[ Horvat @ 05.01.2011. 00:07 ] @
Citat:
GSM hacking with prepaid phones
posted Dec 30th 2010 2:00pm by Mike Szczys

Want to listen in on cellphone calls or intercept test messages? Well that’s a violation of someone else’s privacy so shame on you! But there are black-hats who want to do just that and it may not be quite as difficult as you think. This article sums up a method of using prepaid cellphones and some decryption technology to quickly gain access to all the communications on a cellular handset. Slides for the talk given at the Chaos Communications Congress by [Karsten Nohl] and [Sylvain Munaut] are available now, but here’s the gist. They reflashed some cheap phones with custom firmware to gain access to all of the data coming over the network. By sending carefully crafted ghost messages the target user doesn’t get notified that a text has been received, but the phone is indeed communicating with the network. That traffic is used to sniff out a general location and eventually to grab the session key. That key can be used to siphon off all network communications and then decrypt them quickly by using a 1 TB rainbow table. Not an easy process, but it’s a much simpler method than we would have suspected.

izvor


edit:
sirov video snimak prezentacije (prvi deo je onaj sa starijim datumom)

[Ovu poruku je menjao Horvat dana 05.01.2011. u 13:13 GMT+1]
[ xtraya @ 05.01.2011. 14:35 ] @
simpaticno,telefone su pratili po kanalima, vadeci a5/1 kljuceve... na kraju batica otvori upstream voice i downstream voice koji je dekodovao iz raw gsm data...
a sms , sve se vidi odakle/kome/sadrzaj...

mislim, svaka chas` ...
[ Horvat @ 05.01.2011. 14:55 ] @
inace postoji greska na vesti sa hackaday
tabela nije 1 terabyte,nego skoro 2, tacnije 1,7 je
bas i nije "prakticno", ali tehnologija "napreduje" i bitno se smanjila ova velicina od pocetka probijanja gsm enkripcije

p.s. ko ima visak 2tb, moze da ih skine