How To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN

แชร์
ฝัง
  • เผยแพร่เมื่อ 9 ม.ค. 2025

ความคิดเห็น • 1.9K

  • @SouhailEntertainment
    @SouhailEntertainment 5 หลายเดือนก่อน +313

    Introduction and Disclaimer (00:00:01)
    Tools and Requirements Overview (00:01:44)
    Setting Up the Environment: Dragon OS and Airprobe (00:02:25)
    Using Wireshark for GSM Packet Analysis (00:05:46)
    Identifying GSM Traffic and Encryption (00:06:57)
    Targeting Specific GSM Packets for Cracking (00:08:32)
    Extracting Frame Bursts for Cracking (00:10:13)
    Preparing Data for KC Extraction (00:11:52)
    Using Kraken to Crack the A5/1 Key Stream (00:15:27)
    Generating the Candidate Key with Kraken (00:20:44)
    Finding the KC Value Using Find KC Utility (00:23:41)
    Final Steps: Decoding GSM Traffic with the KC Key (00:29:49)
    Reviewing Decrypted GSM Traffic (00:31:32)
    Conclusion and Final Thoughts (00:32:52)
    Disclaimers and Warnings (00:34:07)

    • @RobVK8FOES
      @RobVK8FOES  5 หลายเดือนก่อน +31

      These timestamps will be helpful to my viewers, thanks for your effort in doing this!

    • @SouhailEntertainment
      @SouhailEntertainment 5 หลายเดือนก่อน +5

      @@RobVK8FOES u can do them urself if u like with AI, i can show u

    • @RobVK8FOES
      @RobVK8FOES  5 หลายเดือนก่อน +20

      @user-qg8qc5qb9r You made it with AI? That's a shame. My channel is an AI free zone, sorry...

    • @SouhailEntertainment
      @SouhailEntertainment 5 หลายเดือนก่อน +2

      @@RobVK8FOES oh why? would love to know your thoughts about it?

    • @RobVK8FOES
      @RobVK8FOES  5 หลายเดือนก่อน +32

      @user-qg8qc5qb9r AI generated content lacks human creativity and feels emotionally empty and soulless to my eyes and ears. Viewers of my channel can be reassured that all the content I produce for my channel originated from my own heart, soul and mind :) It's just a personal preference, I am not a luddite by any means. AI has a time and place; it just doesn't belong on my channel :)

  • @Thph793
    @Thph793 8 หลายเดือนก่อน +4055

    "Educational Purposes" are the only 2 words keeping this video & channel save

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +354

      The two words keeping my entire channel from being scrubbed from the interwebz!

    • @I_imperium
      @I_imperium 7 หลายเดือนก่อน +5

      ​@@RobVK8FOES😮

    • @Designer_TopG
      @Designer_TopG 7 หลายเดือนก่อน +5

      ​@@RobVK8FOES
      Whats a GSM capture file.

    • @RobVK8FOES
      @RobVK8FOES  6 หลายเดือนก่อน +13

      @Designer_TopG a recording of 2G / GSM mobile phone radio waves as received by a software defined radio on a PC

    • @shoutout.kokain8713
      @shoutout.kokain8713 6 หลายเดือนก่อน

      @@RobVK8FOES smart 💵

  • @FeralFlare
    @FeralFlare ปีที่แล้ว +9754

    Citizens: "THIS IS ILLEGAL!"
    Intelligence branches: "NOT FOR ME!"

    • @iansmith8234
      @iansmith8234 ปีที่แล้ว +1

      they have to gain intelligence somehow like what. are you dumb? its legal for them so they can catch criminals. and its illegal for citizens so criminals can't get intel on you.

    • @ShaferHart
      @ShaferHart ปีที่แล้ว +146

      Literally. Cellular encryption could've been better but the NSA through NIST (I think) got them to weaken the standards. This was done at the outset of the rollout of cellular networks. It's as clear as plaintext to them and black hats.

    • @DrexSux
      @DrexSux ปีที่แล้ว

      You're not using it to save lives or stop terrorism, you're using it to stalk your ex. The government has bodies that literally audit and make sure that spying powers aren't abused too, they don't just have access to do whatever the fuck they want. Stop spreading your ignorance.

    • @Thaldren_2024
      @Thaldren_2024 ปีที่แล้ว +6

      ACTUALLY XDDDDDD

    • @c0rnch1p
      @c0rnch1p ปีที่แล้ว +3

      And service providers

  • @thebitterbeginning
    @thebitterbeginning ปีที่แล้ว +9680

    I love how governments declare it highly illegal to intercept private internet traffic, yet their violation of that law is a MUST, a requirement. We are pets, we are their property, we are owned.

    • @elfnetdesigns702
      @elfnetdesigns702 ปีที่แล้ว +657

      Governments that get to big tend to have "rules for thee but not for me" based policies..

    • @billyzee261
      @billyzee261 ปีที่แล้ว +184

      @@elfnetdesigns702 and they have been working on 'effective' ways to reduce the number of 'pets'. Surviving pets, including the enforcers will become slaves. Many will not see this until it is too late.

    • @Username-2
      @Username-2 ปีที่แล้ว +67

      Have to keep the tax payers “safe.”

    • @johndoe1274
      @johndoe1274 ปีที่แล้ว +109

      @@billyzee261 what the hell are you talking about

    • @billyzee261
      @billyzee261 ปีที่แล้ว

      @@johndoe1274 anyone with an IQ over borderline retarded would know. Most dems have no idea what's coming.

  • @HeardItOnTheX
    @HeardItOnTheX 11 หลายเดือนก่อน +1432

    Studied the video to find out whether or not she actually was cheating on me, ended up getting headhunted for a cyber security role. Thanks dude. Thumbs up.

    • @GG-td5gt
      @GG-td5gt 11 หลายเดือนก่อน +19

      This Is Crazy 😂😂😂

    • @anon88091
      @anon88091 11 หลายเดือนก่อน +44

      so did you find out? was she cheating on you?

    • @shinymew2887
      @shinymew2887 11 หลายเดือนก่อน +1

      @@anon88091of course she was, it’s 2024.

    • @HeardItOnTheX
      @HeardItOnTheX 10 หลายเดือนก่อน

      @@anon88091 As it turned out, I was cheating on her.

    • @PenguinsAreColdish
      @PenguinsAreColdish 10 หลายเดือนก่อน

      @@anon88091it’s made up bro

  • @oaklyfoundation
    @oaklyfoundation 11 หลายเดือนก่อน +749

    I'm not sure why you say that this is boring content, if you actually wanna learn something this is the content that's needed, I'm not here for tiktok speed content. I really appricate this type of content it's really good.

