> >

No 01 Security vulnerability in all of our mobile phones - All mobile phones can be hacked

These days all of us use at least one mobile phone. Some of us still use the old mobile phones that come with the operating systems that have been developed by mobile phone manufacturing companies and others use the smart that use Android or IOS operating system.

Whether you any of these operating systems in your any kind of mobile phones you are not safe because of the usage of network technology they used to make your calls, text messages, and to an established data network to the internet.

If someone can spend a little bit of his money to buy a software define radio also known as an SDR, they can hack into your mobile phone and access all of your data.

SDR such as RTL-SDR Blog Dongles, HackRF One, Ubertooth One, YARD Stick One, Seeedstudio KiwiSDR, NESDR Mini, NESDR Nano, Ham It Up, NESDR Nano, NESDR SMArt, Bladerf SDR, and USRP SDR has all the features to do these kinds to hacking attacks.

Some of these SDR’s featured with both receiving and transmitting radio frequencies from 1Mhz to 6Ghz. So all of our electronic devices that use these wireless networks are vulnerable to these hacking attacks.

As you can see below figure, nowadays most of our electronics devices used these wireless networks to provide their services.

In this image, you can see that our mobile phones use the radio frequency between 300Mhz to 3Ghz for their networking usage through network technologies such as GSM, 2G, 3G, 4G, and 5G.

If someone has a software define radio mentioned above, they can use it with open-source software tools such as Kali Linux, SigintOS, SDR#, Open BTS, GNU Radio Companion, GR-GSM, Wireshark, IMSI Catcher, GQRX, RTL SDR Tools, and Kailbrate to hack into your mobile device.

Today I’m going to demonstrate to you one of these attacks using a 20$ worth RTL SDR Blog dongle that I have purchased from eBay.

In this demonstration, I going to use Linux operating system distribution called SigintOS that come with all the open-source software tool that I need to do this hacking attack.

Now it's time to watch the video demonstration. Just watch the below video and see how easy it is to hack your mobile phone.

Tutorial: How to Hack into Mobile Phones Using Software Define Radios

Special Note: Please note that in some countries, IMSI catching is illegal. So if you don't have the authority to do these things in your country. Please do not follow these steps and don't use these open-source software tools.

As an educator and researcher, I'm doing these things only to show you how vulnerable our present mobile networks to hacks and for the education purpose only.

Today, we are going to demonstrate to you mobile network hacking.

Using RTL SDR Dongle and Linux Base Distribution called SigintOS.

I have installed, SigintOS operating system into my VMware Workstation on my Windows 10 PC.

And, I have plugin my RTL SDR Dongle into the Windows 10 PC and it works with the SigintOS inside my VMware Workstation. 

So let's start the hacking.

First I’m going to open my VMware Workstation.

Then I’m selecting SigintOS on the left side menu and click on the “Play Virtual Machine” option on the right side.

Now we should wait until our SigintOS Virtual Machine Start.

This will take some time 3 to 5 minutes and it depends on your PC performance.

After SigintOS bootup, you will be directed into SigintOS Desktop, without asking for any user name or password.

Now let's check our RTL SDR Dongle is correctly connected to our SigintOS virtual machine.

You can do this by right-clicking on that relevant USB icon in the upper right corner.

Now let's open “SigintOS Tools” by clicking on its icon on the left side.

Now you need to give time and it will open after some time.

Now check whether your RTL SDR Dongle is identified, or not by the SigintOS Tools.

If it has been identified correctly, you can see a Green color light on the bottom right side of the SigintOS Tools window.

If everything is okay, let go to the “GSM Search” tool to find a Mobile Network Base Station also known as Mobile Signal Tower nearby to your location. This will take some time and will find a mobile tower near your location and its GSM frequency.

So let's run this tool by clicking on the “Start GSM Search” button at the bottom left side of the SigintOS Tools window.

Now you should wait some time so that this tool can finish its scanning using RTL SDR Dongle and its Antenna.

You can see that I have found one mobile network tower near to my location and it's working GSM frequency. Its 958.8 Mhz

This tool will provide you more technical details about mobile network towers in your location.

But at this moment we just need its working GSM frequency.

So that we can work with the “IMSI Catcher” tool to find IMSI numbers of mobile phones connected to that specific mobile network tower.

So let's go to the IMSI Catcher tool and give the GSM Frequency that we have found in the GSM Searching tool.

In my case, it is 958.8 Mhz

And you also need to set PPM variable as 30 if you are using RTL SDR Dongle.

Now let’s start hacking into mobile phones by clicking on the “Start IMSI Catcher” button at the bottom left side corner of the SigintOS tools window.

Now you must give some time to this tool and it will provide you a whole bunch of technical information including IMSI numbers, about the mobile phones that use 958.8 Mhz frequency to connect with its mobile network tower.

Using this information, you can hack into this mobile phone and do various hacking such as track mobile phone location and more.

Now let's use some of this information and track one of the mobile phone locations using https://cellphonetrackers.org

If you can use SDR radios likes, HackRf One, Bladerf, or USRP you can do more hacking likes, sending bulk SMS’s using your own sender IDs for free and getting free calls. If you do some more experiments you can even read SMS messages on other mobile phones.

That’s it for today.

Keep in touch with the PC World Online Magazine for more tutorials like this.

If you like this video tutorial and want to watch more, you can always subscribe to our YouTube Channel.

To protect your electronic devices from these kinds of hacking attacks, you must always be aware of these kinds of technologies. Because Hackers always find new vulnerabilities in any kind of technology people invent in this world.

Thank you very much for watching my video and if you like to watch more video demonstrations like this in the future, you can always subscribe to the YouTube channel.

Always Learn and Be Safe.

Rate this item
(0 votes)

Leave a comment

Please do not enter any marketing or illegal statements | කරුණාකර අලෙවිකරණ හෝ නීති විරෝධී ප්‍රකාශන ඇතුළත් නොකරන්න.

Subscribe to Weekly Email Newsletter




Joomla Extensions powered by Joobi

Articles Archive

Articles Calendar

« January 2021 »
Mon Tue Wed Thu Fri Sat Sun
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
007819229
Today
Yesterday
This Week
Last Week
This Month
Last Month
All days
29961
68711
396665
6622051
747076
651269
7819229
Your IP: 18.204.42.98
2021-01-16 10:35

Video Of The Day

Go to top