[A51] Use Motorola C123 to capture gsm

Karsten Nohl nohl at virginia.edu
Sun Aug 11 14:20:53 CEST 2013


Dear Philipp,

We are not publishing attack tutorials. The line we are walking -- between warning about possible abuse and enabling it -- is already very fine.

Cheers,

     -Karsten

On Aug 11, 2013, at 13:21 , Philipp Hoffmann <phoffmann10 at icloud.com> wrote:

> Dear Karsten,
> 
> thanks for your reply.
> 
> Could you post us the basic steps on console to decrypt calls using OsmocomBB and Kraken?
> 
> I have already installed OsmocomBB and Kraken with your rainbow table.
> 
> In the next days I will flash a cheap Motorola C123 with OsmocomBB's firmware to use it for gsm sniffing.
> 
> Thanks and best regards,
> Philipp.
> 
> Von meinem iPhone gesendet
> 
> Am 10.08.2013 um 22:55 schrieb Karsten Nohl <nohl at virginia.edu>:
> 
>> Dear Philipp,
>> 
>> The tool of choice is OsmocomBB's burst_ind branch. It captures call data, incl. hopping calls, and can be combined with Kraken for decoding. However, a how-to for merging the two is not available.
>> 
>> Cheers,
>> 
>>    -Karsten
>> 
>> On Aug 10, 2013, at 19:30 , Philipp Hoffmann <phoffmann10 at icloud.com> wrote:
>> 
>>> Hi list,
>>> 
>>> I have followed Srlab's Airprobe How-To page. Question: Is it possible to capture a *.cfile also with a Motorola C123, instead of a URSP box? Our aim is in decrypt our own calls.
>>> 
>>> Thanks.
>>> 
>>> Best regards,
>>> Philipp. 
>>> _______________________________________________
>>> A51 mailing list
>>> A51 at lists.srlabs.de
>>> http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51
>> 
>> _______________________________________________
>> A51 mailing list
>> A51 at lists.srlabs.de
>> http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51




More information about the A51 mailing list