    • @RobVK8FOES
      @RobVK8FOES  11 หลายเดือนก่อน +186

      It is very heart-warming to hear that there are still people out there who have the ability to concentrate and focus on a video with a length of greater than 34 seconds!

    • @jaydenwhitmore7756
      @jaydenwhitmore7756 11 หลายเดือนก่อน +14

      @@RobVK8FOES there are lots more than you think! I was fascinated by the number-cracking while using the xor script. Makes me wanna check out the source code.

    • @Daloshka
      @Daloshka 11 หลายเดือนก่อน +10

      ​@RobVK8FOES we are here, just share your content

    • @chinBTT
      @chinBTT 11 หลายเดือนก่อน +6

      @@RobVK8FOES I have the ability, im just dumb

    • @eionnalb2497
      @eionnalb2497 11 หลายเดือนก่อน +4

      @@chinBTTnah you’re not dumb please don’t take that from these comments, if you simply don’t want to learn this then you don’t…there’s plenty of other shit to learn from

  • @kebman
    @kebman ปีที่แล้ว +2106

    Funny story from Norway. A newspaper, Aftenposten, found IMSI catchers all around Oslo, the capital of Norway. They started following the case, and eventually called up the security police. And suddenly they stopped writing more articles about it.

    • @jonathanbarkins8480
      @jonathanbarkins8480 ปีที่แล้ว +374

      The story of every government ever in a nutshell

    • @KOOBA2137
      @KOOBA2137 ปีที่แล้ว +31

      can you share more info about it? like articles or something

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +414

      Just do a google search for commercial GSM interceptors... There are hundreds of these devices on the market available to governments, SIGINT agencies, law enforcement etc. All for the "greater good", of course. Lol

    • @kebman
      @kebman ปีที่แล้ว

      @@KOOBA2137I think the link to Aftenposten got snipped... But just google IMSI Catcher and Aftenposten and get Google Translate ready.

    • @godlia_
      @godlia_ ปีที่แล้ว +16

      Var det staten som sto bak det?

  • @jacobanderson2669
    @jacobanderson2669 11 หลายเดือนก่อน +156

    Get arrested in under just 1 minute by punching a police officer.

    • @generallowres4636
      @generallowres4636 2 หลายเดือนก่อน +5

      That isnt what the tutorial is... the tutorial is for 30 minutes. NOT 1.

    • @iskaffen1436
      @iskaffen1436 2 หลายเดือนก่อน +6

      @@generallowres4636 What if i dont have 30 minutes and i need to be arrested? Were can i find a faster tutorial?

    • @generallowres4636
      @generallowres4636 2 หลายเดือนก่อน +10

      @@iskaffen1436 That isn't my or the video posters problem. This video is for people who have 30 minutes

    • @Fenomenii
      @Fenomenii 2 หลายเดือนก่อน

      😂​@@generallowres4636

    • @nickkerr4893
      @nickkerr4893 2 หลายเดือนก่อน

      haha so random

  • @ashrimpcouldnotdothis
    @ashrimpcouldnotdothis 11 หลายเดือนก่อน +150

    youtube is recommending videos to me that'd put me on a list now

    • @RobVK8FOES
      @RobVK8FOES  11 หลายเดือนก่อน +43

      How do you know if this channel is a honeypot, or not? ;)

    • @arjux4724
      @arjux4724 3 หลายเดือนก่อน

      @@RobVK8FOES 🤣🤣🤣🤣

    • @AJONEZ602
      @AJONEZ602 19 วันที่ผ่านมา +1

      Yikes 😬

  • @DDBAA24
    @DDBAA24 ปีที่แล้ว +299

    I've been waiting for a channel like this for a couple years.. I bought a SDR and I couldn't find a way to learn beyond basics that held my interest. We're there. Thanks.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +37

      Hi, thanks for the feedback! I was in the same predicament that you were, I bought a HackRF and an RTL-SDR Blog V3. Never evolved to anything beside HF and analog VHF/UHF listening. I slowly learned that these things were about 0.0000025% of all the stuff SDR could do. I've never looked back!

  • @PetrolSniffer47
    @PetrolSniffer47 ปีที่แล้ว +1262

    Crazy how hackers are capable of this possessing this much knowledge and coding jargon in the hacking/cracking repertoire. Not only is it interesting but it really is a testament to software skill when it comes to using a computer.
    Great and informative stuff, hope to see more vids like this!

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +132

      Hi, I definitely do not consider myself to be a 'hacker'. I just enjoy testing out already established hacking attacks against RF communication systems. Thanks for the positive feedback about this video :)

    • @ShaferHart
      @ShaferHart ปีที่แล้ว +60

      The NSA made it easy to do this because they wanted it to be easy for them to do as well. Cellular network standards could've been stronger but they weakened them on purpose.

    • @heinrich6294
      @heinrich6294 ปีที่แล้ว +11

      ​@@RobVK8FOESI think most people consider hackers as those kids who are sitting 24/7 at their basement xD

    • @wasd3108
      @wasd3108 ปีที่แล้ว +3

      skill, or knowledge?

    • @kamiyal
      @kamiyal ปีที่แล้ว +18

      it's only like .5% of software geeks who can do this shit. you have to really love it cause like he mentions, it's fucking boring if you don't. I'm more into distributed systems and computer vision and just puke when i watch videos like this.

  • @MastermindAtWork
    @MastermindAtWork ปีที่แล้ว +846

    This video is the reason why text and call encryption formats should be standard on all devices by default. SMS is a transparent messaging system and works with all devices with a cellular network but it's too transparent since anybody can look and sniff out those messages and calls through methods like this

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +149

      2G was conceived all the way back in the late 1980's I believe. When computing power was minuscule compared to today, and everyone thought that 64-bit key length for encryption would be future proof. Oh how they were wrong!
      Luckily, ETSI/3GPP learnt their lessons from the hilariously broken 2G standard, and ensured that 3G, 4G and 5G did not suffer from these security issues like their predecessor did. They all have 128-bit key lengths for their encryption algorithm and to the best of my knowledge, no practical attacks against their ciphering functions have been publicly released.
      4G/LTE with VoLTE enabled, or 5G/NR with VoNR are the best options for mobile security (in my opinion). Without VoLTE/VoNR, 4G and 5G networks commonly fall back to 2G for the handling of calls and SMS. Very dangerous!

    • @daomingjin
      @daomingjin ปีที่แล้ว +17

      you should be using Private Key encryption on your SMS/Text/IMs and you share the decryption key with people you want to communicate with. That's the only way to have secure communication.

