How To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 มี.ค. 2023
  • EDIT: Please see my latest GSM cracking video that showcases a more streamlined workflow and eliminates the requirement of Airprobe! • Not Sentenced To Priso...
    My GSM cracking content has been getting quite a lot of attention lately. Previous videos of mine relating to this topic were only boring screen recordings with no real explanation on what steps are required to crack the A5/1 stream cipher and decrypt GSM traffic by obtaining the Kc value.
    I was bored one day and decided to present a live-style workflow of how hackers and security researchers 'crack' 2G cellular communications in real-time. Be warned that if you don't have an interest in cryptography or cellular network security, you might find this video rather boring.
    The GSM capture file used in this video, to my knowledge, has never been publicly cracked before. 'capture_941.8M_112.cfile' was recorded and uploaded with permission by the owner of the data themselves as a decoding example for testing Airprobe.
    I make a few mistakes in the video that I can't be bothered editing out. But they are not critical, just myself misreading a number at the 10 minute mark somewhere, and saying the wrong name of a software tool at 17 minutes.
    Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.
    However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.
    Thanks for watching!
    Archive Download (GSM capture file, cracking notes etc.)
    drive.google.com/file/d/1yeMo...
    LAUNCH WIRESHARK:
    sudo wireshark -k -Y '!icmp && gsmtap' -i lo
    AIRPROBE DECODING USAGE:
    cd /home/username/airprobe/gsm-receiver/src/python
    sudo ./go.sh capture_941.8M_112.cfile 112 0B
    sudo ./go.sh capture_941.8M_112.cfile 112 1S & bursts.txt
    (put a greater-than symbol after the '&')
    XOR.PY USAGE:
    cd /home/username/kraken/Utilities/
    ./xor.py 000000011111010101010000100000010001010111010101000010100001010001111101010001000010000000000101110101010100000010 100011101110001001000110001101001001111100001001010110010011000010101111111010010011101101110000100110100111000111
    KRAKEN USAGE:
    cd kraken/Kraken
    sudo ./kraken ../indexes/
    crack 100011110001011100010110101101011000101011011100010100110010010011010010101011010001101101110101010011110011000101
    FIND_KC USAGE:
    cd /home/username/kraken/Utilities/
    ./find_kc 10931293685685996799x 11 2580567 2580534 100101111101011101100011100001001101001010111110000011110101110000010010011100000100001000100010111110010101100000
    AIRPROBE DECYPTION USAGE:
    sudo ./go.sh capture_941.8M_112.cfile 112 1S 10A29FC292C8D7EF
    A (VERY STRONG) DISCLAIMER:
    THIS VIDEO WAS MADE FOR THE PURPOSES OF EDUCATION AND EXPERIMENTATION ONLY. IMSI-CATCHING, SMS-SNIFFING AND VOICE CALL INTERCEPTION ON CELLULAR NETWORKS IS ILLEGAL AND PUNISHABLE BY HEFTY FINES AND IMPRISONMENT!
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 1.5K

  • @Thph793
    @Thph793 2 หลายเดือนก่อน +553

    "Educational Purposes" are the only 2 words keeping this video save

    • @RobVK8FOES
      @RobVK8FOES  หลายเดือนก่อน +61

      The two words keeping my entire channel from being scrubbed from the interwebz!

    • @I_imperium
      @I_imperium หลายเดือนก่อน +2

      ​@@RobVK8FOES😮

    • @Designer_TopG
      @Designer_TopG หลายเดือนก่อน +3

      ​@@RobVK8FOES
      Whats a GSM capture file.

    • @RobVK8FOES
      @RobVK8FOES  14 วันที่ผ่านมา +2

      @Designer_TopG a recording of 2G / GSM mobile phone radio waves as received by a software defined radio on a PC

  • @your-mom-irl
    @your-mom-irl ปีที่แล้ว +10773

    Thanks I'm in jail now.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +1714

      Me too, maybe we could be cell mates?

    • @linuxinside6504
      @linuxinside6504 ปีที่แล้ว +108

      @@RobVK8FOES lol🤣🤣🤣

    • @zazugee
      @zazugee ปีที่แล้ว +120

      @@RobVK8FOES what's your cell id? xd

    • @4N07H3R_1
      @4N07H3R_1 9 หลายเดือนก่อน +24

      Lmao 😂

    • @StabilizerTech
      @StabilizerTech 9 หลายเดือนก่อน +18

      We are going to jail

  • @FeralFlare
    @FeralFlare 8 หลายเดือนก่อน +8477

    Citizens: "THIS IS ILLEGAL!"
    Intelligence branches: "NOT FOR ME!"

    • @iansmith8234
      @iansmith8234 8 หลายเดือนก่อน

      they have to gain intelligence somehow like what. are you dumb? its legal for them so they can catch criminals. and its illegal for citizens so criminals can't get intel on you.

    • @ShaferHart
      @ShaferHart 8 หลายเดือนก่อน +123

      Literally. Cellular encryption could've been better but the NSA through NIST (I think) got them to weaken the standards. This was done at the outset of the rollout of cellular networks. It's as clear as plaintext to them and black hats.

    • @DrexSux
      @DrexSux 8 หลายเดือนก่อน

      You're not using it to save lives or stop terrorism, you're using it to stalk your ex. The government has bodies that literally audit and make sure that spying powers aren't abused too, they don't just have access to do whatever the fuck they want. Stop spreading your ignorance.

    • @ChristopherJamesGowett
      @ChristopherJamesGowett 8 หลายเดือนก่อน +5

      ACTUALLY XDDDDDD

    • @c0rnch1p
      @c0rnch1p 8 หลายเดือนก่อน +3

      And service providers

  • @thebitterbeginning
    @thebitterbeginning 9 หลายเดือนก่อน +8374

    I love how governments declare it highly illegal to intercept private internet traffic, yet their violation of that law is a MUST, a requirement. We are pets, we are their property, we are owned.

