Varnost mobilnih komunikacij thumbnail
Pause
Mute
Subtitles not available
Playback speed
0.25
0.5
0.75
1
1.25
1.5
1.75
2
Full screen

Varnost mobilnih komunikacij

Published on Dec 08, 2017780 Views

Related categories

Chapter list

Mobile communications security00:00
Part 1: Identity spoofing00:58
CallerID spoofing - 101:08
CallerID spoofing - 203:01
CallerID spoofing - 304:46
Practical use of spoofing04:56
Part 2: Intercepting (VoIP) communications06:40
Unencrypted vs. encrypted phone call07:46
Part 3: Rerouting outgoing calls09:31
Example: intercepting outgoing calls10:19
Part 4: Rerouting incoming calls/SMS messages12:07
Example: intercepting incoming calls12:33
How to obtain SS7 access?15:34
PART 5: GSM Interception17:09
gr - gsm17:18
Osmocom/gr-gsm18:29
Part 6: IMSI Catchers19:25
IMSI Catchers - 119:41
IMSI Catchers - 220:01
IMSI Catchers - 321:39
Part 7: Mobile Phone Infection22:08
Real Case (Netflow Analysis) - 122:25
Real Case (Netflow Analysis) - 223:50
Questions?24:45