    • @MastermindAtWork
      @MastermindAtWork ปีที่แล้ว

      @@daomingjin I'm pretty sure your average joe doesn't understand what that is nor know what messaging/email services support that. That's why I saying e2ee should be default in standard messaging apps similar to iMessage, Google Messages*
      *Some devices aren't supported.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +76

      @daomingjin The safest way to secure your private communications and data is to just not use a mobile phone at all.... Sad that it has to be that way, since modern society is so reliant on them now...

    • @MastermindAtWork
      @MastermindAtWork ปีที่แล้ว +24

      @@RobVK8FOES Yeah, cause most cell tower carriers track all the communications when turned on. There is a reason why law enforcement use tactics like Cell Triangulation and or get a warrant for phone records with the all the metadata included.

  • @colly6022
    @colly6022 ปีที่แล้ว +153

    Everyone talks about sniffing packets, but no one ever discloses what they smell like...

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +36

      I can never smell a packet, because I keep dropping them!

    • @lazaropinareo1926
      @lazaropinareo1926 หลายเดือนก่อน

      at 30:25 he can defintly tell you how his shart smells like lnmaoooooooooooooooooo

    • @CaspersGhost618
      @CaspersGhost618 หลายเดือนก่อน

      What is wrong with you? ​@@lazaropinareo1926

  • @voodoo5191
    @voodoo5191 ปีที่แล้ว +119

    I understand absolutely nothing but I'm super glad I've found your channel. The stuff you're doing is quite interesting. How do you even gather the knowledge for this kinda stuff though?

    • @music4laur
      @music4laur ปีที่แล้ว +11

      maybe look into cybersecurity for beginners, then go from there. or take a class.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +83

      @voodoo5191 I don't work in cyber security, nor have I ever had a job in information technology. Utilizing web search engines and reading the readme file of software tools really helps. As does some rudimentary skills in operating Linux operating systems. Send me and email to vk8foes@gmail.com and I will send you some resources ;)

    • @IrrationalDelusion
      @IrrationalDelusion ปีที่แล้ว +1

      @@RobVK8FOESCuriosity, time and internet 💎

  • @kormannn1
    @kormannn1 ปีที่แล้ว +134

    30:25 I heard the knock-knock sounds. Glad they're so polite to let you finish this video for extra five minutes.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +92

      They are letting me use the prison computer right now, I just want to say thanks for watching!

    • @nittani.
      @nittani. 5 หลายเดือนก่อน

      ​@@RobVK8FOES actually?

    • @YggPrime
      @YggPrime 3 หลายเดือนก่อน +2

      ​@@nittani.Nah hes safe because of "Educational purposes" in the beginning

  • @SleazyRoseWalker
    @SleazyRoseWalker 11 หลายเดือนก่อน +95

    I don't understand any of this, but still i find it highly fascinating. To me this is like looking into a bizarre realm where my understanding of what i see is nil

    • @sebascerchar
      @sebascerchar 5 หลายเดือนก่อน +2

      X2

    • @aty4282
      @aty4282 4 หลายเดือนก่อน +1

      X3

    • @asckq
      @asckq 3 หลายเดือนก่อน

      X4

    • @obriwan
      @obriwan 3 หลายเดือนก่อน +1

      X5

    • @joshofosho3
      @joshofosho3 2 หลายเดือนก่อน

      X6

  • @DavidStringham
    @DavidStringham ปีที่แล้ว +26

    It's nice that you provide the capture file seeing as GSM no longer exists in the US.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +6

      You are very welcome. GSM has also been switched off in Australia as of 2023. The only way I can play around with this stuff is with these files that others generously uploaded.

    • @SooSmokie
      @SooSmokie 11 หลายเดือนก่อน +3

      GSM absolutely still exists and is functional and still used in the US.

    • @RobVK8FOES
      @RobVK8FOES  10 หลายเดือนก่อน +2

      @SooSmokie Thank you for this info. I don't know what to believe. I read online that 2G is unequivocally switched off in the US, but I see countless individuals online reporting that some cellular providers still operate GSM networks...

    • @theKashConnoisseur
      @theKashConnoisseur 3 หลายเดือนก่อน

      @@RobVK8FOES When people say "there is no 2G", they generally mean that there's no 2G from the mainstream mobile data providers. For rural networking, there's multiple small companies that still offer GSM data. There's even groups of private citizens that pool resources in order to purchase communal networking infrastructure when there's insufficient financial demand to draw small companies. Due to how the US is structured legally and politically, there's almost never an unequivocal hard line when it comes to infrastructure or policy.

  • @kuhafiq4928
    @kuhafiq4928 ปีที่แล้ว +29

    This is really good example how are we not really secure in the outside world. Thank you! You are really great.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +3

      Thanks for watching, dude! Glad you enjoyed it!

  • @kotopiu4694
    @kotopiu4694 ปีที่แล้ว +34

    idk what the fuck is going on but this dude seems to know what hes talking about so imma like the video.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +1

      I Appreciate it! Thanks for watching!

  • @Pseudonaym
    @Pseudonaym ปีที่แล้ว +41

    10/10. Highly recommended. Writing this whilst on Death Row. Worked a charm.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +5

      Are you able to appeal your sentence?!?!

    • @AkiyamaKatsuko
      @AkiyamaKatsuko 3 หลายเดือนก่อน +1

      You must have cracked the Nucleae Codes.

  • @mully89
    @mully89 ปีที่แล้ว +54

    That's great, just found your channel really interesting content. You make a great tutor, thanks for sharing. Still a bit Complex for me but I'm trying to learn!

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +4

      Hi, thanks for the feedback on my videos. I am glad you find my content interesting, I enjoy making it also!

  • @sirdilly
    @sirdilly ปีที่แล้ว +6

    Outstanding. I'll have to sit down and watch it again, thanks for the educational demonstration. I actually sat out to get serious about my pentesting again, and wanted today to be the day it starts. Fun and knowledgeable vid to watch. Subbed and liked the vid.

  • @mikehunthunt8269
    @mikehunthunt8269 ปีที่แล้ว +76

    Slowly but surely we can work our way to the death sentence with just a parking ticket. We just need to have this video in our youtube history

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +23

      Society does seem to be heading that way...

  • @mojotmn
    @mojotmn ปีที่แล้ว +482

    I was expecting FBI craking your door open at the end of the video :)

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +81

      Maybe next time?