    • @elfnetdesigns702
      @elfnetdesigns702 9 หลายเดือนก่อน +559

      Governments that get to big tend to have "rules for thee but not for me" based policies..

    • @billyzee261
      @billyzee261 9 หลายเดือนก่อน +160

      @@elfnetdesigns702 and they have been working on 'effective' ways to reduce the number of 'pets'. Surviving pets, including the enforcers will become slaves. Many will not see this until it is too late.

    • @Username-2
      @Username-2 9 หลายเดือนก่อน +57

      Have to keep the tax payers “safe.”

    • @johndoe1274
      @johndoe1274 9 หลายเดือนก่อน +90

      @@billyzee261 what the hell are you talking about

    • @billyzee261
      @billyzee261 9 หลายเดือนก่อน

      @@johndoe1274 anyone with an IQ over borderline retarded would know. Most dems have no idea what's coming.

  • @3amshenanigans157
    @3amshenanigans157 4 หลายเดือนก่อน +1241

    Fun fact: You didn't searched for this

    • @wcarthurii
      @wcarthurii 2 หลายเดือนก่อน +19

      Truth.

    • @00ruy00
      @00ruy00 2 หลายเดือนก่อน +28

      Indeed. An example of TH-cam algorithm at work

    • @danhenley977
      @danhenley977 2 หลายเดือนก่อน +2

      For you page

    • @BINX-RR
      @BINX-RR 2 หลายเดือนก่อน +11

      Sassyyy maaaaate!

    • @LuluZia2
      @LuluZia2 2 หลายเดือนก่อน +4

      Algorithm style search lmao.

  • @HeardItOnTheX
    @HeardItOnTheX 4 หลายเดือนก่อน +777

    Studied the video to find out whether or not she actually was cheating on me, ended up getting headhunted for a cyber security role. Thanks dude. Thumbs up.

    • @GG-td5gt
      @GG-td5gt 4 หลายเดือนก่อน +8

      This Is Crazy 😂😂😂

    • @anon88091
      @anon88091 4 หลายเดือนก่อน +18

      so did you find out? was she cheating on you?

    • @shinymew2887
      @shinymew2887 4 หลายเดือนก่อน +1

      @@anon88091of course she was, it’s 2024.

    • @HeardItOnTheX
      @HeardItOnTheX 4 หลายเดือนก่อน

      @@anon88091 As it turned out, I was cheating on her.

    • @PenguinsAreColdish
      @PenguinsAreColdish 4 หลายเดือนก่อน

      @@anon88091it’s made up bro

  • @kebman
    @kebman 9 หลายเดือนก่อน +1598

    Funny story from Norway. A newspaper, Aftenposten, found IMSI catchers all around Oslo, the capital of Norway. They started following the case, and eventually called up the security police. And suddenly they stopped writing more articles about it.

    • @jonathanbarkins8480
      @jonathanbarkins8480 9 หลายเดือนก่อน +294

      The story of every government ever in a nutshell

    • @KOOBA2137
      @KOOBA2137 9 หลายเดือนก่อน +30

      can you share more info about it? like articles or something

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +325

      Just do a google search for commercial GSM interceptors... There are hundreds of these devices on the market available to governments, SIGINT agencies, law enforcement etc. All for the "greater good", of course. Lol

    • @kebman
      @kebman 8 หลายเดือนก่อน

      @@KOOBA2137I think the link to Aftenposten got snipped... But just google IMSI Catcher and Aftenposten and get Google Translate ready.

    • @godlia_
      @godlia_ 8 หลายเดือนก่อน +9

      Var det staten som sto bak det?

  • @oaklyfoundation
    @oaklyfoundation 5 หลายเดือนก่อน +477

    I'm not sure why you say that this is boring content, if you actually wanna learn something this is the content that's needed, I'm not here for tiktok speed content. I really appricate this type of content it's really good.

    • @RobVK8FOES
      @RobVK8FOES  5 หลายเดือนก่อน +121

      It is very heart-warming to hear that there are still people out there who have the ability to concentrate and focus on a video with a length of greater than 34 seconds!

    • @jaydenwhitmore7756
      @jaydenwhitmore7756 5 หลายเดือนก่อน +6

      @@RobVK8FOES there are lots more than you think! I was fascinated by the number-cracking while using the xor script. Makes me wanna check out the source code.

    • @Daloshka
      @Daloshka 4 หลายเดือนก่อน +6

      ​@RobVK8FOES we are here, just share your content

    • @chinBTT
      @chinBTT 4 หลายเดือนก่อน +2

      @@RobVK8FOES I have the ability, im just dumb

    • @BoxHillAbo
      @BoxHillAbo 4 หลายเดือนก่อน +1

      @@chinBTT😂😂

  • @diveownsyouall
    @diveownsyouall 8 หลายเดือนก่อน +1158

    Crazy how hackers are capable of this possessing this much knowledge and coding jargon in the hacking/cracking repertoire. Not only is it interesting but it really is a testament to software skill when it comes to using a computer.
    Great and informative stuff, hope to see more vids like this!

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +114

      Hi, I definitely do not consider myself to be a 'hacker'. I just enjoy testing out already established hacking attacks against RF communication systems. Thanks for the positive feedback about this video :)

    • @ShaferHart
      @ShaferHart 8 หลายเดือนก่อน +55

      The NSA made it easy to do this because they wanted it to be easy for them to do as well. Cellular network standards could've been stronger but they weakened them on purpose.

    • @heinrich6294
      @heinrich6294 8 หลายเดือนก่อน +11

      ​@@RobVK8FOESI think most people consider hackers as those kids who are sitting 24/7 at their basement xD

    • @wasd3108
      @wasd3108 8 หลายเดือนก่อน +2

      skill, or knowledge?

    • @kamiyal
      @kamiyal 8 หลายเดือนก่อน +12

      it's only like .5% of software geeks who can do this shit. you have to really love it cause like he mentions, it's fucking boring if you don't. I'm more into distributed systems and computer vision and just puke when i watch videos like this.

  • @MastermindAtWork
    @MastermindAtWork 9 หลายเดือนก่อน +747

    This video is the reason why text and call encryption formats should be standard on all devices by default. SMS is a transparent messaging system and works with all devices with a cellular network but it's too transparent since anybody can look and sniff out those messages and calls through methods like this

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +134

      2G was conceived all the way back in the late 1980's I believe. When computing power was minuscule compared to today, and everyone thought that 64-bit key length for encryption would be future proof. Oh how they were wrong!
      Luckily, ETSI/3GPP learnt their lessons from the hilariously broken 2G standard, and ensured that 3G, 4G and 5G did not suffer from these security issues like their predecessor did. They all have 128-bit key lengths for their encryption algorithm and to the best of my knowledge, no practical attacks against their ciphering functions have been publicly released.
      4G/LTE with VoLTE enabled, or 5G/NR with VoNR are the best options for mobile security (in my opinion). Without VoLTE/VoNR, 4G and 5G networks commonly fall back to 2G for the handling of calls and SMS. Very dangerous!

    • @daomingjin
      @daomingjin 9 หลายเดือนก่อน +13

      you should be using Private Key encryption on your SMS/Text/IMs and you share the decryption key with people you want to communicate with. That's the only way to have secure communication.

    • @MastermindAtWork
      @MastermindAtWork 9 หลายเดือนก่อน

      @@daomingjin I'm pretty sure your average joe doesn't understand what that is nor know what messaging/email services support that. That's why I saying e2ee should be default in standard messaging apps similar to iMessage, Google Messages*
      *Some devices aren't supported.

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +63

      @daomingjin The safest way to secure your private communications and data is to just not use a mobile phone at all.... Sad that it has to be that way, since modern society is so reliant on them now...

    • @MastermindAtWork
      @MastermindAtWork 9 หลายเดือนก่อน +20

      @@RobVK8FOES Yeah, cause most cell tower carriers track all the communications when turned on. There is a reason why law enforcement use tactics like Cell Triangulation and or get a warrant for phone records with the all the metadata included.

  • @DDBAA24
    @DDBAA24 ปีที่แล้ว +270

    I've been waiting for a channel like this for a couple years.. I bought a SDR and I couldn't find a way to learn beyond basics that held my interest. We're there. Thanks.

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +33

      Hi, thanks for the feedback! I was in the same predicament that you were, I bought a HackRF and an RTL-SDR Blog V3. Never evolved to anything beside HF and analog VHF/UHF listening. I slowly learned that these things were about 0.0000025% of all the stuff SDR could do. I've never looked back!

  • @sirdilly
    @sirdilly 6 หลายเดือนก่อน +5

    Outstanding. I'll have to sit down and watch it again, thanks for the educational demonstration. I actually sat out to get serious about my pentesting again, and wanted today to be the day it starts. Fun and knowledgeable vid to watch. Subbed and liked the vid.

  • @SRG-Learn-Code
    @SRG-Learn-Code 5 หลายเดือนก่อน +4

    Really interesting, I assumed this kind of communications weren't private just for the reason that many people must have studied and tried to decoded for years. Watching the workflow is very educative. Thanks for sharing.

  • @mully89
    @mully89 ปีที่แล้ว +54

    That's great, just found your channel really interesting content. You make a great tutor, thanks for sharing. Still a bit Complex for me but I'm trying to learn!

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +4

      Hi, thanks for the feedback on my videos. I am glad you find my content interesting, I enjoy making it also!

  • @ashrimpcouldnotdothis
    @ashrimpcouldnotdothis 5 หลายเดือนก่อน +33

    youtube is recommending videos to me that'd put me on a list now

    • @RobVK8FOES
      @RobVK8FOES  5 หลายเดือนก่อน +9

      How do you know if this channel is a honeypot, or not? ;)

  • @mojotmn
    @mojotmn 9 หลายเดือนก่อน +376

    I was expecting FBI craking your door open at the end of the video :)

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +69

      Maybe next time?

    • @DrexSux
      @DrexSux 8 หลายเดือนก่อน +23

      Strange placement for a smile emote

    • @JCarey1988
      @JCarey1988 7 หลายเดือนก่อน +8

      2G is old as sh!t and being phased out wherever possible. I wouldn't even post a video of 3/4/5G cracking on TH-cam if I could do it.
      To make a comparison it's the phone equivalent of WEP wifi networks - old and already broken to hell and back by numerous parties.
      Versus a video that showed step by step with tools to do so, how to break WPA-E ("enterprise" wifi) or the very new WPA-3. That would definitely get you a black-suit visit.

    • @Yellow-lx8dj
      @Yellow-lx8dj 5 หลายเดือนก่อน

      man ...

    • @omarjimenezromero3463
      @omarjimenezromero3463 หลายเดือนก่อน

      @@JCarey1988 man you can break a wep nowadays with a potato phone and a dictionary XD

  • @SleazyRoseWalker
    @SleazyRoseWalker 5 หลายเดือนก่อน +32

    I don't understand any of this, but still i find it highly fascinating. To me this is like looking into a bizarre realm where my understanding of what i see is nil

  • @JustAPersonWhoComments
    @JustAPersonWhoComments 7 หลายเดือนก่อน +4

    This guy's enthusiasm for cautionary tales is unmatched

  • @mikehunthunt8269
    @mikehunthunt8269 8 หลายเดือนก่อน +55

    Slowly but surely we can work our way to the death sentence with just a parking ticket. We just need to have this video in our youtube history

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +21

      Society does seem to be heading that way...

  • @voodoo5191
    @voodoo5191 8 หลายเดือนก่อน +105

    I understand absolutely nothing but I'm super glad I've found your channel. The stuff you're doing is quite interesting. How do you even gather the knowledge for this kinda stuff though?

    • @jaxorgate
      @jaxorgate 8 หลายเดือนก่อน +10

      maybe look into cybersecurity for beginners, then go from there. or take a class.

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +78

      @voodoo5191 I don't work in cyber security, nor have I ever had a job in information technology. Utilizing web search engines and reading the readme file of software tools really helps. As does some rudimentary skills in operating Linux operating systems. Send me and email to vk8foes@gmail.com and I will send you some resources ;)

    • @IrrationalDelusion
      @IrrationalDelusion 7 หลายเดือนก่อน +1

      @@RobVK8FOESCuriosity, time and internet 💎

  • @griffonboi
    @griffonboi ปีที่แล้ว +814

    Very nice tutorial but I wouldn't describe this as real-time lol
    Also we do still have 2G as GSM-R that's used on Melbourne and Sydney's rail networks. But I wouldn't even think about cracking those since it's critical infrastructure and could carry a much harsher sentence :)

    • @RobVK8FOES
      @RobVK8FOES  ปีที่แล้ว +176

      Well, you don't intercept GSM communications in real time. You capture and transcribe the GSM radio waves to a file on a PC, and then you demodulate, decrypt and decode them later with the software tools. I meant to say that the cracking of the capture file was in real-time, though it does take a while when doing it manually!
      Wow, I had no idea that GSM-R was still in use in Sydney and Melbourne! That's awesome! I wish we had something like that up here in the Territory :( It's hard to play around with GSM when there is no 2G networks anymore.

    • @drbkd1144
      @drbkd1144 8 หลายเดือนก่อน +8

      good that most of people no longer use 2G; imagine seeing your internet connection drop to 2g and below xD
      great video, taught me a lot how easily these could be done in real time; and yes it is possible to do these in real time; just a few lines of code and voila

    • @technofi2554
      @technofi2554 8 หลายเดือนก่อน +3

      Aus Rail network already got a bit of a wake up call last year due to their horrible security 😂 Not sure if they actually fixed anything they were told about or not. O well, You can lead a horse to water but accountants will always complain about the price of security upgrades.

    • @dimka11ggg
      @dimka11ggg 8 หลายเดือนก่อน +5

      2G is still in use everywhere, at least in Russia. 3G, 4G have small base station coverage that bad for rural areas

    • @drbkd1144
      @drbkd1144 8 หลายเดือนก่อน

      @@dimka11ggg no wayyy

  • @kormannn1
    @kormannn1 8 หลายเดือนก่อน +99

    30:25 I heard the knock-knock sounds. Glad they're so polite to let you finish this video for extra five minutes.

    • @RobVK8FOES
      @RobVK8FOES  7 หลายเดือนก่อน +58

      They are letting me use the prison computer right now, I just want to say thanks for watching!

  • @raulgalets
    @raulgalets 9 หลายเดือนก่อน +107

    this officer, this is the video I watched

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +24

      Put your hands behind your back!

  • @Pseudonaym
    @Pseudonaym 8 หลายเดือนก่อน +21

    10/10. Highly recommended. Writing this whilst on Death Row. Worked a charm.

    • @RobVK8FOES
      @RobVK8FOES  7 หลายเดือนก่อน +2

      Are you able to appeal your sentence?!?!

  • @bobnspace
    @bobnspace 8 หลายเดือนก่อน +7

    Great tutorial! The food isn't what I expected but my roommate looks kinda friendly, I need to write this really quick before my free-time on this computer runs out bye

  • @DavidStringham
    @DavidStringham 7 หลายเดือนก่อน +20

    It's nice that you provide the capture file seeing as GSM no longer exists in the US.

    • @RobVK8FOES
      @RobVK8FOES  7 หลายเดือนก่อน +2

      You are very welcome. GSM has also been switched off in Australia as of 2023. The only way I can play around with this stuff is with these files that others generously uploaded.

    • @SooSmokie
      @SooSmokie 4 หลายเดือนก่อน +3

      GSM absolutely still exists and is functional and still used in the US.

    • @RobVK8FOES
      @RobVK8FOES  4 หลายเดือนก่อน +2

      @SooSmokie Thank you for this info. I don't know what to believe. I read online that 2G is unequivocally switched off in the US, but I see countless individuals online reporting that some cellular providers still operate GSM networks...

    • @jamesrustle7536
      @jamesrustle7536 หลายเดือนก่อน +1

      @@RobVK8FOES they do

  • @kuhafiq4928
    @kuhafiq4928 7 หลายเดือนก่อน +21

    This is really good example how are we not really secure in the outside world. Thank you! You are really great.

    • @RobVK8FOES
      @RobVK8FOES  6 หลายเดือนก่อน +3

      Thanks for watching, dude! Glad you enjoyed it!

  • @PW-72648
    @PW-72648 9 หลายเดือนก่อน +15

    I just simply wanted to say I was amazed you pretty much responded to all of people in the comments 😊🎉. I'll deep dive into vid later, thanks!

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +8

      Hi, thanks for your comment. I hope you enjoy the video!

  • @oldpain7625
    @oldpain7625 9 หลายเดือนก่อน +9

    Great video! Learned a lot in a little time!

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +2

      Hi, I am glad you found my video helpful!

  • @kotopiu4694
    @kotopiu4694 9 หลายเดือนก่อน +18

    idk what the fuck is going on but this dude seems to know what hes talking about so imma like the video.

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +1

      I Appreciate it! Thanks for watching!

