Hacking cell phones like Mr Robot

857,567
0
Published 2022-09-18
Elliot hacks the FBI in Season 2, Episode 5 - in this video OTW (Occupy the Web) explains how realistic the hack is. Can this actually be done in the real world? OTW tells us the answers.

OTW loves the Mr Robot TV Series as a lot of them are actually realistic - unlike a lot of other shows. This is our 4th video in the Mr Robot hacking series.

// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw

// MENU //
00:00 - Coming up
00:33 - Intro
00:44 - Mr Robot episode summary
03:41 - Eavesdropping with Femtocells
04:44 - Femtocell diagram
05:13 - Femtocell vs Stingray
06:33 - Accessing the femtocell console
09:46 - Creating your own proprietary cable
11:17 - MonsaVista Linux in IoT deviecs
12:53 - Getting root access and flashing a Linux kernel
15:27 - Effective range of the femtocell
17:20 - Femtocell summary
22:39 - This hack can be done // reality vs movies
23:47 - OTW's Stingray-like device with LimeSDR
24:48 - Femtocell diagram pt. 2
26:07 - Why you can't run a sniffer
28:07 - Eavesdropping with femtocells
28:36 - Femtocells are vulnerable
29:54 - Femtocell hack guide on Hackers Arise
30:52 - Conclusion // What should we cover next?

// Previous Videos in the Series //
Mr Robot Ep 1:    • Hack like Mr Robot // WiFi, Bluetooth...  
Mr Robot Ep 2:    • SMS spoofing and Raspberry Pi Scada h...  
Mr Robot Ep 3:    • Warning! This is how cars are hacked....  

// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: youtube.com/davidbombal

// Occupy The Web social //
Twitter: twitter.com/three_cube

// Occupy The Web books //
Linux Basics for Hackers: amzn.to/3JlAQXe
Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh

// Other books //
The Linux Command Line: amzn.to/3ihGP3j
How Linux Works: amzn.to/3qeCHoY
The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM
Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8

fbi
fbi hacks
hacking fbi
hack fbi
apple
android
iphone
iphone 14
android 12
samsung
mr robot hacks
elliot
elliott hacks the fbi
mr robot
stingray
fbi stingray
femtocell
fbi hacking
cell phone
cell phone hacking
cell phone hack

Disclaimer: This video is for educational purposes only.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#fbi #hack #mrrobot

All Comments (21)
  • @davidbombal
    Elliot hacks the FBI in Season 2, Episode 5 - in this video OTW (Occupy the Web) explains how realistic the hack is. Can this actually be done in the real world? OTW tells us the answers. OTW loves the Mr Robot TV Series as a lot of them are actually realistic - unlike a lot of other shows. This is our 4th video in the Mr Robot hacking series. // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: davidbombal.wiki/otw // MENU // 00:00 - Coming up 00:33 - Intro 00:44 - Mr Robot episode summary 03:41 - Eavesdropping with Femtocells 04:44 - Femtocell diagram 05:13 - Femtocell vs Stingray 06:33 - Accessing the femtocell console 09:46 - Creating your own proprietary cable 11:17 - MonsaVista Linux in IoT deviecs 12:53 - Getting root access and flashing a Linux kernel 15:27 - Effective range of the femtocell 17:20 - Femtocell summary 22:39 - This hack can be done // reality vs movies 23:47 - OTW's Stingray-like device with LimeSDR 24:48 - Femtocell diagram pt. 2 26:07 - Why you can't run a sniffer 28:07 - Eavesdropping with femtocells 28:36 - Femtocells are vulnerable 29:54 - Femtocell hack guide on Hackers Arise 30:52 - Conclusion // What should we cover next? // Previous Videos in the Series // Mr Robot Ep 1: https://youtu.be/3yiT_WMlosg Mr Robot Ep 2: https://youtu.be/7V9_x97s4g8 Mr Robot Ep 3: https://youtu.be/5LvqU3-iINk // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: youtube.com/davidbombal // Occupy The Web social // Twitter: twitter.com/three_cube // Occupy The Web books // Linux Basics for Hackers: amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: amzn.to/3qCQbvh // Other books // The Linux Command Line: amzn.to/3ihGP3j How Linux Works: amzn.to/3qeCHoY The Car Hacker’s Handbook by Craig Smith: amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: amzn.to/3dDUZN8 Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
  • Even for the recognition brian hacks online gets, his skills is so underrated at least by most tech fans in general. I mean I get that there is stamina and all that involved in things like he does but being able to stand so far away and have the ability get the information needed with high speed as expected to hit it perfectly with a paddle just over the net is extremely impressive.
  • @tryser0562
    I wish there was more people like you to stop all these cheaters, they need serious jail time for that, especially when they take money from you in the relationship, keep doing what your doing Johnsonspy on the internet put the wind up these low life oxygen thieves. Love what you guys do keep up the Great work mate well done respect....
  • @user-on1ok6oh7k
    I have very serious doubts about the first time I hired brian hacks online to help get electronic evidence. I am experienced in law enforcement, my family is a law enforcement family, and I have access to the Internet just like anybody else does. Conspiracy to cheat is a very serious deal beaker, and there's no way I could see any attorney that actually claims to be on your side saying it's inadmissible, or this is not something actionable.
  • The efficiency of this Brian hacks online is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Brian!!
  • the two of you combined are the perfect teacher : he presents and explains very clearly, but you, david, are careful to make him "dumb down" as much as necessary, and repeat the steps in sequence, and the repetition makes the information sink in better. 👍👍👍 <3 <3 <3
  • @oyuncu_tv1416
    That feeling when your partner cheated and you don't have the courage to leave him or her so you just dealt with the pain and live everyday asking questions about your worth. This pain is different from the cheating one-- living and seeing him everyday anticipating when will he or she do it again. Your videos are incredibly well done. No critique, thanks for doing this brian hacks online
  • @jpierce2l33t
    Mr. Robot is one of my favorite shows, because I knew that most of the hacks checked out! Love this series!
  • @xxACIDVIRUSxx
    I did this like 12 years ago with the original USRP, I created an OpenBTS in my apartment, and it worked like a charm…I haven’t mess with it since then because I got in trouble but I can only imagine how much more can be done nowadays!
  • @vivekpandey95
    This series is great 👍👍👍👍👍👍 , hope you guys continue it also OTW needs his own channel. he is a wonderful teacher
  • Fun fact, GSM networks did not support mutual authentication between UEs and network. Once the uplink authentication is done, the AuC would simply dump all authentication vectors (RAND, CI, CK, SRES). Nobody anticipated that someone would actually set-up a rogue GSM network to intercept IMSI traffic. Now, it is just a relic of the past. From UMTS onwards, network needs mutual authentication, where network authenticates the UE, and UE authenticates the network. 5G has now insane level of NAS security.
  • @nadanisaini9843
    Account of mine also got hacked and I followed the method as explained in this video but I'm unable to proceed after recording the selfie video. Thank you Johnsonspy . It brings me immense joy to witness his name appearing frequently in comments, a clear indication of the commendable work he’s been doing.
  • @alyssad990
    I feel like just clicking on this video with its title flagged me in some government database, but the content is just too good to miss
  • @Ko-gy1kd
    Love this series so far my favorite
  • I had a similar discussion on one of the HAK5 channel videos about setting up a battery powered device with "free wifi" at some popular places i.e. fast food outlets, as customers are always just connecting without much in the way of self security. With correct configuration it could act like a man in the middle attack by using the vendors wifi to connect with.