    • @DrexSux
      @DrexSux ปีที่แล้ว +27

      Strange placement for a smile emote

    • @JCarey1988
      @JCarey1988 ปีที่แล้ว +9

      2G is old as sh!t and being phased out wherever possible. I wouldn't even post a video of 3/4/5G cracking on TH-cam if I could do it.
      To make a comparison it's the phone equivalent of WEP wifi networks - old and already broken to hell and back by numerous parties.
      Versus a video that showed step by step with tools to do so, how to break WPA-E ("enterprise" wifi) or the very new WPA-3. That would definitely get you a black-suit visit.

    • @Yellow-lx8dj
      @Yellow-lx8dj 11 หลายเดือนก่อน +1

      man ...

    • @omarjimenezromero3463
      @omarjimenezromero3463 7 หลายเดือนก่อน

      @@JCarey1988 man you can break a wep nowadays with a potato phone and a dictionary XD

  • @abhigyanshree5676
    @abhigyanshree5676 11 หลายเดือนก่อน +9

    Title: How to get Arrested in 30min.
    Intro: This video is only for educational purpose.

  • @raulgalets
    @raulgalets ปีที่แล้ว +122

    this officer, this is the video I watched

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +31

      Put your hands behind your back!

    • @JesseGraves-y3m
      @JesseGraves-y3m 6 วันที่ผ่านมา

      🤔🤪

  • @PereSoja
    @PereSoja 11 หลายเดือนก่อน +27

    I have absolutely no idea what the hell any of this is or means, but I'm watching anyway.

    • @belovedmakesmusic
      @belovedmakesmusic 3 หลายเดือนก่อน +1

      same

    • @Dhughes1313
      @Dhughes1313 3 หลายเดือนก่อน +1

      Fr😂😂😂

    • @stoic_af_memes
      @stoic_af_memes 2 หลายเดือนก่อน +2

      basically hes intercepting voice calls/sms data packets

    • @belovedmakesmusic
      @belovedmakesmusic 2 หลายเดือนก่อน

      @@stoic_af_memes So he can read them by unencrypting?

  • @SRG-Learn-Code
    @SRG-Learn-Code 11 หลายเดือนก่อน +5

    Really interesting, I assumed this kind of communications weren't private just for the reason that many people must have studied and tried to decoded for years. Watching the workflow is very educative. Thanks for sharing.

    • @TheMothership10508
      @TheMothership10508 หลายเดือนก่อน

      If people built it people can unbuild it...

    • @SRG-Learn-Code
      @SRG-Learn-Code หลายเดือนก่อน

      @@TheMothership10508 well, just to argue, that is not always easy... If people put an effort to prevent you for doing it then you have a greatly harder time, that's the point..

  • @griffonboi
    @griffonboi ปีที่แล้ว +821

    Very nice tutorial but I wouldn't describe this as real-time lol
    Also we do still have 2G as GSM-R that's used on Melbourne and Sydney's rail networks. But I wouldn't even think about cracking those since it's critical infrastructure and could carry a much harsher sentence :)

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +182

      Well, you don't intercept GSM communications in real time. You capture and transcribe the GSM radio waves to a file on a PC, and then you demodulate, decrypt and decode them later with the software tools. I meant to say that the cracking of the capture file was in real-time, though it does take a while when doing it manually!
      Wow, I had no idea that GSM-R was still in use in Sydney and Melbourne! That's awesome! I wish we had something like that up here in the Territory :( It's hard to play around with GSM when there is no 2G networks anymore.

    • @drb_kd
      @drb_kd ปีที่แล้ว +11

      good that most of people no longer use 2G; imagine seeing your internet connection drop to 2g and below xD
      great video, taught me a lot how easily these could be done in real time; and yes it is possible to do these in real time; just a few lines of code and voila

    • @technofi2554
      @technofi2554 ปีที่แล้ว +4

      Aus Rail network already got a bit of a wake up call last year due to their horrible security 😂 Not sure if they actually fixed anything they were told about or not. O well, You can lead a horse to water but accountants will always complain about the price of security upgrades.

    • @dimka11ggg
      @dimka11ggg ปีที่แล้ว +6

      2G is still in use everywhere, at least in Russia. 3G, 4G have small base station coverage that bad for rural areas

    • @drb_kd
      @drb_kd ปีที่แล้ว

      @@dimka11ggg no wayyy

  • @Meditated-Medii
    @Meditated-Medii หลายเดือนก่อน

    I just wanna say thank you for putting me to sleep during these difficult times, I really liked some of the info and terminology you’ve helped me pick me up along the way though.

  • @cx6894
    @cx6894 ปีที่แล้ว +96

    Jokes on you I'm watching from the ocean, I'm free from such laws

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +26

      Diplomatic immunity!

    • @kostaftp
      @kostaftp 11 หลายเดือนก่อน +6

      Pirate! 😊

    • @Pheoniex
      @Pheoniex 3 หลายเดือนก่อน +1

      sealand

    • @theKashConnoisseur
      @theKashConnoisseur 3 หลายเดือนก่อน

      Admiralty law!

  • @grumpent
    @grumpent ปีที่แล้ว +23

    You owe my grandmother a new door. The fbi had kicked it in to get me from her basement.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +6

      Sorry about the door, mate! :P

  • @afk218
    @afk218 ปีที่แล้ว +24

    Speedrun acheived, i'm in jail in 24 minutes.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +7

      Did you watch this video at 1.5x speed?

    • @afk218
      @afk218 11 หลายเดือนก่อน +8

      @@RobVK8FOES I want a lawer.

  • @bigtone7824
    @bigtone7824 4 หลายเดือนก่อน

    Good stuff man, the amout of time and knowledge it takes to accomplish this stuff is crazy, congrats and be safe

  • @bobnspace
    @bobnspace ปีที่แล้ว +11

    Great tutorial! The food isn't what I expected but my roommate looks kinda friendly, I need to write this really quick before my free-time on this computer runs out bye

  • @PW-72648
    @PW-72648 ปีที่แล้ว +17

    I just simply wanted to say I was amazed you pretty much responded to all of people in the comments 😊🎉. I'll deep dive into vid later, thanks!

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +9

      Hi, thanks for your comment. I hope you enjoy the video!

  • @aznkid60
    @aznkid60 ปีที่แล้ว +7

    nobody:
    youtube algorithm: "How To Get Arrested In 30 Minutes"

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +1

      For some reason, TH-cam began promoting this video very heavily. I am sorry if it got recommended to you by the algorithm without you having any interest in this kind of stuff. LOL

  • @adamjutras7024
    @adamjutras7024 ปีที่แล้ว +43

    Tell that to the government. As soon as they start following the rules they set for everyone else I'll start respecting their authority.

