GSM Hacker资料汇总

  • A+
所属分类:无线安全

 

2013年11月5日更新详情:
http://www.nigesb.com/gsm-hacker-abhout-sms-sniffer.html

真的是忙得一塌糊涂,我擦,拷贝粘贴一些东西,今天跟基友在讨论了下GSM Hacker的问题,大体上的意思是实现GSM Sniffer,由于GSM是可选加密的,在某个国度,貌似是木有开启加密的,当然加密了也是可以破解的,也是彩虹表原理,叫Open Source GSM Cracking Software。因此就可以实现了。当然这种geek的东西,肯定又是老外的资料多了,中文资料少得可怜,这里就汇总一下吧,部分自己找的,部分是某基友找到的,E文不好的加紧学吧,木有时间翻译。首先是原理以及科普:

On day one of the recent 2011 Chaos Communication Camp – an annual summer computer security conference this year held in Germany – Karsten Nohl & Luca Melette demonstrated how to sniff unencrypted GPRS from the air using a £10 Motorola C123 mobile phone & a laptop running Linux.

Actually you need four £10 phones and serial to USB leads – the phones can be Motorola C115 or C118 or C123 or C139 or C140 or V171 models or Sony Ericsson J100i. Two of the phones need the internal filters replacing before you can sniff the uplink above 20 metres. With the filters replaced you can sniff the uplink up to 200 metres, with external antennas, probably. You need FTDI versions of the cables to be able to grab four timeslots from each of the four phones simultaneously. As you can tell, this is nowhere near the script kiddie level just yet. But just twelve months ago sniffing any GSM traffic without a £1000 USRP device wasn’t really possible.

The PDF slides from the talk are here.

The technique builds on work from the Osmocom-bb project – which uses the same £10 mobile phone to implement a free software GSM stack, when the phone is attached to a laptop, using a cheap USB to RS232 cable.

Some countries networks use encryption on their GPRS links, but some countries networks choose not to, so they can monitor traffic like Skype. Even if you use a 3G iPhone, Blackberry or Android phone it will always step down to GPRS when the 3G signal isn’t available (it might be someone running a UMTS 3G signal jammer).

More information can be found at srlabs.de

然后是用到的手机里面的rom,名字叫做OsmocomBB,是一个可以用在MotorolaC123等相似型号手机上的rom,实现过程是要用特殊的线材,把rom先刷进手机,然后就可以telnet进去进行操作咧,翻了一下资料,大概的理论应该是这样来的了。貌似需要买一根老式数据线打开数据线进行针脚焊接。

支持的手机型号,淘宝上应该有的有卖,几十块钱:

Supported Phone hardware

Information specific to certain Calypso based phones that we support

Designed + Manufactured by Compal, OEM by Motorola
MotorolaC115/C117 (E87)
MotorolaC123/C121/C118 (E88) -- our primary target
MotorolaC140/C139 (E86)
MotorolaC155 (E99) -- our secondary target
MotorolaV171 (E68/E69)
SonyEricssonJ100i
Designed by Pirelli/Foxconn?, manufactured by Foxconn
Pirelli DP-L10
Designed by Openmoko, manufactured by FIC
Neo 1973 (GTA01)
OpenMoko - Neo Freerunner (GTA02)

搬运一个帖子

感谢旺财的指导,才顺利安装与使用OsmocomBB。
之于OsmocomBB有什么用,大学可以在网上查一下,我就不多说了。
大家也可以上官网查看手册,http://bb.osmocom.org/trac/wiki/GettingStarted。
我的环境是:系统UBUNTU 11.04 ,手机C118。
1.安装
$sudo apt-get install libtool shtool autoconf git-core pkg-config make gcc
还要安装 toolchain 官网地址:http://bb.osmocom.org/trac/wiki/toolchain。
$sudo add-apt-repository ppa:bdrung/bsprak
$sudo apt-get update
$sudo apt-get install arm-elf-toolchain
$sudo git clone git://git.osmocom.org/osmocom-bb.git
$cd osmocom-bb
$sudo git pull --rebase
$export PATH=$PATHHOME/install/gnuarm-3.4.3/bin
$cd src
$sudo make
2.运行
$cd ./osmocom-bb/src/host/osmocon
$./osmocon -p /dev/ttyUSB0 -m c123xor ../../target/firmware/board/compal_e88/layer1.compalram.bin
ttyUSB0 是本机的USB接口,可以用dmesg | grep USB查看
layer1.compalram.bin是上面MAKE生成的BIN
之后轻按C118的开机建,从蓝色的屏上显示 layer1.BIN,说明FLASH已转到手机上了,一切顺利。
再开一个命令行http://bb.osmocom.org/trac/wiki/mobile
$sudo touch ~/.osmocom/bb/osmocom.cfg
$cd osmocom-bb/src/host/layer23/src/mobile/
$./mobile -i 127.0.0.1
可以在界面看数据流,或TELNET回本机4247端口,之后会就像CISCO之类的命令行模式了
$telnet localhost 4247

OsmocomBB官方也有挺多教程,的比如C123的教程,还有一个德国佬的博客上也有一个教程,看来大家学看片要学日语,学技术不仅要会英语,还要会学德语呀,蛋疼,德国佬的文章在这里,还有一个旺财的博客上的文章和介绍,他在国外,接触到的东西也比较新和多,大家也可以去看看。

中文资料少,也敏感,希望大家低调行事。

OsmocomBB中涉及到攻击部分的代码没有公布,作者说只是在源代码的基础上进行一些修改而已,但是如果你根本没有理解GSM栈以及协议,修改和变写攻击模块和嗅探模块似乎太难了。建议没有把握的童鞋还是不要入坑了,我就是入了坑,也没空仔细研究代码。对GSM无线什么的有兴趣,可以去看看SDR什么的,芯片淘宝也不贵,嘿嘿。

  • 我的微信
  • 这是我的微信扫一扫
  • weinxin
  • 我的微信公众号
  • 我的微信公众号扫一扫
  • weinxin

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: