The fruit of hard working
Using rtl-sdr (10 USD Software Defined Radio) and some open-source software I just sniffed my own SMS from the air:
Using rtl-sdr (10 USD Software Defined Radio) and some open-source software I just sniffed my own SMS from the air:
mikeli
August 2, 2013 @ 09:24
hi.I used R820T capture using wirshark listen lo. But the lack of grasp gsm sms packages. Can only catch a lot gamtap package. I ask you how to do it?
domi007
August 2, 2013 @ 12:17
Hi,
I will be disclosing all the details at this year’s Hacktivity Conference. The whole presentation will be recorded, both the video and the slides are going to be available online.
Stay tuned till then.
Regards,
Domonkos
mikeli
August 7, 2013 @ 07:00
hi man.I have a few questions to ask you.~~
I was doing:
1.cread_configuration inside gsm_receiver_cf.c . The ts fixed to 3
2.decode_sacch instide cch.c .Delete ‘if (parity_check(decoded_data))’
If not removed, all data will be generated “error: sacch: parity error ….”
Finally all the packets through wireshark to see and feel are not normal.
Presumptuous to ask can you send me the source code?
mikeli
August 7, 2013 @ 07:02
d_gs_ctx.ts_ctx[ts].type = TST_SDCCH8
domi007
August 7, 2013 @ 07:45
Hi mikelli,
I didn’t modify the source code at all. Your modifications are actually quite harmful:
1. Why would you hard-code the timeslot into the code? You can always specify it via command-line parameters.
2. You just turned off error checking on the packets, of course now you won’t see any parity errors but they still are going to be there hence your packets aren’t right. Put that error-check back.
Anyways, listen to timeslot 0, that has unencrypted traffic on it. TS 3 is mostly a traffic channel so you will always get parity errors (parity error = encrypted traffic).
kant
August 7, 2013 @ 07:12
I have encountered similar problems, only caught gsmtap package. 🙁
domi007
August 7, 2013 @ 07:46
Everything will be released at Hacktivity.
Stay tuned till then.
mikeli
August 7, 2013 @ 07:53
Does not modify the source code will be able to get to the LAPDm and GSM_SMS???????
domi007
August 7, 2013 @ 20:36
Yes.
kant
August 8, 2013 @ 02:17
Wow~
How can I do it? Tell me please, thanks.
domi007
August 8, 2013 @ 07:30
Everything will be disclosed at Hacktivity. Stay tuned till then.
psychologe
August 27, 2013 @ 16:32
so cool,hope disclose
mikeli
October 12, 2013 @ 02:36
Friend
About GSM sniffer.
You say: ‘Everything will be disclosed in Hacktivity’
Now what news?
Thank you
domi007
October 12, 2013 @ 12:51
Presentation will be today, expect the slides and a write-up late night (CET)
mikeli
October 21, 2013 @ 02:16
The slides and a write-up late night (CET) ~yeah i like it.
Can organize a note to me?
mikeli
October 21, 2013 @ 02:27
First, thank you for your spirit of open source.
Second. I have a suggestion:
You can put gsmsniffer make a virtual machine. So easy to download.
Thank you.
Your friend mikeli
domi007
October 21, 2013 @ 08:41
I will consider doing that if I have the time and also a place where I can store it (I don’t know if Skydrive allows huge files – 3-4 GB)
mikeli
October 21, 2013 @ 09:36
If you wish to do so. Maybe we can do that the ISO file will be uploaded to the Skydrive. yeah ~
I like that~
Tell me if you need help.
Your friend mikeli.
domi007
October 21, 2013 @ 09:56
If I’m gonna do it it is not gonna be an ISO but a virtual hard disk image I think.
Thanks for offering help, we will see 🙂
ajay
August 28, 2014 @ 06:53
Hey,
Thanks to your tut I have been able to do this analysis on wireshark and catch my own sms, but can u share ur tmsi_buster.py ?