    • @assmonkey9202
      @assmonkey9202 ปีที่แล้ว +1

      On jah

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +22

      They pass one law prohibiting the citizens to do, it and the next law they pass is them excluding themselves from it...

    • @adamjutras7024
      @adamjutras7024 ปีที่แล้ว +1

      @@RobVK8FOES as far as I'm concerned their actions excuse any victimless "crime" and most non-violent crimes. Leaders lead by example and between lobbying (bribery that devalues the advantage of democracy) and the unlawful spying they put corporations up to they have no moral ground to stand on.
      I'm so angry that I'd sooner donate to Putin then support Ukraine. ANYTHING to keep the alphabet agencies of the five eyes busy.

    • @theKashConnoisseur
      @theKashConnoisseur 3 หลายเดือนก่อน +1

      When you have the power to make the rules, you have the power to break the rules.

  • @purplemg1812
    @purplemg1812 11 หลายเดือนก่อน +6

    "this may not be very interesting to watch"
    Broski, I came here to see shit get done, and get done shit did, more than happy!

  • @isaacmackey1406
    @isaacmackey1406 9 หลายเดือนก่อน +2

    "I've done little to no preparation for this video" somehow this is reassuring to hear at the start of a video

  • @JustAPersonWhoComments
    @JustAPersonWhoComments ปีที่แล้ว +4

    This guy's enthusiasm for cautionary tales is unmatched

  • @slowedversion6393
    @slowedversion6393 ปีที่แล้ว +6

    Me at 2 am watching and listening to a load of shit I’m not able to comprehend or understand in any way but I’m trying lmaooo

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +3

      Nothing better than a late-night TH-cam sesh watching a random Aussie feller doing obscure RF hacking tutorials, am I right?

  • @Nex-ky9uy
    @Nex-ky9uy 9 หลายเดือนก่อน

    You have no idea how much I , as a professional cybersecurity appreciate these long videos. Please make more ❤️❤️❤️❤️

  • @pajeetsingh
    @pajeetsingh ปีที่แล้ว +26

    It's illegal, while the Five Eyes consortium does it everyday.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +20

      Rules for thee and not for me...

  • @Furanku13
    @Furanku13 ปีที่แล้ว +3

    i dont even know why im here, but here i am enjoying my orange while watching.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว

      Nothing better than kicking back behind the PC, eating a fresh orange and watching highly complex RF communication hacking videos! Life is good.

  • @McaCasey
    @McaCasey ปีที่แล้ว +15

    Welcome to The Watchlist gentlemen

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +2

      I'm definitely on some kind of list!

    • @momo23461
      @momo23461 ปีที่แล้ว +3

      IM ON THE SPECTRUM

    • @xbiohazardx7312
      @xbiohazardx7312 ปีที่แล้ว +2

      Arrest me officer

  • @FredsHacks
    @FredsHacks ปีที่แล้ว +13

    Instructions unclear, i now have a reverse shell in an fbi agents computer.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +5

      Maybe you can google yourself in the shell to find out if the Five-Eyes are spying on you?

  • @ffilcnikrud8975
    @ffilcnikrud8975 11 หลายเดือนก่อน +2

    I used to get recommended soccer and cooking videos: now this. What’s up TH-cam algorithm?

    • @RobVK8FOES
      @RobVK8FOES  11 หลายเดือนก่อน

      Hi. Your guess is as good as mine as to why the algorithm is boosting this video. Welcome to algorithm boost number three. Sorry if this content doesn't interest you.

  • @ssttpy
    @ssttpy 11 หลายเดือนก่อน +4

    with this tutorial i was able to get my pursuit time down to 25 minutes! i’m currently serving 6 consecutive life sentences in the supermax prison

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน

      Replay this video at 2x speed and go to jail in 15 minutes or less!

  • @helloimfocus
    @helloimfocus 11 หลายเดือนก่อน +2

    i did enjoy watching this video, i did understand not a single thing u did, but thanks alot for the calm tutorial.

  • @rngsus4002
    @rngsus4002 ปีที่แล้ว +5

    Thanks for taking the time to make this

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว

      Thanks for watching, dude!

  • @pr0pancakes150
    @pr0pancakes150 9 หลายเดือนก่อน

    By the title I was half expecting the FBI to bust in at anytime during the video.

  • @oldpain7625
    @oldpain7625 ปีที่แล้ว +9

    Great video! Learned a lot in a little time!

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +2

      Hi, I am glad you found my video helpful!

  • @neovictorius
    @neovictorius 3 หลายเดือนก่อน

    Nice! I wrote my bachelor's thesis about cracking 2nd generation GSM encryption :)

  • @alexander_adnan
    @alexander_adnan 9 หลายเดือนก่อน +3

    Its legal when you defend yourself from oppression… ❤❤❤❤ thanks for all

  • @WilliamLDeRieuxIV
    @WilliamLDeRieuxIV ปีที่แล้ว +22

    @10:53 My takeaway it that it's basically using a known cleartext attack to expose the encryption key.
    You compare the difference between the plaintext of a known frame with one that is suspected to be the encrypted version (it only works because the frame is repeated at fixed intervals and are identical)-- the difference would expose the encryption key.
    So using an unpredictable repeat interval (ie. not a fixed one) might be enough to mitigate this type of attack.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +6

      Hi. Yes, that is correct. It is a known plaintext attack. This method of GSM cracking is very old now, so most modern production 2G GSM networks I have played around with implemented randomisation of the known-plaintext and the ciphertext (after encryption was turned on). This, of course, will render this method obsolete. But there is still a few real GSM networks out there which haven't turned on these mitigations, yet.

  • @24thCenturyBuff
    @24thCenturyBuff 11 หลายเดือนก่อน +5

    Rob: Don't ever do this!
    Gov't: Ya, what he said.
    Also Gov't: Better tap this guy's whole life now.

  • @arch3r0
    @arch3r0 ปีที่แล้ว +8

    I sped up the video twice, so they'll arrest me in 15 minutes.

  • @BillAnt
    @BillAnt ปีที่แล้ว +27

    What about decrypting 4G and LTE traffic, is that even possible with amateur equipment?
    The biggest threat I see if capturing 2FA codes but even that's unlikely unless you're within the same physical cell site as the target.
    There have been some attacks using SS7 signaling which worked from anywhere in the world as long as the IMSI was known. ;)

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +48

      Hi. At this time, it is not possible to decrypt 4G/LTE traffic because there is no publicly known attacks/exploits against the 128-bit EPS Encryption Algorithm yet. Same for 3G UMTS and 5G NR. There probably won't be any vulnerabilities for these for a very very long time (maybe not in our lifetimes) because ETSI and 3GPP learnt their lessons from the laughably broken 2G GSM standard, these systems are VERY secure.
      Maybe 3G is slightly broken because of SS7 exploits, but 4G and 5G now use the 'Diameter' protocol. There is probably some theoretical 4G, 5G and Diameter attacks from academia, but to my knowledge, nothing is publicly known. It should always be assumed that no matter what cellular communication generation you are using, your data is NEVER safe. The best way to secure your digital communications is to not use a mobile phone at all.
      Thanks for commenting.

