elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
5. Mobile and Cell Phone Weaknesses.mp4 22M
6. How to use a laptop and cellular networks for Internet privacy and anonymity.mp4 19M
7. How you are geo located when using a cellular network.mp4 13M
2. Cellular Network Weaknesses - The Network Operator.mp4 12M
4. Cellular Networks Weaknesses - Signaling System No7 (SS7).mp4 12M
3. Cellular Networks Weaknesses - IMSI catchers.mp4 11M
1. Goals and Learning Objectives.mp4 1.8M
5.4 NSA tracking cellphone locations worldwide, Snowden documents show.html 240
3.1 HOWTO GSM Base Station with the BeagleBone Black, Debian GNULinux and a USRP.html 184
4.1 SS7 hack explained what can you do about it.html 178
5.6 How the NSA built its own search Google.html 145
4.8 Cellular Privacy, SS7 Security Shattered at 31C3.html 139
4.7 Search and Neutralize. How to Determine Subscriber’s Location.html 139
4.5 Cell Phone Tapping How It Is Done and Will Anybody Protect Subscribers.html 138
5.10 Baseband Attacks Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks (Report).html 133
4.2 Taking up the Gauntlet SS7 Attacks.html 129
7.2 Android Location Strategies.html 128
3.4 Android IMSI-Catcher Detector.html 125
7.1 Example - o2Voda Mini Voice Repeater.html 124
4.6 How to Intercept a Conversation Held on the Other Side of the Planet (slides).html 123
4.4 SS7 Locate. Track. Manipulate. [31c3] by Tobias Engel (SnoopSnitch) video.html 121
4.9 60 Minutes - Hacking Your Phone.html 119
4.3 Signalling System No. 7 (SS7) - wikipedia.org.html 114
5.8 EFF - The Problem with Mobile Phones.html 112
3.3 Android - Snoopswitch.html 110
5.1 Baseband processor wikipedia.org.html 109
5.7 Sim card firm links GCHQ and NSA to hack attacks.html 106
5.3 DeepSec 2010 All your baseband are belong to us by Ralf Philipp Weinmann (Video).html 104
5.5 CyanogenMod (pronounced sigh-AN-oh-jen-mod).html 93
5.2 Ubuntu phone OS.html 88
3.2 openbts.org.html 86
5.9 replicant.html 85