<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>DragonOS Focal SS7 Any Time Interrogation (SigPloit, GSMEvil2)</title>
        <link>https://stream.echo6.co/videos/watch/c55f5da4-9e41-486f-9fa8-a2ee3e05c330</link>
        <description>Recommended to research and read up on SS7 before watching. In this video I show how to install and use SigPloit to perform an Any Time Interrogation against a simulated SS7 gateway on DragonOS Focal. SigPloit is a signaling security testing framework. The video ends with a quick look at GSMEvil2 and how to install it (no example usage provided). Hardware: RTL-SDR (optional for GSMEvil2), Topics covered: Installing SigPloit, Peforming a simulated Any Time Interrogation, Installing GSMEvil2, Tools: https://github.com/SigPloiter/SigPloit, https://github.com/sharyer/gsmevil2, Install steps, sudo apt-get install lksctp-tools python-dev-is-python2 build-essential libssl-dev libffi-dev libxml2-dev libxslt1-dev zlib1g-dev cd SigPloit sudo pip2 install -r requirements.txt</description>
        <lastBuildDate>Mon, 04 May 2026 01:22:23 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>DragonOS Focal SS7 Any Time Interrogation (SigPloit, GSMEvil2)</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/c55f5da4-9e41-486f-9fa8-a2ee3e05c330</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=c55f5da4-9e41-486f-9fa8-a2ee3e05c330" rel="self" type="application/rss+xml"/>
    </channel>
</rss>