• Follow
  • Follow
  • Follow
  • Follow
  • Follow
Twelvesec
BLOG
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
  • TOOLS
  • BLOG
  • ABOUT US
    • ΤWELVESEC
    • CLIENTS
    • HEADQUARTERS
    • CAREERS
    • NEWS
  • SERVICES
    • CYBER ASSURANCE
    • SECURITY MANAGEMENT
    • INCIDENT HANDLING & RESPONSE
    • SECURITY TRAINING
    • SECURE SDLC
  • SECTORS
    • Aerospace
    • Automotive
    • Defence
    • Finance
    • Healthcare
    • Law enforcement & Security agencies
    • Manufacturing
    • Maritime
    • Public sector
    • Rail
    • Retail
    • Software development
    • Telecommunications
    • Tourism
  • TOOLS
  • BLOG
  • ABOUT US
    • Twelvesec
    • Clients
    • Life @ Twelvesec
    • Careers
    • News
    • Contact
Using a GSM tester to intercept calls and SMS (Part 2): Equipment and setup

Using a GSM tester to intercept calls and SMS (Part 2): Equipment and setup

by Iosif Androulidakis | Mar 10, 2016 | 0 comments

Practical Setup and tools In the previous “Using a GSM tester” post, we examined the theoretical aspect of the fake base station attack. Today, we will focus on more technical details, discussing about the equipment needed, and the setup required for the...
Using a GSM Tester to itercept calls and SMS (Part 1)

Using a GSM Tester to itercept calls and SMS (Part 1)

by Iosif Androulidakis | Jan 19, 2016 | 0 comments

In the next few blog posts we will focus on both landline and mobile telecommunication systems security. This is the first in a series of articles that will present the theoretical background behind a method to intercept calls and SMS in GSM networks, while the next...

LATEST POSTS

  • Is user training a good thing? December 9, 2025
  • The three vectors of a pentest engagement. November 14, 2025
  • Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional October 17, 2025
  • Red Teaming: The Art of Adversarial Simulation August 19, 2025
  • Threat Led Penetration Testing: Simulating Tomorrow’s Attacks, Today July 11, 2025
  • Why You Need A Penetration Test Like You Need A Vaccine May 23, 2025
  • Digital Operational Resilience Act – DORA – Part II March 7, 2025

TAGS

ALDI Athens apk 13033 0day Application Source Code Review Android App Reversing adb 0-days Apple Aerospace android APPI Architecture Review ALPHA BANK ADSL Android Security 0-day Application Penetration Test airlines

ΝΟΤΕ

* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.

STAY CONNECTED

[email protected]

+30 211 182 21 58

LEGAL

  • DATA PROTECTION POLICY
  • TERMS & CONDITIONS

NAVIGATE

  • CONTACT
  • BLOG
  • CAREERS
Copyright 2025 Twelvesec | Created by Amiad