    • @BillAnt
      @BillAnt ปีที่แล้ว +2

      ​@@RobVK8FOES - Even if some 3G vulnerability is found in the near future, by the that time 3G is already outdated are seldom used, maybe in some 3rd world countries. lol
      Since 4G/5G is already very secure, and fast enough for use with a real time secondary encryption app, which should provide another layer of privacy.
      Of course law enforcement has access at the switch level, that's why encryption apps are useful for privacy.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +18

      Yes, that is correct, there are some countries in the world who have retired 2G and 3G already. They purely rely on 4G and 5G, which I think is the positive way forward in terms of cellular data privacy.
      One thing that does worry me though, is countries whose cellular providers use 4G / LTE and don't implement VoLTE. These networks without Voice-Over-LTE more often than not fall back to 2G / GSM for the handling of voice calls and SMS messages. Very dangerous considering 2FA and banking OTP's are regularly transmitted over SMS!

    • @ThermalWorld_
      @ThermalWorld_ ปีที่แล้ว

      ​@@RobVK8FOES4G can't be decrypt until you buy a Chinese fake carrier for 9k that can decrypt everything for you, even load malware directly on the phone victim ;)

    • @BillAnt
      @BillAnt ปีที่แล้ว +9

      ​@@RobVK8FOES - I've been in the phone repair business since 1999, and I've seen phones with cloned IMEI/MEID numbers on the old 2G/3G CDMA networks (Verizon here in the US). Interestingly when the active phone is receiving an SMS, the other inactive one is also receiving the same SMS at the same time. In this case, both were sitting on a desk next to each other, basically served by the same tower. Not sure what would happen if locked onto different towers, but can't test it since the old 2G/3G CDMA network has been phased out at the end of 2022. Thankfully this is not happening on 4G/5G networks.

  • @Mahjo-y1h
    @Mahjo-y1h 7 วันที่ผ่านมา

    I didn’t understand a single thing, but happy to be here 😂

  • @mirkfish8114
    @mirkfish8114 ปีที่แล้ว +3

    Man i dont even know why is this recommended to me but fine i will watch and learn

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว

      The algorithm was promoting this video heavy for quite some time. It seems to have died off now. Sorry if this video wasn't to your tastes.

    • @creeperking0017
      @creeperking0017 3 หลายเดือนก่อน

      i love how reluktant yet accepting this komment is "fiiiiiiiiine ill learn" like u dont wanna but u rekognize that u should and are still goin through with it

  • @TUXbeatDOWN
    @TUXbeatDOWN 11 หลายเดือนก่อน

    This was very interesting content. Great work! The only ones thinking this content is boring are people that don't understand it or want to understand it and therefore shouldn't be viewing this video in the first place. They're the ones looking to have the answer handed to them without putting in the work. Which anyone who truly shares interest and passion for this type of knowledge, knows that those types of people wont make it far. Nor will the community surrounding this information be willing to help them either. Great channel by the way.

  • @mehmetemincicek3266
    @mehmetemincicek3266 ปีที่แล้ว +10

    One of the fastest ways to get arrested!! Thanks for the tutorial.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +1

      Thanks for watching mate!

  • @Erinthegato
    @Erinthegato 11 หลายเดือนก่อน +2

    Wow I love that this showed up on my new TH-cam account. I used to watch a lot of cybersecurity videos back when I was studying for my security+ cert(I passed☺️)

  • @Noconstitutionfordemocrats1
    @Noconstitutionfordemocrats1 ปีที่แล้ว +4

    Instructions unclear: got arrested in 25 minutes.

  • @HomeByTheSeas
    @HomeByTheSeas 2 หลายเดือนก่อน +1

    Hacker: That was easy, i’m in!
    Law: You’re going to prison!
    Government: We’re making you an offer that you can’t refuse..

  • @sparda_
    @sparda_ 11 หลายเดือนก่อน +3

    “illegal” yet they know our every move and every word we say, even when you think you aren’t being watched/heard, you are

  • @tombanditnook9230
    @tombanditnook9230 ปีที่แล้ว +1

    With that title I was convinced you were gonna edit in a knock at your door right when the video ends lol.

  • @jimothyus
    @jimothyus ปีที่แล้ว +28

    Very cool video. I only watched 29 minutes of it hopefully im safe from jail...

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +12

      Can confirm. You won't get arrested until after 29 min 59 sec.

  • @Thelxiee
    @Thelxiee ปีที่แล้ว +1

    What's the best way to gain you knowledge? What can we do to improve in programming and everything? Amazing video although I didn't understand much!

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว

      Hi, could you please watch this video from the timestamp:
      th-cam.com/video/XdMi-M8eBJQ/w-d-xo.html

  • @gabeworks_
    @gabeworks_ ปีที่แล้ว +5

    I can see a police car outside my window
    thank you

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +1

      I am glad this method worked for you!

  • @linuxsuperuser
    @linuxsuperuser 9 หลายเดือนก่อน +2

    I actually got in trouble doing something like this in college almost 20 years ago. It ruined my carrier... Verizon sent out an engineer and he led the police to my drom, A nice warning I WISH. Now its 20 years later I still have to go back to college. This happened at George Mason University - where a State Police Division is on campus, in Fairfax. Don't Go There their EE department sucks. Now I'm an handy-man electrician. That was 20 years ago. I still have not worked a single job that surpassed my intern pay that I would have made at the Naval research lab. The person I was to work with has been in the news for his accomplishments. I would to thank everyone that involved and I'm sorry for exploring electronic hacking - something I was being hired for - I only wanted to serve my country.

  • @wojciechsobiesiak
    @wojciechsobiesiak ปีที่แล้ว +19

    Well written code cannot be read by people that are not allowed to do it. Size and time are factors that make it impossible. And If You think You obtain access to some data not commonly avaible for all, You should ask what is "why this happend".

    • @sudowtf
      @sudowtf ปีที่แล้ว +4

      The only way to make your code difficult/impossible to read is by obfuscating it or encrypting it. If someone possesses the decryption key or wants to de-obfuscate your code, they can read it. Hell, they might even try to crack your code using brute force techniques. The fuck are you on about saying that we’ll written code cannot be read by people that are not allowed to read it? It’s not typed in Minecraft Enchanting runes.

