This shows you the differences between two versions of the page.
gsm [2016-11-25 07:47:53] 127.0.0.1 external edit |
gsm [2021-03-31 22:41:03] (current) jenda |
||
---|---|---|---|
Line 3: | Line 3: | ||
gsmtk contains handy tools to sniff GSM with [[http://bb.osmocom.org/trac/|osmocom-bb]] phones and recover encryption keys on sniffed data. | gsmtk contains handy tools to sniff GSM with [[http://bb.osmocom.org/trac/|osmocom-bb]] phones and recover encryption keys on sniffed data. | ||
- | {{ :project:gsm:gsmstack.png?direct&600 |}} | + | {{ :gsmstack.png?direct&600 |}} |
- | gsmtk is a fork of [[project:gsm:start|brmlab gsm toolkit]]. TL;DR brmlab GSM toolkit wants to support lots of great features, but it has serious bugs and no documentation at all. | + | gsmtk is a fork of [[https://brmlab.cz/project/gsm/start|brmlab gsm toolkit]]. TL;DR brmlab GSM toolkit wants to support lots of great features, but it has serious bugs and no documentation at all. |
gsmtk uses osmocom's ccch_scan as the sniffer. ccch_scan does not support the following two features, which are useful: | gsmtk uses osmocom's ccch_scan as the sniffer. ccch_scan does not support the following two features, which are useful: | ||
Line 20: | Line 20: | ||
gsmtk does not have any automating scripts for sniffing with multiple phones. brmlab GSM toolkit has two of them - gsm_start_sniff.sh and gsm_spawn_master_slave.sh. I do not know how the first one should work and I have written the latter in 2012 and no documentation exists, so I cannot help you with it as I have no more information than you have. | gsmtk does not have any automating scripts for sniffing with multiple phones. brmlab GSM toolkit has two of them - gsm_start_sniff.sh and gsm_spawn_master_slave.sh. I do not know how the first one should work and I have written the latter in 2012 and no documentation exists, so I cannot help you with it as I have no more information than you have. | ||
- | I have written [[:project:gsm:deka:start|an A5/1 cracker]] that will help you to recover keys for data you have sniffed. | + | I have written [[https://brmlab.cz/project/gsm/deka/start|an A5/1 cracker]] that will help you to recover keys for data you have sniffed. |
- | See also [[project:gsm:guesser]] | + | See also [[https://brmlab.cz/project/gsm/guesser]] |
http://jenda.hrach.eu/gitweb/?p=gsmtk;a=summary | http://jenda.hrach.eu/gitweb/?p=gsmtk;a=summary | ||
The README file should contain everything you need. | The README file should contain everything you need. |