NoGoolag
4.64K subscribers
19.6K photos
10.9K videos
752 files
19.7K links
Live free!

๐Ÿ“ก @NoGoolag

FAQ:
http://t.me/NoGoolag/169

โ˜…Group:
https://t.me/joinchat/nMOOE4YJPDFhZjZk

๐Ÿ“ก @Libreware

๐Ÿ“š @SaveAlexandria

๐Ÿ“ก @BallMemes

FORWARDS ARE NOT ENDORSEMENTS

๐Ÿ’ฏ % satire OSINT
Download Telegram
โ€” LibreCellular 21.04 documentation โ€“ https://librecellular.org/

The LibreCellular project aims to make it easier to create #4G cellular #networks with open source software and low cost software-defined radio (#SDR) hardware. Seeking to achieve this via validated hardware and software configurations that are subjected to rigorous testing, together with additional tooling and #documentation for repeatable deployment.

LibreCellular will build on the work of numerous existing open source software and hardware projects, related to both the #cellular platform itself and associated test #infrastructure. Where necessary additional components will be developed, with any software source code and #hardware designs published under #opensource licences. The focus is very much on integration, testing, packaging and documentation, reusing and building upon existing solutions..

#LibreCellular #CellulaireLibre
Media is too big
VIEW IN TELEGRAM
DragonOS FocalX Cellular Security Research w/ LTESniffer (srsRan, LimeSDR, B205mini) part 1

The purpose of this video is to support security and analysis research on cellular networks. It's also created from an educational perspective to help learn more about cellular networks in general by means of a controlled lab environment and software defined radios. Privacy is respected at all times and any use of this tool or software defined radios in general is on the user to follow all local regulations.

With that said, LTESniffer is easily installed in DragonOS FocalX, in fact it can be installed with apt after setting up an install with the following PPA.
https://github.com/alphafox02/focalx_ppa

To learn more about LTESniffer please see the following project page
https://github.com/SysSec-KAIST/LTESn...

In this first video on cellular security research, I focus on the general lab environment setup in order to use the downlink functions of the tool.

#SDR #Cellular #IMSI #LTE
Media is too big
VIEW IN TELEGRAM
Passive IMSI Catching On A Real GSM Network Using A RTL-SDR And Gr-GSM

Recently, I had the opportunity to play around with a real 2G cellular network. So, here is a quick video of how passive IMSI catchers are constructed using a couple of Linux software tools and an RTL-SDR dongle.

It is a common misconception that mobile phones are tracked via their telephone numbers or the IMEI number of the handset. IMSI is an abbreviation that stands for 'international mobile subscriber identity' and is the unique identifier of a mobile phone subscribers SIM card on a cellular network. IMSI numbers are used in most mobile phone communication generations from 2G, all the way up until the more modern 5G.

The IMSI number of a SIM card is very well protected in 3G, 4G and 5G. However, in the case of the 2G mobile communication standard GSM, these unique identifying values are not so well protected from the prying eyes of governments, militaries, law enforcement and spy agencies.


#SDR #IMSI #ImsiCatcher #GSM #Cellular
Media is too big
VIEW IN TELEGRAM
GSM Voice Decryption From Start To Finish (2G Non-Hopping Only)

The GSM data used in the making of this video was recorded and decrypted with unanimous consent from the owner(s) for the purpose of demonstrating the 2G decoding features of gr-gsm and for evaluating cellular network security.

Due to it's complexity and difficulty, decoding 2G phone calls is considered by most to be the hardest task to accomplish in the realm of GSM decoding. Differing voice codecs, varying channel data rates, arbitrary allocation of frequency hopping and carrier-specific network configurations add too many variables into the mix to make it a straight-forward enough goal to achieve.

I showcase the entire 2G voice decryption process from start to finish, excluding the actual recording of the GSM data

This video was made for purposes of education & experimentation only #IMSI-CATCHING, #SMS-SNIFFING and voice call #interceptior on #CELLULAR #NETWORKS is illegal & punishable by hefty fines & imprisonment

#GSM #2G #SDR #GRsdm
Forwarded from Save Alexandria
Raspberry Pi 5 for Radio Amateurs

- Program and Build Raspberry Pi Based Ham Radio Utilities with the RTL-SDR

#electronics #raspberrypi
#RTL #SDR #HamRadio #RadioAmateur
Media is too big
VIEW IN TELEGRAM
DragonOS FocalX Transmit and Receive Meshtastic w/ SDR (hackRF, Airspy R2, R36)

"In this video, we take a deeper dive into the setup and usage of the meshtastic_SDR repository, which now enables the transmission and reception of Meshtastic using Software Defined Radios (SDRs). Recent updates have made this possible by partially leveraging GNU Radio flow graphs for both RX (receive) and TX (transmit), and integrating Python scripts that connect to ZMQ sources for message input and ZMQ outputs for message decoding.

I demonstrate the setup using a HackRF for the transmit side and an Airspy R2 for receiving. We also verify the results of TX and RX using a standard Meshtastic receiver to ensure accurate performance.

Explore the meshtastic_SDR repository here: meshtastic_SDR.

WarDragon available here (when in stock)

#SDR #Meshtastic #AirSpy #DragonOS #HackRF
HackRF PortaPack H4M with Mayhem Firmware โ€“ A Powerful Handheld SDR Toolkit | Mobile Hacker

In the Q4 of 2024, a new #SDR (Software Defined Radio) was released: the HackRF PortaPack H4M, shipping with the Mayhem firmware. Whether youโ€™re a hobbyist, hacker, ham radio enthusiast, or security researcher, this compact device brings a full-featured radio lab to your pocket.

In this blog, weโ€™ll walk you through the essentials of the new H4M, flashing Mayhem firmware, copy necessary files and apps, including its differences from other tools like its predecessors, specifically H2, its hardware updates, and how to get the most out of it with both standalone and PC-connected use. If youโ€™re new to SDR, just like me, and looking to dive deep, I recommend following YouTube creators like sn0ren, Talking Sasquach, Jeremiah of All Trades, who consistently provide excellent #RF content.

#Hacking