    • @wojciechsobiesiak
      @wojciechsobiesiak ปีที่แล้ว

      @@sudowtf It's ok with to make public test if You are so self confident. My today task I planned is to (plan minimum) is to wriat windows bat file to create C code then to compile it to create html file to be displayed by web browser sth like hello world OR maybe add creating not html file but php that will create bat file - with onlu CMD xD

  • @defeatSpace
    @defeatSpace ปีที่แล้ว +6

    Dropping by and saying hello to my FBI agent

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +3

      "FBI subscribed to your channel!"

  • @chrisjordan7592
    @chrisjordan7592 8 หลายเดือนก่อน +1

    You'd think the calculations would be factored in automatically, and all these "target " steps programmed in, knowing what step comes next, and what you end up with is your phone conversation in text. (Like you said probably exist). Let's stay with phone cloning 😂. Great video!❤❤

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน

      Hi. This entire process can be automated, but the developers of the method and hacking tools deliberately left it convoluted and complex in order to thwart script kiddies attempts at using it. Thanks for watching!

    • @chrisjordan7592
      @chrisjordan7592 8 หลายเดือนก่อน +1

      @@RobVK8FOES skript kiddies 🤣. So true. Thanks for the reply 👍

  • @GiannisM-t5y
    @GiannisM-t5y 7 หลายเดือนก่อน +4

    How would they even find out tho to arrest you? Sniffing RF traffic is a passive scanning technique since you're not really transmitting anything rather you're just receiving RF signals. So please explain how would this remotely have a chance of landing you in jail if you're not arrested for something completely different and they end up finding cracked GSM/2G-3G-4G data? Other than actually physically seeing you with a RF receiver kit hooked up on a laptop and generating suspicions that you're doing illegal shit there's really no other way to find you. Am I right or am I wrong? And if I am wrong then please explain.

    • @RobVK8FOES
      @RobVK8FOES  7 หลายเดือนก่อน +1

      Yes yes, we all know that the passive receiving of radio waves is not detectable.... I'm not sure if you have looked at my other videos yet, but If you haven't already noticed, the subject matter of my channel is very dubious from a legal perspective. The only reason my channel hasn't been nuked yet is because I give the long and boring disclaimers saying "don't try this at home, kiddies!' Or else, it would of been erased from the internet a long time ago.

    • @GiannisM-t5y
      @GiannisM-t5y 7 หลายเดือนก่อน +1

      @@RobVK8FOES Legal disclaimers, gotcha.

  • @usr-notfound
    @usr-notfound 3 หลายเดือนก่อน

    I love the idea of the title just being: How to Get Arrested in 30 Minutes

  • @st1cky953
    @st1cky953 ปีที่แล้ว +46

    How do they want to track you down if you receive GSM (Or similar radio waves) and then decrypt it? Isn't it almost impossible because you only receive but don't send anything?
    As long as you don't use antennas that have very high power consumption and long range distance, I think it will be difficult to find out that you are doing something like that.
    I can still remember the case where they caught the hacker with a Stingray and he did everything possible to get it declared illegal in court because receiving and analyzing private data was illegal.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +44

      Of course, passive receiving of GSM-modulated radio waves can't be tracked. But due to the nature of intercepting telecommunications being very contentious from a legal standpoint, I have to give these disclaimers...

    • @qntkallure
      @qntkallure ปีที่แล้ว +8

      @@RobVK8FOES so its only illegal if they catch you which they cant really catch you if you dont send anything

    • @lmaoroflcopter
      @lmaoroflcopter ปีที่แล้ว +3

      Just because you can get away with murder, doesn't make it legal. 😅

    • @Gr8Poseidon
      @Gr8Poseidon ปีที่แล้ว +2

      😂 he’s covering himself with the disclaimer🤦🏾‍♂️

    • @svampebob007
      @svampebob007 ปีที่แล้ว +1

      You would not be roaming around the city passively listening if you were to do this, you would rather set up your own antenna to avoid wasting a lot of time.

  • @tuirod8920
    @tuirod8920 6 หลายเดือนก่อน +1

    i am going to be honest, i am going to download the courses for SDR hacking, cuz probably they may take it down to some point, i was too invested into this that it made me decide to go entirely into cybersecurity career, i don't know much about any of this but it is exciting!!, your explanation even for the description it works pretty well for me, although i will research for some things i quite don't understand " like pictures of it " around my head :P
    Good job, new subscriber, i'll be looking on your content as also from the creator of dragon OS!!
    greets from mexico!!

  • @user-dz2wi5uo4g
    @user-dz2wi5uo4g ปีที่แล้ว +3

    This is the best honeypot video ever

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +2

      Maybe I'm a fed? Or maybe I'm not? Who knows....

  • @JohnJoseph26
    @JohnJoseph26 11 หลายเดือนก่อน +1

    WOW. Brilliant brother! Absolutely fùcking phenomenal.

    • @RobVK8FOES
      @RobVK8FOES  10 หลายเดือนก่อน +1

      You are very welcome. Thanks for watching!

  • @will_irs
    @will_irs ปีที่แล้ว +12

    Very impressive, well done sir. Hats off to you.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +2

      Thank you very much!

  • @aa1bb2cc3dd4
    @aa1bb2cc3dd4 2 หลายเดือนก่อน

    27:41 - Why did you 567 here from the third guessed line? Why was it this exact line? How did you know it was the third line? Was that because you had already used that one before? What would happen if you used any of the other 3 lines from guessed (501,534,600) ?

  • @TheSkepticSkwerl
    @TheSkepticSkwerl ปีที่แล้ว +12

    Listening to air waves. And cracking it will never land you in jail. They can't know you did that. Period. Especially with an offline device.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +15

      Of course, but I still need to warn people not to do it to keep the TH-cam censors happy....

    • @RatKingTerry
      @RatKingTerry 11 หลายเดือนก่อน

      Clueless surely it wont

    • @TheSkepticSkwerl
      @TheSkepticSkwerl 11 หลายเดือนก่อน

      @@RatKingTerry it's 100% impossible to track a passive listener. Using gained knowledge later is where the risk is.

    • @RobVK8FOES
      @RobVK8FOES  11 หลายเดือนก่อน +2

      Australia law prohibits the installation and operation of a telecommunications interception device. Of course, it is common knowledge that the passive reception of a wireless signal can't be tracked. However, I am guessing the only reason my TH-cam channel hasn't been nuked yet is because of the disclaimers I give. If I say in the opening remarks of my video "Hey guys, today I am going to show you how to listen to your girlfriends 2G phone calls...." TH-cam would nuke my channel in a heartbeat.

