User Tools

Site Tools


gsm

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

gsm [2016-11-25 07:47:53]
127.0.0.1 external edit
gsm [2021-03-31 22:41:03] (current)
jenda
Line 3: Line 3:
 gsmtk contains handy tools to sniff GSM with [[http://​bb.osmocom.org/​trac/​|osmocom-bb]] phones and recover encryption keys on sniffed data. gsmtk contains handy tools to sniff GSM with [[http://​bb.osmocom.org/​trac/​|osmocom-bb]] phones and recover encryption keys on sniffed data.
  
-{{ :​project:​gsm:​gsmstack.png?​direct&​600 |}}+{{ :​gsmstack.png?​direct&​600 |}}
  
-gsmtk is a fork of [[project:gsm:start|brmlab gsm toolkit]]. TL;DR brmlab GSM toolkit wants to support lots of great features, but it has serious bugs and no documentation at all.+gsmtk is a fork of [[https://​brmlab.cz/​project/gsm/start|brmlab gsm toolkit]]. TL;DR brmlab GSM toolkit wants to support lots of great features, but it has serious bugs and no documentation at all.
  
 gsmtk uses osmocom'​s ccch_scan as the sniffer. ccch_scan does not support the following two features, which are useful: gsmtk uses osmocom'​s ccch_scan as the sniffer. ccch_scan does not support the following two features, which are useful:
Line 20: Line 20:
 gsmtk does not have any automating scripts for sniffing with multiple phones. brmlab GSM toolkit has two of them - gsm_start_sniff.sh and gsm_spawn_master_slave.sh. I do not know how the first one should work and I have written the latter in 2012 and no documentation exists, so I cannot help you with it as I have no more information than you have. gsmtk does not have any automating scripts for sniffing with multiple phones. brmlab GSM toolkit has two of them - gsm_start_sniff.sh and gsm_spawn_master_slave.sh. I do not know how the first one should work and I have written the latter in 2012 and no documentation exists, so I cannot help you with it as I have no more information than you have.
  
-I have written [[:project:gsm:deka:start|an A5/1 cracker]] that will help you to recover keys for data you have sniffed.+I have written [[https://​brmlab.cz/​project/gsm/deka/start|an A5/1 cracker]] that will help you to recover keys for data you have sniffed.
  
-See also [[project:gsm:guesser]]+See also [[https://​brmlab.cz/​project/gsm/guesser]]
  
 http://​jenda.hrach.eu/​gitweb/?​p=gsmtk;​a=summary http://​jenda.hrach.eu/​gitweb/?​p=gsmtk;​a=summary
  
 The README file should contain everything you need. The README file should contain everything you need.
gsm.txt ยท Last modified: 2021-03-31 22:41:03 by jenda