Sign in to follow this  
Followers 0
mrlordz55

How do i Intercept a mobile phone

6 posts in this topic

Hi All,

please how can i intercept a mobile phone,by receiving all sms sent to phone either in my own phone or in my email.Have search the web and i got some mobile spy software.But i need something that i can use without installing anything on my victim's phone.

please help,Thanks

0

Share this post


Link to post
Share on other sites

sounds like you are attempting to perform an illegal wiretap...

check out this website, they should be able to assist you, since they are very capable of illegal wiretaps and electronic surveillance http://tinyurl.com/3dzwmx

0

Share this post


Link to post
Share on other sites

Even if what you were doing was not illigal I dont think you'd be able to pull it off.

If you gave up when you found mobile spy software I dont think you're going to be able to comprehend a MITM attack on a cell tower.

Sorry.

0

Share this post


Link to post
Share on other sites

Hi All,

please how can i intercept a mobile phone,by receiving all sms sent to phone either in my own phone or in my email.Have search the web and i got some mobile spy software.But i need something that i can use without installing anything on my victim's phone.

please help,Thanks

To do this you'd need to perform a "man-in-the-middle" attack as the previous poster mentioned. Essentially, you'd want to use a device that would, in a moderate range, emulate a cellphone tower. The victim's device would connect to this tower (believing it to be a real cell tower), and this device would connect to the real cellphone tower. Such a device could then be configured to dump the contents of any communication that occurred while the device was relaying the user's call. This is a very impractical attack in almost every circumstance, and although it answers your question, I don't think it suits your needs. That said, you don't seem to have much interest in learning how cell security works here. From your post, most people would infer that you view this sort of thing as more of a means to an end; this is the wrong place to look for help with that.

1

Share this post


Link to post
Share on other sites

Hey,

It can be done.. did it myself. Get a Linux box with Backtrack5. It will make it so that other targeted phones are tricked into thinking that your phone is a cell tower and all traffic goes through that phone.. emails, pics, texts, etc. This article will explain a lot and you will be able to engineer from here.. just think.

http://www.popsci.com/diy/article/2011-10/you-built-what-remote-controlled-hacker-drone

0

Share this post


Link to post
Share on other sites

Hey,

It can be done.. did it myself. Get a Linux box with Backtrack5. It will make it so that other targeted phones are tricked into thinking that your phone is a cell tower and all traffic goes through that phone.. emails, pics, texts, etc. This article will explain a lot and you will be able to engineer from here.. just think.

http://www.popsci.com/diy/article/2011-10/you-built-what-remote-controlled-hacker-drone

Linux box with bt5.... and;

Time: Two years

Cost: $6,200

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0