• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
    • ΤWELVESEC
    • CLIENTS
    • HEADQUARTERS
    • CAREERS
    • NEWS
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
Using a GSM tester to intercept calls and SMS (Part 2): Equipment and setup

Using a GSM tester to intercept calls and SMS (Part 2): Equipment and setup

by Iosif Androulidakis | Mar 10, 2016 | 0 comments

Practical Setup and tools In the previous “Using a GSM tester” post, we examined the theoretical aspect of the fake base station attack. Today, we will focus on more technical details, discussing about the equipment needed, and the setup required for the...
Using a GSM Tester to itercept calls and SMS (Part 1)

Using a GSM Tester to itercept calls and SMS (Part 1)

by Iosif Androulidakis | Jan 19, 2016 | 0 comments

In the next few blog posts we will focus on both landline and mobile telecommunication systems security. This is the first in a series of articles that will present the theoretical background behind a method to intercept calls and SMS in GSM networks, while the next...

LATEST POSTS

  • The Iran War And The Global Digital Threat Landscape March 3, 2026
  • RCE Via Arbitrary File Upload at Open eClass January 16, 2026
  • BoFs Are Not Dead January 14, 2026
  • Is user training a good thing? December 9, 2025
  • The three vectors of a pentest engagement. November 14, 2025
  • Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional October 17, 2025
  • Red Teaming: The Art of Adversarial Simulation August 19, 2025

TAGS

ADSL airlines ALPHA BANK Architecture Review adb ALDI Android Security Apple Athens 0-day Application Penetration Test Aerospace APPI 0-days 0day 13033 Android App Reversing Application Source Code Review android apk

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2025 Twelvesec | Created by Amiad