  • @Nex-ky9uy
    @Nex-ky9uy 2 หลายเดือนก่อน

    You have no idea how much I , as a professional cybersecurity appreciate these long videos. Please make more ❤️❤️❤️❤️

  • @helloiamfocus
    @helloiamfocus 5 หลายเดือนก่อน +2

    i did enjoy watching this video, i did understand not a single thing u did, but thanks alot for the calm tutorial.

  • @rngsus4002
    @rngsus4002 8 หลายเดือนก่อน +4

    Thanks for taking the time to make this

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน

      Thanks for watching, dude!

  • @yuzu9994
    @yuzu9994 8 หลายเดือนก่อน +24

    Hackers in movies: im in

    • @MVPMTKING
      @MVPMTKING 8 หลายเดือนก่อน

      Oh shit he said the thing

  • @will_irs
    @will_irs 9 หลายเดือนก่อน +12

    Very impressive, well done sir. Hats off to you.

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +2

      Thank you very much!

  • @colly6022
    @colly6022 9 หลายเดือนก่อน +57

    Everyone talks about sniffing packets, but no one ever discloses what they smell like...

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +14

      I can never smell a packet, because I keep dropping them!

  • @purplemg1812
    @purplemg1812 4 หลายเดือนก่อน +5

    "this may not be very interesting to watch"
    Broski, I came here to see shit get done, and get done shit did, more than happy!

  • @isaacmackey1406
    @isaacmackey1406 2 หลายเดือนก่อน +1

    "I've done little to no preparation for this video" somehow this is reassuring to hear at the start of a video

  • @tuirod8920
    @tuirod8920 25 นาทีที่ผ่านมา

    i am going to be honest, i am going to download the courses for SDR hacking, cuz probably they may take it down to some point, i was too invested into this that it made me decide to go entirely into cybersecurity career, i don't know much about any of this but it is exciting!!, your explanation even for the description it works pretty well for me, although i will research for some things i quite don't understand " like pictures of it " around my head :P
    Good job, new subscriber, i'll be looking on your content as also from the creator of dragon OS!!
    greets from mexico!!

  • @-C4-
    @-C4- 9 หลายเดือนก่อน +4

    Thank you for the tutorial I needed this

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน

      You’re welcome 😊

  • @jacobanderson2669
    @jacobanderson2669 4 หลายเดือนก่อน +5

    Get arrested in under just 1 minute by punching a police officer.

  • @Erinthegato
    @Erinthegato 5 หลายเดือนก่อน +1

    Wow I love that this showed up on my new TH-cam account. I used to watch a lot of cybersecurity videos back when I was studying for my security+ cert(I passed☺️)

  • @JohnJoseph26
    @JohnJoseph26 4 หลายเดือนก่อน +1

    WOW. Brilliant brother! Absolutely fùcking phenomenal.

    • @RobVK8FOES
      @RobVK8FOES  4 หลายเดือนก่อน +1

      You are very welcome. Thanks for watching!

  • @jimothyus
    @jimothyus 9 หลายเดือนก่อน +24

    Very cool video. I only watched 29 minutes of it hopefully im safe from jail...

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +11

      Can confirm. You won't get arrested until after 29 min 59 sec.

  • @McaCasey
    @McaCasey 8 หลายเดือนก่อน +10

    Welcome to The Watchlist gentlemen

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +2

      I'm definitely on some kind of list!

    • @momo23461
      @momo23461 8 หลายเดือนก่อน +3

      IM ON THE SPECTRUM

    • @xbiohazardx7312
      @xbiohazardx7312 8 หลายเดือนก่อน +2

      Arrest me officer

  • @johnmiller4750
    @johnmiller4750 5 หลายเดือนก่อน

    Cheers for that now I'm new to the encrypted gsm mode I used to capture comms for our data link back in the early 90's

  • @LukeValentino
    @LukeValentino 8 หลายเดือนก่อน +2

    Well done! Thanks for sharing!

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +1

      You are very welcome!

  • @adamjutras7024
    @adamjutras7024 9 หลายเดือนก่อน +20

    Tell that to the government. As soon as they start following the rules they set for everyone else I'll start respecting their authority.

    • @assmonkey9202
      @assmonkey9202 9 หลายเดือนก่อน

      On jah

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +13

      They pass one law prohibiting the citizens to do, it and the next law they pass is them excluding themselves from it...

    • @adamjutras7024
      @adamjutras7024 8 หลายเดือนก่อน

      @@RobVK8FOES as far as I'm concerned their actions excuse any victimless "crime" and most non-violent crimes. Leaders lead by example and between lobbying (bribery that devalues the advantage of democracy) and the unlawful spying they put corporations up to they have no moral ground to stand on.
      I'm so angry that I'd sooner donate to Putin then support Ukraine. ANYTHING to keep the alphabet agencies of the five eyes busy.

  • @John-McAfee
    @John-McAfee 8 หลายเดือนก่อน +14

    Messaging from my jail cell to confirm that this is actually legit.

    • @dmx0410
      @dmx0410 8 หลายเดือนก่อน +2

      wait so you didn't pass away?!? hehe

    • @RobVK8FOES
      @RobVK8FOES  6 หลายเดือนก่อน

      @John-McAfee Can you please re-confirm that you are not suicidal? We're worried that you will get epsteined again.

    • @John-McAfee
      @John-McAfee 6 หลายเดือนก่อน +2

      @@RobVK8FOESI am not suicidal

  • @deadshxll
    @deadshxll 5 หลายเดือนก่อน

    this is awesome, thank you for sharing this!

  • @-someone-.
    @-someone-. 5 หลายเดือนก่อน

    Well done! I subbed 👍

  • @slowedversion6393
    @slowedversion6393 7 หลายเดือนก่อน +3

    Me at 2 am watching and listening to a load of shit I’m not able to comprehend or understand in any way but I’m trying lmaooo

    • @RobVK8FOES
      @RobVK8FOES  6 หลายเดือนก่อน +1

      Nothing better than a late-night TH-cam sesh watching a random Aussie feller doing obscure RF hacking tutorials, am I right?

