The poetry of (in)security

$ hello

Sniffing GSM Traffic

I have been playing around with the HackRF for the past couple of weeks and progressively exploring the Radio Frequency spectrum. In this post I’ll take you through how to sniff GSM traffic. I’ll be specifically monitoring the Um interface. This in the air interface between the Mobile Station (MS) and the Base Transceiver Station (BTS). The MS in this case will be the mobile phone while the BTS is what the phone connects to on the Mobile network. The BTS is usually hosted on towers which you can spot in various locations. Here is what a typical one looks like.

Read on →

Christian ~ 127.0.0.1

who are you?

I am a passionate Information Security enthusiast. I specialize in Digital Forensics and Incident Response (DFIR). Research and artifacts analysis are the cause of my sleepless nights. I have a keen interest in PC and mobile device malware, I am therefore always tinkering with VMs and mobile phones.

Read on →

The HackRF One: First steps

The wireless world is an area I’ve been interested in for a long time. From the the more common applications such as Wi-Fi, bluetooth and FM to the lesser explored such as radar, satellite and GSM, radio frequency is an area I plan to explore extensively. How awesome is the concept of electromagnetic pulses in this age that is driven by electromagnetism. I digress so let me get back on track, there will be several more posts to explore the possibilities.

Read on →

Saints and Outlaws

I have been teaching a class on Network Security at mlab and one student asked what the state of cyber-security in the country was. In this post I explain the current state and the outlook over the coming years.

Read on →

The BRO Chronicles 2

In part one I analysed the data communication that takes place on a phone over a one hour period. Read the post here for details and background info. Here, I go further and analyse what happens over a twelve hour period of normal phone usage. I ran BRO on my phone from 6:40am to 6:40pm and ensured that data was on and WIFI off the whole time.

Read on →

Hackers Wanted!

>Some expletives have been edited out<

>The catching of feelings is encouraged<

>Heavy Hip Hop references included<

 

>Begin Rant<

Read on →

The BRO Chronicles 1

I was having a random conversation with Christian. The conversation was based around Kali Nethunter and all the cool stuff that can be done with it. The discussion was revolving around “man in the middle attacks” and I suggested that having BRO running on Nethunter would be awesome. This got him excited and true to his nature, he couldn’t rest till he’d attempted it. Long story short, he did some amazing work and had it running soon afterwards complete with a detailed “how to” guide. Here’s a link to the guide.

Read on →

Learning to hack

Becoming a skilled hacker or the politically correct “information security specialist” doesn’t have a straightforward defined path. Here I will try to layout what constitutes a good way to go about it.

Read on →

AfricaHackon - Be part of the story

I first heard of AfricaHackon at my previous job where I was working in IT. A colleague and friend told me about a conference about information security that would be held at our building. This was early last year. Being in charge of the network, I would be assisting in setting up internet access for the conference. Now when you’re incharge of the network and you hear you’ll be giving access to your network to a room full of the best “hackers” in the country, you get a bit nervous. I use the word “hackers” in quotes because that’s where I’d like to start.

Read on →