elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1. Goals and Learning Objectives.mp4 1.8M
2. Cellular Network Weaknesses - The Network Operator.mp4 12M
3.1 HOWTO GSM Base Station with the BeagleBone Black, Debian GNULinux and a USRP.html 184
3.2 openbts.org.html 86
3.3 Android - Snoopswitch.html 110
3.4 Android IMSI-Catcher Detector.html 125
3. Cellular Networks Weaknesses - IMSI catchers.mp4 11M
4.1 SS7 hack explained what can you do about it.html 178
4.2 Taking up the Gauntlet SS7 Attacks.html 129
4.3 Signalling System No. 7 (SS7) - wikipedia.org.html 114
4.4 SS7 Locate. Track. Manipulate. [31c3] by Tobias Engel (SnoopSnitch) video.html 121
4.5 Cell Phone Tapping How It Is Done and Will Anybody Protect Subscribers.html 138
4.6 How to Intercept a Conversation Held on the Other Side of the Planet (slides).html 123
4.7 Search and Neutralize. How to Determine Subscriber’s Location.html 139
4.8 Cellular Privacy, SS7 Security Shattered at 31C3.html 139
4.9 60 Minutes - Hacking Your Phone.html 119
4. Cellular Networks Weaknesses - Signaling System No7 (SS7).mp4 12M
5.1 Baseband processor wikipedia.org.html 109
5.2 Ubuntu phone OS.html 88
5.3 DeepSec 2010 All your baseband are belong to us by Ralf Philipp Weinmann (Video).html 104
5.4 NSA tracking cellphone locations worldwide, Snowden documents show.html 240
5.5 CyanogenMod (pronounced sigh-AN-oh-jen-mod).html 93
5.6 How the NSA built its own search Google.html 145
5.7 Sim card firm links GCHQ and NSA to hack attacks.html 106
5.8 EFF - The Problem with Mobile Phones.html 112
5.9 replicant.html 85
5.10 Baseband Attacks Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks (Report).html 133
5. Mobile and Cell Phone Weaknesses.mp4 22M
6. How to use a laptop and cellular networks for Internet privacy and anonymity.mp4 19M
7.1 Example - o2Voda Mini Voice Repeater.html 124
7.2 Android Location Strategies.html 128
7. How you are geo located when using a cellular network.mp4 13M