Search Results for: ethical hacking

How a Security Guard Transitioned into Cybersecurity with Higher Pay & Better Job

How a Security Guard Transitioned into Cybersecurity with Higher Pay & Better Job

How a Security Guard Transitioned into Cybersecurity with Higher Pay & Better Job https://www.youtube.com/watch?v=0c-i6Eb9uS8&t=5s%20Mr. Colby Austin Country: United States In a recent interview with EC-Council, Colby Austin shared how he got a “foot in the door”, with his Certified Ethical Hacker (CEH)certification. He shared how C|EH helped him identify attacks and other things quickly and…

The post How a Security Guard Transitioned into Cybersecurity with Higher Pay & Better Job appeared first on Cybersecurity Exchange.

I got 3 Promotions in 2 Years With No Security Experience.

I got 3 Promotions in 2 Years With No Security Experience.

I got 3 Promotions in 2 Years With No Security Experience. https://www.youtube.com/watch?v=8zxn7sv9G68&t=1sJordan Bodily Company: BigCommerceTitle: Infrastructure Security Engineer (Level 2)Country: United States Recently, Jordan Bodily, who started off as a junior analyst with little to no experience in cybersecurity, shared how obtaining his C|EH, helped him to rise through the ranks quickly. He was promoted…

The post I got 3 Promotions in 2 Years With No Security Experience. appeared first on Cybersecurity Exchange.

Categories of Security Challenges in Cloud Computing – Organization

Categories of Security Challenges in Cloud Computing – Organization

Organizational security management (O1) When adapting to cloud computing, some changes are introduced to the security management, information security lifecycle models, even the corporate IT standards and policies need to be changed [160]. There are issues such as less coordination among different communities of interest within client organizations.The customer also has to face new risks …

Categories of Security Challenges in Cloud Computing – Organization Read More »

GSM Signal Tapping using RTL-SDR

In our previous articles we learnt the basics of RTL-SDR and Created our own airplane radar using RTL-SDR using our Kali Linux system. So in this article we are not going to cover the basics again. Please make sure to read our previous articles carefully. One more thing, buying RTL-SDR from our Amazon link will support us, we earn a little commission income.

Mobile call hacking using Kali Linux

In our this detailed article we are going to discuss about scanning and analyzing GSM traffic using our RTL-SDR on Kali Linux with the help of kalibrate-rtl tool. This tool can scan for GSM based stations in a frequency band.

Scanning for GSM Signals

As we told we are going to use kalibrate-rtl or kal tool to scan GSM traffic. So we need to install it on our system. We can easily install it on our Kali Linux by applying following command:

sudo apt install kalibrate-rtl -y

In the following screenshot we can see the output:

kalibrate-rtl tool installed on our Kali Linux system
kalibrate-rtl is already installed on our Kali Linux system

Most of the countries use GSM900 band, but in USA it’s GSM850. We are scanning for GSM900 band, our USA friends need to use GSM850 in the place of GSM900.

We need to plugin our RTL-SDR with antenna at first, Then to scan GSM900 traffic we run following command on our terminal:

kal -s GSM900 -g 40

The following screenshot shows the output of the above command:

kalibrating GSM signals

In the above screenshot we can see that there are many channels, but we need to note the frequencies, in our case we are going to use 953.4MHz.

Now we open GQRX tool and enter the frequency in the Receiver Options window, shown in the following screenshot:

gqrx showing GSM signal

We can see the waterfall that the device is able to catch the signals perfectly.

Analyzing GSM Packets

Now we need to install gr-gsm tool by using following command:

sudo apt install gr-gsm -y

We can see the output in the following screenshot:

installing gr-gsm on Kali Linux

This gr-gsm tool will help us to look the data at the packet level. After the installation process is done, we need to run following command to start the monitoring packets:

grgsm_livemon

Here a new window will open, we will change the frequency we are working with (we had noted the 935.4MHz while using kalibrate). As we can see in the following screenshot:

grgsm livemon

On the gr-gsm livemon window we can see the frequency and in the terminal window we can see the data traffic. Now we need to analyze the data packets using Wireshark. We leave this gr-gsm livemon terminal and window as it is capturing packets and open our Wireshark from application menu or from another terminal using wireshark command.

wireshark taffic analysis

Here we need to select the interface. Our interface will be Loopback: lo by double clicking over it. Then we can see the packets on the Wireshark, as following screenshot:

gsm packats on wireshark

We need to apply the display filter now. We need to add the filter gsmtap. Then we need to look on the packet Info tab for System Information Type 3.

System information type 3 on Wireshark

Now we need to check the GSM CCCH > Location Area Identification (LAI). There we will get the information about the data packets. Shown in the following screenshot:

captured gsm traffic information using rtl-sdr and wireshark on Kali Linux

In the highlighted line we can see that the mobile network provider is BSNL and this packets are transmitting from West Bengal. This is how we analyze GSM signal and how GSM packets travel on our Kali Linux.

This is how we can analyze GSM packets using RTL-SDR on our Kali Linux system. We can’t say much for our ethical policy. Everything more than above can be misused. There are lots of good tutorials on GSM sniffing on the internet we just need to find out them, we just made an easy start. Our suggestion will be crazydanishhacker, he is far batter than us on this topic. He did well in his website and YouTube channel.

Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

Five Reasons a Career in Penetration Testing Is the Next Big Thing

Five Reasons a Career in Penetration Testing Is the Next Big Thing Penetration testing is an extremely rewarding career path for cybersecurity professionals, offering fulfilling salaries and outstanding job security. Demand for penetration testers has remained high as multiple high-profile cybersecurity incidents have made their way into headlines in recent years—for example, when Russian hackers…

The post Five Reasons a Career in Penetration Testing Is the Next Big Thing appeared first on Cybersecurity Exchange.

What Are Sniffing Attacks, and How Can You Protect Yourself? 

What Are Sniffing Attacks, and How Can They Be Prevented? The technique of capturing all data packets traveling through a network using a software application or hardware device is known as network sniffing (Mitchell, 2021). Ethical hackers can use sniffing to gain tremendous insights into the workings of a network and the behavior of its…

The post What Are Sniffing Attacks, and How Can You Protect Yourself?  appeared first on Cybersecurity Exchange.

Digital Forensics and the Internet of Things (IoT)

Understanding the Meaning and Purpose of IoT Forensics Cybercrime is a serious threat to any organization, with data breach costs reaching over USD 4 million on average (Mack, 2021). Companies today face many potential cyber risks each year, and the results can be catastrophic. Since Internet of Things (IoT) devices often face attacks as soon…

The post Digital Forensics and the Internet of Things (IoT) appeared first on Cybersecurity Exchange.

What Are Network Ports and Port Scanning Techniques?  

Preventing Malicious Hacks with Port Scanning Techniques Port scanning techniques are a valuable part of any cybersecurity professional’s toolkit. Ethical hackers and penetration testers frequently use port scanning techniques to locate vulnerabilities in a network that malicious hackers can use to gain access. Port scanning is a fundamental part of the pre-attack phase of a penetration test.…

The post What Are Network Ports and Port Scanning Techniques?   appeared first on Cybersecurity Exchange.

C|PENT Review, Preparation Tips, and Cyber Range Experience: Advice From a Licensed Penetration Tester (Master)

What Is Incident Management and What Are Its Advantages? Business owners are always looking for ways to keep their company safe from unforeseen security incidents, which can cause significant losses. One way to do this is by implementing an incident management process. What is incident management, and why do organizations need it? This article will…

The post C|PENT Review, Preparation Tips, and Cyber Range Experience: Advice From a Licensed Penetration Tester (Master) appeared first on Cybersecurity Exchange.

Common Cloud Computing Security Issues and Challenges

The Most Common Cloud Computing Security Issues and Challenges All organizations that rely on cloud platforms need enhanced security that still allows team members, customers, and other stakeholders to access their applications and online data from a wide range of locations. With the adoption of cloud applications and storage growing each year, businesses need to…

The post Common Cloud Computing Security Issues and Challenges appeared first on Cybersecurity Exchange.

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.