RedTeaming from Zero to One – Part 2
This is a continuation to the last blog in the series – RedTeaming from Zero to One – Part 1. I strongly recommend everyone who is reading this to first…
RedTeaming from Zero to One – Part 1
Prologue This post is particularly aimed at beginners who want to dive deep into red teaming and move a step ahead from traditional penetration testing. It would also be helpful for…
A guide to Linux Privilege Escalation
What is Privilege escalation? Most computer systems are designed for use with multiple users. Privileges mean what a user is permitted to do. Common privileges include viewing and editing files, or…
Automating IVR pentesting
A year ago, I got an opportunity to work on a project on IVR pentesting which involved the security assessment of a major financial IVR system. It’s not something many…
Dissecting GSM encryption and Location update process
Have you ever wondered as what happens when you turn on your mobile phone? How does it communicate to the network in a secure manner? Almost all of us would…
Active analysis of a GSM call through osmocom-bb
In the last blog, we learnt how to do passive sniffing of gsm data using a RTL-SDR. I don’t wanna get much into what can be further done with passive analysis…
Passive GSM sniffing with Software defined radio
I have been working on Telecom Security and Software defined radio since a few months and I noticed that there are very limited resources on the internet for beginners who…