InfoSecTube
1.7K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
📡 1. IMSI-catcher

IMSI = International Mobile Subscriber Identity — a unique number tied to your SIM card and mobile identity.

An IMSI-catcher is a fake base station that pretends to be a legitimate cell tower so that nearby phones connect to it.
Once a phone connects, the attacker can:

Request the IMSI before encryption starts — revealing the device’s real identity (often used to track people).

Downgrade the connection to an older, insecure network (like 2G).

Potentially intercept calls, SMS, or metadata if the attack is advanced.

📍 Real-world example: Law enforcement and attackers have used IMSI-catchers (like Stingrays) to track phones in protests or monitor specific targets.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
📶 2. Downgrade Attack

A downgrade attack happens when an attacker forces your phone to fall back to an older, weaker network protocol — like pushing it from 4G/5G down to 2G — because older generations have little or no encryption.

How it works:

The fake base station advertises only 2G support (or blocks higher ones).

The phone, trying to stay connected, switches to 2G.

The attacker now has access to a less secure connection and can more easily intercept traffic or request the IMSI.

📍 Why it’s dangerous: Even if your phone is designed for secure 4G/5G communication, a downgrade lets attackers exploit the weak spots in legacy protocols.


🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
🔓 3. Insecure Attach

When a phone connects to a network, it goes through an attach procedure — essentially a handshake to authenticate and establish encryption.

An insecure attach attack manipulates this process so that the connection happens without proper encryption or integrity checks.

Attackers might:

Advertise that encryption isn’t required (e.g., use cipher algorithm A5/0 — which is “no encryption”).

Exploit phones that accept insecure parameters without warning the user.

Intercept communications or inject malicious traffic before the network applies proper security.

📍 Why it matters: If the attach step is insecure, even strong networks become vulnerable because the phone may trust a rogue base station.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
🔴 تزریق کد در زمان اجرا با Runtime Patching

🔸درواقع Runtime Patching یعنی تغییر رفتار برنامه‌ها بدون دسترسی به سورس کد و قبل از اجرای کامل.

🔹در سطح حرفه‌ای، این کار با hook کردن توابع، دستکاری import table و حتی overwrite کردن کد ماشین در حافظه انجام می‌شود. ابزارهایی مثل Frida و DynInst برای تحلیل و inject کدهای سفارشی کاربرد دارند. این تکنیک می‌تواند APIهای امنیتی را دور بزند یا داده‌ها را قبل از رمزنگاری capture کند. در مقابل، سیستم‌ها با Integrity Checks و DEP/NX سعی می‌کنند از آسیب جلوگیری کنند.

⭕️در نتیجه Runtime Patching یک سطح وحشتناک از کنترل برنامه‌هاست که بدون آن، تحلیل عمیق و نفوذ حرفه‌ای ممکن نیست.

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
InfoSecTube pinned «🎯 دوره تست و نفوذ پیشرفته وب (سناریو محور) – قسمت اول لینک 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us»
InfoSecTube pinned «🎯 دوره تست و نفوذ پیشرفته وب (سناریو محور) – قسمت سوم لینک 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us YouTube»
InfoSecTube pinned «🎯 دوره تست و نفوذ پیشرفته وب (سناریو محور) – قسمت هفتم لینک 🎯@InfoSecTube 📌YouTube channel 🎁Boost Us»
🔐 What is Oblivious RAM (ORAM)?
🧠💾 ORAM is a cutting-edge cryptographic technique designed to hide memory access patterns. Even if an attacker is watching every memory read/write, ORAM makes it look like random noise—no clue what data is actually being touched!

📦 How?
It works by shuffling and re-encrypting data every time it’s accessed. This makes all memory operations indistinguishable to an outside observer. Think of it as the digital equivalent of mixing cards after every draw. 🃏🔁

⚠️ The Catch?
This privacy comes at a cost: ORAM introduces significant performance overhead, which makes it impractical for high-speed or real-time systems… for now. ⏱️🚫

🔍 Stay tuned as researchers continue pushing the limits to make privacy-preserving memory more usable!

#CyberSecurity #Privacy #ORAM #ObliviousRAM #MemorySecurity #InfoSec #Cryptography #InfoSecTube

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1
☠️Someone has recreated all of Epstein’s emails as a fully functional Gmail-style inbox — it even has a search feature! 👀📧
It’s honestly impressive how close it feels to the real Gmail interface and how easy it is to browse through the messages.
Link

🎯@InfoSecTube
📌YouTube channel
🎁Boost Us
1