Cellular Network Security Course

10 Hours
All levels
10 lessons
0 quizzes
243 students

What You’ll Learn

  • Understand how IMSI Catcher works.
  • Learn to hack and use IMSI Catcher.
  • Understand signal systems and cellular network sniffing.

Course Content

10 Sections • 10 Lectures

About this course:

Explore IMSI Catcher, SS7, RTL-SDR, HackRF One, USRP, BladeRF, SRSLTE, OpenLTE, OsmocomBB, and more.

By the Numbers

  • Skill Level: Beginner Level
  • Languages: English
  • Captions: Yes
  • Lectures: 10

Features

  • Compatible with Windows 10 & 11
  • Compatible with macOS
  • Accessible on iPhone/iOS
  • Accessible on Android

Description

An IMSI catcher, or international mobile subscriber identity-catcher, is a device used for intercepting cellular mobile phone traffic and tracking the location of mobile phone users. It operates as a fake mobile phone tower between the target phone and real service provider towers, making it a man-in-the-middle (MITM) attack.

The 3G or 4G wireless cellular network typically requires mutual authentication between the handset and the network. However, IMSI Catchers may force a downgrade to networks that do not require such authentication.

Required Hardware and Software

Hardware

  • USB DVB-T key (RTL2832U) with antenna (less than $15)
  • HackRF One
  • USRP or BladeRF

Software & OS

  • GR-GSM Tool for 2G
  • OsmocomBB
  • OpenLTE
  • SRSLTE
  • DragonOS
  • SigintOS

What You’ll Learn

  • How IMSI Catcher and SS7 work.
  • How signal systems operate.
  • What are OsmocomBB, SRSLTE, and OpenLTE.
  • The role of encryption in cellular networks.

Who This Course is For

  • Students who want to learn cellular network sniffing.
  • Individuals looking to understand signal systems.
User Avatar

Dmitry Ivanovich Petrov

Hello and welcome to my website. My name is Dmitry, and I am a highly skilled cybersecurity professional with over five years of experience in the field. I am based in Russia and have a passion for helping individuals and organizations improve their cybersecurity posture to protect their valuable assets. My expertise lies in network security, data protection, threat analysis, and incident response. In addition to my experience, I hold the Certified Ethical Hacker (CEH) practical certification, which is a testament to my skills and knowledge in the field. Throughout my career, I have demonstrated a commitment to staying up-to-date with the latest cybersecurity trends and technologies, and I pride myself on being a lifelong learner in this ever-evolving field. My goal is to help my clients identify and mitigate cyber threats and improve their overall security posture. Thank you for visiting my website, and please don't hesitate to contact me if you have any questions or if you would like to discuss how I can assist you with your cybersecurity needs.
Close Menu
×
×

Cart