  • @cx6894
    @cx6894 9 หลายเดือนก่อน +62

    Jokes on you I'm watching from the ocean, I'm free from such laws

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +16

      Diplomatic immunity!

    • @kostaftp
      @kostaftp 5 หลายเดือนก่อน +3

      Pirate! 😊

  • @rory1653
    @rory1653 4 หลายเดือนก่อน

    Brilliant bro - great video

  • @fridofridolin
    @fridofridolin 7 หลายเดือนก่อน +1

    Just one word: Subbed! :)

    • @RobVK8FOES
      @RobVK8FOES  7 หลายเดือนก่อน

      Thanks for the sub, mate!

  • @mehmetemincicek3266
    @mehmetemincicek3266 9 หลายเดือนก่อน +9

    One of the fastest ways to get arrested!! Thanks for the tutorial.

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +1

      Thanks for watching mate!

  • @grumpent
    @grumpent 9 หลายเดือนก่อน +14

    You owe my grandmother a new door. The fbi had kicked it in to get me from her basement.

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +4

      Sorry about the door, mate! :P

  • @tombanditnook9230
    @tombanditnook9230 8 หลายเดือนก่อน

    With that title I was convinced you were gonna edit in a knock at your door right when the video ends lol.

  • @XaltedWon
    @XaltedWon 2 วันที่ผ่านมา

    Amazing video very knowledgeable ! Must of taken you forever to find all the information to learn everything you know ,, thanx m8 cheers 🍻

  • @pajeetsingh
    @pajeetsingh 9 หลายเดือนก่อน +17

    It's illegal, while the Five Eyes consortium does it everyday.

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +16

      Rules for thee and not for me...

  • @ddddsasawwfdwafaw
    @ddddsasawwfdwafaw 8 หลายเดือนก่อน +3

    I like your funny words wizard man

  • @Xploited
    @Xploited 4 หลายเดือนก่อน

    This was very interesting content. Great work! The only ones thinking this content is boring are people that don't understand it or want to understand it and therefore shouldn't be viewing this video in the first place. They're the ones looking to have the answer handed to them without putting in the work. Which anyone who truly shares interest and passion for this type of knowledge, knows that those types of people wont make it far. Nor will the community surrounding this information be willing to help them either. Great channel by the way.

  • @chrisjordan7592
    @chrisjordan7592 หลายเดือนก่อน +1

    You'd think the calculations would be factored in automatically, and all these "target " steps programmed in, knowing what step comes next, and what you end up with is your phone conversation in text. (Like you said probably exist). Let's stay with phone cloning 😂. Great video!❤❤

    • @RobVK8FOES
      @RobVK8FOES  หลายเดือนก่อน

      Hi. This entire process can be automated, but the developers of the method and hacking tools deliberately left it convoluted and complex in order to thwart script kiddies attempts at using it. Thanks for watching!

    • @chrisjordan7592
      @chrisjordan7592 หลายเดือนก่อน +1

      @@RobVK8FOES skript kiddies 🤣. So true. Thanks for the reply 👍

  • @TheSkepticSkwerl
    @TheSkepticSkwerl 7 หลายเดือนก่อน +11

    Listening to air waves. And cracking it will never land you in jail. They can't know you did that. Period. Especially with an offline device.

    • @RobVK8FOES
      @RobVK8FOES  7 หลายเดือนก่อน +13

      Of course, but I still need to warn people not to do it to keep the TH-cam censors happy....

    • @RatKingTerry
      @RatKingTerry 5 หลายเดือนก่อน

      Clueless surely it wont

    • @TheSkepticSkwerl
      @TheSkepticSkwerl 5 หลายเดือนก่อน

      @@RatKingTerry it's 100% impossible to track a passive listener. Using gained knowledge later is where the risk is.

    • @RobVK8FOES
      @RobVK8FOES  5 หลายเดือนก่อน +1

      Australia law prohibits the installation and operation of a telecommunications interception device. Of course, it is common knowledge that the passive reception of a wireless signal can't be tracked. However, I am guessing the only reason my TH-cam channel hasn't been nuked yet is because of the disclaimers I give. If I say in the opening remarks of my video "Hey guys, today I am going to show you how to listen to your girlfriends 2G phone calls...." TH-cam would nuke my channel in a heartbeat.

  • @crylune
    @crylune 4 หลายเดือนก่อน +4

    This is why I tell privacy freaks that if you own a SIM card you’re screwed anyway

    • @RobVK8FOES
      @RobVK8FOES  4 หลายเดือนก่อน +1

      Exactly! Using VPN's, proxy's, end to end encrypted VOIP/messaging apps doesn't mean anything once your voice and SMS data begins to flow over the Cellular Network Operators infrastructure. It's in their hands from that point!

  • @Xendrius
    @Xendrius 2 หลายเดือนก่อน

    Nice one adam jensen.

  • @Antin0myAbsoluti0n
    @Antin0myAbsoluti0n 5 หลายเดือนก่อน +1

    Thank you! I love learning.

    • @RobVK8FOES
      @RobVK8FOES  5 หลายเดือนก่อน

      Thanks for watching!

  • @S14M07
    @S14M07 8 หลายเดือนก่อน +4

    I don’t know jack shit about coding or computer shit, but this was entertaining as hell!

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +1

      Thanks for watching, mate! Glad you enjoyed it!

  • @24thCenturyBuff
    @24thCenturyBuff 5 หลายเดือนก่อน +3

    Rob: Don't ever do this!
    Gov't: Ya, what he said.
    Also Gov't: Better tap this guy's whole life now.

  • @heyyhi993
    @heyyhi993 4 หลายเดือนก่อน

    This is VERY entertaining to watch

  • @pr0pancakes150
    @pr0pancakes150 3 หลายเดือนก่อน

    By the title I was half expecting the FBI to bust in at anytime during the video.