  • @_Pyroon_
    @_Pyroon_ 11 หลายเดือนก่อน +1

    Critique: you forgot the "FBI open up!" meme the moment you commited the naughty

  • @renatop.4324
    @renatop.4324 8 หลายเดือนก่อน +3

    I found it so interesting, for some reason. But I understand nothing on what was done and how. Could someone please explain it to me? I'm so curious!

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +1

      Hi. Glad you found this video interesting! What I am doing in this video is basically decrypting 2G mobile phone communications. If you're too young to know what a 2G is, it was the cellular generation before 3G, 4G and 5G. Old people like me used 2G extensively in the 2000's and early 2010's.

    • @Decomposing_Corpse
      @Decomposing_Corpse 8 หลายเดือนก่อน +1

      ​@@RobVK8FOES
      >old people like me
      >looks like 30 yo
      Btw, Isnt 2G used when you call someone?

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน

      @Decomposing_Corpse I am actually in my late 30's! Because this video struck the algorithm gold, I get a lot of normies commenting on this video asking "what is a GSM?" and "what is a 2G?". A lot of zoomers follow my channel, surprisingly!
      It depends how the cellular network operator configures their network. If they don't enable VoLTE on 4G, or VoNR on 5G, the network will fall back to 2G or 3G for the handling of calls and SMS. Here in Australia, we use VoLTE and VoNR, thank goodness. We switched off our 2G networks in 2017, and we have already begun our 3G switch off in late 2023.

  • @Makronauta
    @Makronauta 2 หลายเดือนก่อน

    Don't forget to hydrate, time flies when cracking GSM capture files!

  • @ManuelEscariota
    @ManuelEscariota 11 หลายเดือนก่อน +3

    Hi guys! I'm looking for some resources to be able to understand what's going on here. Where do i start? like is there a site where i can start from the scratch? thank you so much!

    • @RobVK8FOES
      @RobVK8FOES  11 หลายเดือนก่อน +2

      Hi. Could you send an email to vk8foes@gmail.com. I have a generic cut and paste email I send to everyone who asks about how to get started with RF Hacking, software defined radio and Linux. Cheers.

  • @DarthVader-x9h
    @DarthVader-x9h 2 หลายเดือนก่อน

    Glad to be on a watchlist with you guys. ://

  • @zazugee
    @zazugee ปีที่แล้ว +5

    i got it to work, but for from the 2000 imsi codes there i coudn't find mine, even tho i made sure using a cell id app on my phone to know what frequency and the cell id it connected to

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +2

      Did you take note of the TMSI value (not IMSI) that your mobile phone was provided by the base-station at the time you recorded the data? If so, in Wireshark you can click on the Edit menu -> Find Packet. Under 'find by', select 'string' and then enter your TMSI value into the search box (in the format of 0x1234abcd). That should show you all the packets relating to your mobile phone. Try it on the BCCH, and SDCCH8 channels. Good luck!

  • @suyahatesntr
    @suyahatesntr ปีที่แล้ว +1

    The fact that the video after this one is Ray William Johnson's "I'm glad he's in jail". Makes this even more funnier.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว

      Wow, that guy is a blast from the TH-cam past!

    • @beamboy07
      @beamboy07 ปีที่แล้ว +1

      hes made a comeback@@RobVK8FOES

  • @ShatteredYT
    @ShatteredYT ปีที่แล้ว +3

    i dont know why i was expecting to hear a door knock or sum shit at the end of the video lmfao

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว

      What a missed opportunity, I could of put a knocking sound effect at the end of the video!

  • @pa32779
    @pa32779 7 หลายเดือนก่อน

    My network security lecturer mentioned the possibilities of cracking Cellular networks but the AFP i forgot what he said, they use a prepaid tracking software to crack and intercept your connection.
    Well said and explained

  • @JeffHochberg
    @JeffHochberg 11 หลายเดือนก่อน +4

    “I might sell my hard drive”. He seemed intelligent up until then.

    • @RobVK8FOES
      @RobVK8FOES  11 หลายเดือนก่อน

      Yes yes, we all know that buying second hand hard drives is a good way to land you in prison. However, the rainbow tables are very large in size and a lot of people simply don't have an internet connection capable of downloading that much data in a reasonable amount of time. The distribution of the rainbow tables exclusively happened this way back in the early 2010's

    • @JeffHochberg
      @JeffHochberg 11 หลายเดือนก่อน

      @@RobVK8FOES somehow I think he was alluding to something more than rainbow tables… But we can give him the benefit of the doubt. Lol

  • @koltonriley5929
    @koltonriley5929 3 หลายเดือนก่อน

    G'day mate. Hope ye stayin safe out here. Especially with this bloody heat.

  • @ilikerainandburger
    @ilikerainandburger 11 หลายเดือนก่อน +1

    Every SINGLE tool/frame/script used in this video is legal and could be really productive tools. BUT when they are used TOGETHER, Boooom.

  • @raouldukestudios
    @raouldukestudios ปีที่แล้ว +3

    Glad this was suggested to me. Entrapment?

  • @fluffybeean
    @fluffybeean 7 หลายเดือนก่อน

    "How to get arrested in 30 minutes.."
    Video is 35 minutes
    I can see why you started sweating towards the end 😂
    Great video btw!

  • @John-McAfee
    @John-McAfee ปีที่แล้ว +16

    Messaging from my jail cell to confirm that this is actually legit.

    • @dmx0410
      @dmx0410 ปีที่แล้ว +2

      wait so you didn't pass away?!? hehe

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว

      @John-McAfee Can you please re-confirm that you are not suicidal? We're worried that you will get epsteined again.

    • @John-McAfee
      @John-McAfee ปีที่แล้ว +2

      @@RobVK8FOESI am not suicidal

  • @krizzi666
    @krizzi666 3 หลายเดือนก่อน +1

    The fact that he was using a calculator to add 102 blows my mind. "Yeah I can hack your phone, but still use a calculator to add 3 digit numbers"

    • @RobVK8FOES
      @RobVK8FOES  3 หลายเดือนก่อน

      Nice troll, but I will bite anyway: A large proportion of my viewers do not speak English, or they speak English as a second language. Therefore, I try to show what I am demonstrating as clearly and methodically as possible.

    • @krizzi666
      @krizzi666 3 หลายเดือนก่อน

      @@RobVK8FOES nothing against you man :) don't take it badly. Just thought it was funny 😀