking_Allover-IP_Edition_Luca_Melette_Sina_Yadzanmehr.pdf
📡 t.me/HackLabel
https://deepsec.net/docs/Slides/2019/Mobile_Network_Hacking_Allover-IP_Edition_Luca_Melette_Sina_Yadzanmehr.pdf
📡 t.me/HackLabel
❤🔥3👍2❤1
📡
Photo
Mobile Network Hacking, IP Edition
By Karsten Nohl, Luca Melette & Sina Yazdanmehr
youtube: https://www.youtube.com/watch?v=3XUo7UBn28o
📡 t.me/HackLabel
By Karsten Nohl, Luca Melette & Sina Yazdanmehr
youtube: https://www.youtube.com/watch?v=3XUo7UBn28o
📡 t.me/HackLabel
YouTube
Mobile Network Hacking, IP Edition
By Karsten Nohl, Luca Melette & Sina Yazdanmehr
We explore which protection measures are missing from the mobile network and discuss how to best bring them over from the IT security domain into mobile networks.
Full Abstract & Presentation Materials: …
We explore which protection measures are missing from the mobile network and discuss how to best bring them over from the IT security domain into mobile networks.
Full Abstract & Presentation Materials: …
🔥3👏1
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
This briefing will take an in-depth look at the technical capabilities of mobile attacks that are being leveraged against real targets for the purpose of espionage. We will focus on Pegasus, a lawful intercept product, and the features and exploit chain it used. We will describe how we discovered and tracked the developer’s infrastructure prior to the attack, and how we later caught a sample of the elusive malcode being used against a prominent human rights defender.
youtube: https://www.youtube.com/watch?v=Y6e_ctKqSqM&list=TLPQMDExMTIwMjPFzT6vDSW5Ng&index=2
📡 t.me/HackLabel
This briefing will take an in-depth look at the technical capabilities of mobile attacks that are being leveraged against real targets for the purpose of espionage. We will focus on Pegasus, a lawful intercept product, and the features and exploit chain it used. We will describe how we discovered and tracked the developer’s infrastructure prior to the attack, and how we later caught a sample of the elusive malcode being used against a prominent human rights defender.
youtube: https://www.youtube.com/watch?v=Y6e_ctKqSqM&list=TLPQMDExMTIwMjPFzT6vDSW5Ng&index=2
📡 t.me/HackLabel
YouTube
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks
This briefing will take an in-depth look at the technical capabilities of mobile attacks that are being leveraged against real targets for the purpose of espionage. We will focus on Pegasus, a lawful intercept product, and the features and exploit chain it…
👍1
Android Security & Reverse Engineering YouTube Curriculum
https://github.com/actuator/Android-Security-Exploits-YouTube-Curriculum
https://github.com/actuator/Android-Security-Exploits-YouTube-Curriculum
📡 t.me/HackLabel
👍3
Fake Airplane Mode: A mobile tampering technique to maintain connectivity
Blog: https://www.jamf.com/blog/fake-airplane-mode-a-mobile-tampering-technique-to-maintain-connectivity/
Blog: https://www.jamf.com/blog/fake-airplane-mode-a-mobile-tampering-technique-to-maintain-connectivity/
📡 t.me/HackLabel
❤1👍1
VULNERABILITY WITHIN THE UNISOC BASEBAND OPENS MOBILE PHONES COMMUNICATIONS TO REMOTE HACKER ATTACKS
https://research.checkpoint.com/2022/vulnerability-within-the-unisoc-baseband/
https://research.checkpoint.com/2022/vulnerability-within-the-unisoc-baseband/
📡 t.me/HackLabel
The Android Malware Handbook (2023).pdf
49.8 MB
The Android Malware Handbook
Detection and Analysis by Human
and Machine
Github: https://github.com/android-malware-ml-book/book-content
Detection and Analysis by Human
and Machine
Github: https://github.com/android-malware-ml-book/book-content
📡 t.me/HackLabel
❤🔥1🎅1
SIM Cloning tool
How to use: https://support.mobiledit.com/portal/en/kb/articles/sim-clone
Download
How to use: https://support.mobiledit.com/portal/en/kb/articles/sim-clone
Download
📡 t.me/HackLabel
❤2✍1👍1
Media is too big
VIEW IN TELEGRAM
How do SIM Cards work? - SIMtrace
In this video we use SIMtrace to intercept the communication between the phone and SIM card to understand how that works. This is part 1 in a series introducing mobile security.
youtube: https://www.youtube.com/watch?v=iJFnYBJJiuQ
In this video we use SIMtrace to intercept the communication between the phone and SIM card to understand how that works. This is part 1 in a series introducing mobile security.
youtube: https://www.youtube.com/watch?v=iJFnYBJJiuQ
📡 t.me/HackLabel
❤2👍1
YouTube
SIM Jacking - Security Now 732
Protect Yourself from SIM Jacking
This Week's Stories
• SIMjacker allows attackers to hijack any phone just by sending it an SMS message.
• Here comes iOS "Lucky" 13!
• Chrome follows Mozilla to DoH with a twist.
• Want to enable DoH in Chrome right now?…
This Week's Stories
• SIMjacker allows attackers to hijack any phone just by sending it an SMS message.
• Here comes iOS "Lucky" 13!
• Chrome follows Mozilla to DoH with a twist.
• Want to enable DoH in Chrome right now?…
SIM Jacking - Security Now 732
• SIMjacker allows attackers to hijack any phone just by sending it an SMS message.
• Here comes iOS "Lucky" 13!
• Chrome follows Mozilla to DoH with a twist.
• Want to enable DoH in Chrome right now? You can, right now, if you wish.
• Chrome stops showing Extended Validation certs in the URL bar.
• Mozilla launches 'Firefox Private Network' VPN service as a browser extension.
• Windows Patch Tuesday redux
• Chrome Remote Desktop
• EXIM eMail servers are in trouble again.
youtube: https://www.youtube.com/watch?v=aJsNnWUX8ng
• SIMjacker allows attackers to hijack any phone just by sending it an SMS message.
• Here comes iOS "Lucky" 13!
• Chrome follows Mozilla to DoH with a twist.
• Want to enable DoH in Chrome right now? You can, right now, if you wish.
• Chrome stops showing Extended Validation certs in the URL bar.
• Mozilla launches 'Firefox Private Network' VPN service as a browser extension.
• Windows Patch Tuesday redux
• Chrome Remote Desktop
• EXIM eMail servers are in trouble again.
youtube: https://www.youtube.com/watch?v=aJsNnWUX8ng
📡 t.me/HackLabel
❤3👍1