elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
5.9 replicant.html 85
3.2 openbts.org.html 86
5.2 Ubuntu phone OS.html 88
5.5 CyanogenMod (pronounced sigh-AN-oh-jen-mod).html 93
5.3 DeepSec 2010 All your baseband are belong to us by Ralf Philipp Weinmann (Video).html 104
5.7 Sim card firm links GCHQ and NSA to hack attacks.html 106
5.1 Baseband processor wikipedia.org.html 109
3.3 Android - Snoopswitch.html 110
5.8 EFF - The Problem with Mobile Phones.html 112
4.3 Signalling System No. 7 (SS7) - wikipedia.org.html 114
4.9 60 Minutes - Hacking Your Phone.html 119
4.4 SS7 Locate. Track. Manipulate. [31c3] by Tobias Engel (SnoopSnitch) video.html 121
4.6 How to Intercept a Conversation Held on the Other Side of the Planet (slides).html 123
7.1 Example - o2Voda Mini Voice Repeater.html 124
3.4 Android IMSI-Catcher Detector.html 125
7.2 Android Location Strategies.html 128
4.2 Taking up the Gauntlet SS7 Attacks.html 129
5.10 Baseband Attacks Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks (Report).html 133
4.5 Cell Phone Tapping How It Is Done and Will Anybody Protect Subscribers.html 138
4.7 Search and Neutralize. How to Determine Subscriber’s Location.html 139
4.8 Cellular Privacy, SS7 Security Shattered at 31C3.html 139
5.6 How the NSA built its own search Google.html 145
4.1 SS7 hack explained what can you do about it.html 178
3.1 HOWTO GSM Base Station with the BeagleBone Black, Debian GNULinux and a USRP.html 184
5.4 NSA tracking cellphone locations worldwide, Snowden documents show.html 240
1. Goals and Learning Objectives.mp4 1.8M
3. Cellular Networks Weaknesses - IMSI catchers.mp4 11M
4. Cellular Networks Weaknesses - Signaling System No7 (SS7).mp4 12M
2. Cellular Network Weaknesses - The Network Operator.mp4 12M
7. How you are geo located when using a cellular network.mp4 13M
6. How to use a laptop and cellular networks for Internet privacy and anonymity.mp4 19M
5. Mobile and Cell Phone Weaknesses.mp4 22M