  • @afk218
    @afk218 9 หลายเดือนก่อน +8

    Speedrun acheived, i'm in jail in 24 minutes.

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน +2

      Did you watch this video at 1.5x speed?

    • @afk218
      @afk218 4 หลายเดือนก่อน +1

      @@RobVK8FOES I want a lawer.

  • @defeatSpace
    @defeatSpace 9 หลายเดือนก่อน +4

    Dropping by and saying hello to my FBI agent

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +2

      "FBI subscribed to your channel!"

  • @user-xj8br1mb4x
    @user-xj8br1mb4x 3 หลายเดือนก่อน

    Expected a swat intrigue by the end of the video!! 🙃

  • @mirkfish8114
    @mirkfish8114 8 หลายเดือนก่อน +1

    Man i dont even know why is this recommended to me but fine i will watch and learn

    • @RobVK8FOES
      @RobVK8FOES  6 หลายเดือนก่อน

      The algorithm was promoting this video heavy for quite some time. It seems to have died off now. Sorry if this video wasn't to your tastes.

  • @Gameplayer55055
    @Gameplayer55055 9 หลายเดือนก่อน +3

    That's how you appear in the cell messing with other cells

  • @renatop.4324
    @renatop.4324 หลายเดือนก่อน +3

    I found it so interesting, for some reason. But I understand nothing on what was done and how. Could someone please explain it to me? I'm so curious!

    • @RobVK8FOES
      @RobVK8FOES  หลายเดือนก่อน +1

      Hi. Glad you found this video interesting! What I am doing in this video is basically decrypting 2G mobile phone communications. If you're too young to know what a 2G is, it was the cellular generation before 3G, 4G and 5G. Old people like me used 2G extensively in the 2000's and early 2010's.

    • @Decomposing_Corpse
      @Decomposing_Corpse หลายเดือนก่อน +1

      ​@@RobVK8FOES
      >old people like me
      >looks like 30 yo
      Btw, Isnt 2G used when you call someone?

    • @RobVK8FOES
      @RobVK8FOES  หลายเดือนก่อน

      @Decomposing_Corpse I am actually in my late 30's! Because this video struck the algorithm gold, I get a lot of normies commenting on this video asking "what is a GSM?" and "what is a 2G?". A lot of zoomers follow my channel, surprisingly!
      It depends how the cellular network operator configures their network. If they don't enable VoLTE on 4G, or VoNR on 5G, the network will fall back to 2G or 3G for the handling of calls and SMS. Here in Australia, we use VoLTE and VoNR, thank goodness. We switched off our 2G networks in 2017, and we have already begun our 3G switch off in late 2023.

  • @Thelxiee
    @Thelxiee 7 หลายเดือนก่อน +1

    What's the best way to gain you knowledge? What can we do to improve in programming and everything? Amazing video although I didn't understand much!

    • @RobVK8FOES
      @RobVK8FOES  7 หลายเดือนก่อน

      Hi, could you please watch this video from the timestamp:
      th-cam.com/video/XdMi-M8eBJQ/w-d-xo.html

  • @pa32779
    @pa32779 หลายเดือนก่อน

    My network security lecturer mentioned the possibilities of cracking Cellular networks but the AFP i forgot what he said, they use a prepaid tracking software to crack and intercept your connection.
    Well said and explained

  • @ButHehe
    @ButHehe 4 หลายเดือนก่อน

    I didn't understand anything that he showed and explained, but it was a great video!

  • @Someonner
    @Someonner 9 หลายเดือนก่อน +16

    Was hoping for FBI to break door at 30th minute. Disappointed 😢

    • @etano1701
      @etano1701 9 หลายเดือนก่อน +3

      me too lmao

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +8

      The FBI informed me that you stopped watching at the 29th minute.

  • @abhigyanshree5676
    @abhigyanshree5676 4 หลายเดือนก่อน +2

    Title: How to get Arrested in 30min.
    Intro: This video is only for educational purpose.

  • @Darkkorex
    @Darkkorex 4 หลายเดือนก่อน

    Thank you. Great explanation.

  • @ShatteredYT
    @ShatteredYT 8 หลายเดือนก่อน +3

    i dont know why i was expecting to hear a door knock or sum shit at the end of the video lmfao

    • @RobVK8FOES
      @RobVK8FOES  6 หลายเดือนก่อน

      What a missed opportunity, I could of put a knocking sound effect at the end of the video!

  • @eham2011
    @eham2011 9 หลายเดือนก่อน +3

    I was expecting him to get arrested at the end of the video!!!!!!

  • @Furanku13
    @Furanku13 8 หลายเดือนก่อน +1

    i dont even know why im here, but here i am enjoying my orange while watching.

    • @RobVK8FOES
      @RobVK8FOES  6 หลายเดือนก่อน

      Nothing better than kicking back behind the PC, eating a fresh orange and watching highly complex RF communication hacking videos! Life is good.

  • @VivoJefindo-id4cj
    @VivoJefindo-id4cj 2 หลายเดือนก่อน +1

    Best channel, real i learn from you

    • @RobVK8FOES
      @RobVK8FOES  2 หลายเดือนก่อน +1

      Thanks for the positive feedback!

  • @user-um9te4yn9g
    @user-um9te4yn9g 7 หลายเดือนก่อน +13

    Instructions unclear, i now have a reverse shell in an fbi agents computer.

    • @RobVK8FOES
      @RobVK8FOES  7 หลายเดือนก่อน +5

      Maybe you can google yourself in the shell to find out if the Five-Eyes are spying on you?

  • @aurevoir641
    @aurevoir641 9 หลายเดือนก่อน +3

    nice speedrun

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน

      Hacking in movies VS actual hacking in real life :P

  • @user-jap84tlv24sq
    @user-jap84tlv24sq 6 หลายเดือนก่อน +1

    Another watchlist i'd like to be part of

  • @robins3352
    @robins3352 8 หลายเดือนก่อน +1

    Your a beast... very impressive!

