Twelvesec
BLOG
  • SERVICES
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
  • SERVICES
    • Security Assurance
    • Security Management
    • Security Training
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Careers
    • News
    • Contact
Using a GSM tester to intercept calls and SMS (Part 2): Equipment and setup

Using a GSM tester to intercept calls and SMS (Part 2): Equipment and setup

by Iosif Androulidakis | Mar 10, 2016 | 0 comments

Practical Setup and tools In the previous “Using a GSM tester” post, we examined the theoretical aspect of the fake base station attack. Today, we will focus on more technical details, discussing about the equipment needed, and the setup required for the...
Using a GSM Tester to itercept calls and SMS (Part 1)

Using a GSM Tester to itercept calls and SMS (Part 1)

by Iosif Androulidakis | Jan 19, 2016 | 0 comments

In the next few blog posts we will focus on both landline and mobile telecommunication systems security. This is the first in a series of articles that will present the theoretical background behind a method to intercept calls and SMS in GSM networks, while the next...

LATEST POSTS

  • War is Never the Answer February 22, 2022
  • Log4Shell – Exploiting a Critical Remote Code Execution Vulnerability in Apache Log4j (CVE-2021-44228) January 21, 2022
  • EU GDPR vs Virginia CDPA April 22, 2021
  • Data protection around the world – Part II March 31, 2021
  • Data protection around the world March 24, 2021
  • The Privacy Shield Frameworks March 3, 2021
  • GDPR vs LGPD February 24, 2021

TAGS

CCPA Encryption bruteforce Privacy Web Security ICT security ctf Burp Extender reversing capture the flag Reverse Engineering Misconfigurations Penetration Testing Coronavirus cybersecurity GDPR community GDPR compliance pen-test infosec IT security partnerships Cyber Defense tool social distancing Corelan Ransomware attacks event pentest android Application Penetration Test NY SHIELD Mobile Security Ethics self-isolation social responsibility computer security vulnerabilities collaborations Web Application Penetration Testing Covid-19 TwelveSec teleworking cyber security Information Leakage information security

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2021 Twelvesec | Created by Amiad
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.
REJECTCookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
SAVE & ACCEPT