    • @RobVK8FOES
      @RobVK8FOES  8 หลายเดือนก่อน

      Thanks for watching!

  • @fmdev1239
    @fmdev1239 9 หลายเดือนก่อน +3

    18:06 A bash script with sed would be enough to automate this manual section.

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +1

      Hi, I did make a bash script for brute forcing LAPDm packets (it requires slight editing of the input and copying and pasting) as shown in this video: m.th-cam.com/video/WYXW6EWbPdM/w-d-xo.html
      Not as efficient as it could be though! I wish I knew more about Bash scripting!

  • @BillAnt
    @BillAnt 9 หลายเดือนก่อน +24

    What about decrypting 4G and LTE traffic, is that even possible with amateur equipment?
    The biggest threat I see if capturing 2FA codes but even that's unlikely unless you're within the same physical cell site as the target.
    There have been some attacks using SS7 signaling which worked from anywhere in the world as long as the IMSI was known. ;)

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +44

      Hi. At this time, it is not possible to decrypt 4G/LTE traffic because there is no publicly known attacks/exploits against the 128-bit EPS Encryption Algorithm yet. Same for 3G UMTS and 5G NR. There probably won't be any vulnerabilities for these for a very very long time (maybe not in our lifetimes) because ETSI and 3GPP learnt their lessons from the laughably broken 2G GSM standard, these systems are VERY secure.
      Maybe 3G is slightly broken because of SS7 exploits, but 4G and 5G now use the 'Diameter' protocol. There is probably some theoretical 4G, 5G and Diameter attacks from academia, but to my knowledge, nothing is publicly known. It should always be assumed that no matter what cellular communication generation you are using, your data is NEVER safe. The best way to secure your digital communications is to not use a mobile phone at all.
      Thanks for commenting.

    • @BillAnt
      @BillAnt 9 หลายเดือนก่อน +2

      ​@@RobVK8FOES - Even if some 3G vulnerability is found in the near future, by the that time 3G is already outdated are seldom used, maybe in some 3rd world countries. lol
      Since 4G/5G is already very secure, and fast enough for use with a real time secondary encryption app, which should provide another layer of privacy.
      Of course law enforcement has access at the switch level, that's why encryption apps are useful for privacy.

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน +18

      Yes, that is correct, there are some countries in the world who have retired 2G and 3G already. They purely rely on 4G and 5G, which I think is the positive way forward in terms of cellular data privacy.
      One thing that does worry me though, is countries whose cellular providers use 4G / LTE and don't implement VoLTE. These networks without Voice-Over-LTE more often than not fall back to 2G / GSM for the handling of voice calls and SMS messages. Very dangerous considering 2FA and banking OTP's are regularly transmitted over SMS!

    • @ThermalWorld_
      @ThermalWorld_ 9 หลายเดือนก่อน

      ​@@RobVK8FOES4G can't be decrypt until you buy a Chinese fake carrier for 9k that can decrypt everything for you, even load malware directly on the phone victim ;)

    • @BillAnt
      @BillAnt 9 หลายเดือนก่อน +9

      ​@@RobVK8FOES - I've been in the phone repair business since 1999, and I've seen phones with cloned IMEI/MEID numbers on the old 2G/3G CDMA networks (Verizon here in the US). Interestingly when the active phone is receiving an SMS, the other inactive one is also receiving the same SMS at the same time. In this case, both were sitting on a desk next to each other, basically served by the same tower. Not sure what would happen if locked onto different towers, but can't test it since the old 2G/3G CDMA network has been phased out at the end of 2022. Thankfully this is not happening on 4G/5G networks.

  • @Slickthenick
    @Slickthenick 5 หลายเดือนก่อน +2

    Thank you for giving me a place to stay

  • @fluffybeean
    @fluffybeean หลายเดือนก่อน

    "How to get arrested in 30 minutes.."
    Video is 35 minutes
    I can see why you started sweating towards the end 😂
    Great video btw!

  • @JeffHochberg
    @JeffHochberg 5 หลายเดือนก่อน +3

    “I might sell my hard drive”. He seemed intelligent up until then.

    • @RobVK8FOES
      @RobVK8FOES  5 หลายเดือนก่อน

      Yes yes, we all know that buying second hand hard drives is a good way to land you in prison. However, the rainbow tables are very large in size and a lot of people simply don't have an internet connection capable of downloading that much data in a reasonable amount of time. The distribution of the rainbow tables exclusively happened this way back in the early 2010's

    • @JeffHochberg
      @JeffHochberg 5 หลายเดือนก่อน

      @@RobVK8FOES somehow I think he was alluding to something more than rainbow tables… But we can give him the benefit of the doubt. Lol

  • @beasthamzy
    @beasthamzy 7 หลายเดือนก่อน +4

    The way how the CIA people do it looks way more easy than watching a tutorial on youtube... Geez this looked hard to do

    • @RobVK8FOES
      @RobVK8FOES  6 หลายเดือนก่อน +2

      CIA have equipment that is a lot more expensive than I. They have dedicated appliances which do all the hard work for them and show the cracked data directly on their monitor output. In 2010, 2G GSM interceptors cost about half a million USD.

  • @LakeE.
    @LakeE. 5 หลายเดือนก่อน

    Great video!

  • @gunnergun2077
    @gunnergun2077 6 หลายเดือนก่อน

    great job mate!!!!Can you please show us how to find were all stingrays are located???

  • @ArquimedesOfficial
    @ArquimedesOfficial 9 หลายเดือนก่อน +3

    This is hot stuff...

    • @RobVK8FOES
      @RobVK8FOES  9 หลายเดือนก่อน

      Thank you!