Difference between revisions of "AirProbe"

From OnnoWiki
Jump to navigation Jump to search
Line 1: Line 1:
 +
Welcome to AirProbe
 +
 +
AirProbe is the new home of the former GSM-Sniffer project. The goal is to build an air-interface analysis tool for the GSM (and possible later 3G) mobile phone standard. The prime motivation is to learn the details of the technology, help people who develop other open GSM technology (like  OpenBTS, OpenMoko?,  BS11/OpenBSC and others) and demonstrate the insecurity of the current standard.
 +
 +
General information about the project can be found in the Wiki. Source code is in the git. Get it using
 +
 +
  $ git clone git://svn.berlin.ccc.de/airprobe
 +
 +
The project mailing lists can be found here: MailingLists
 +
 +
Take a look at the Roadmap for current Milestones that need your contribution. Feel free to generate tickets for these Milestones and work on them.
 +
Structure
 +
 +
AirProbe is divided into three main subprojects: Acquisition, Demodulation and Analysis.
 +
 +
Acquisition The Acquisition module is hardware dependent and contains everything that has to do with receiving and digitizing the air interface. This is the part that needs to be rewritten for different receiver hardware, so it should be kept small and limited to the necessary functions. Most parts should be inherited from  GNURadio, to keep workload limited.
 +
 +
DeModulation The Demodulation module contains all necessary code to make bits out of the signal captured by Acquisition. It is in principle hardware independent, but should be open to use DSPs is desired.
 +
 +
Analysis This module contains all the protocol parsing and decoding. Wireshark can be used to handle parts of the visualisation and UI tasks. An important part of the Analysis module is non-realtime A5 DeCryption based on a generic fast CPU. Realtime or near-realtime A5 dercyption is not a goal of the project. For purposes of protocol analysis and demonstration of insecurities, non-realtime decryption is sufficient.
 +
Work in Progress
 +
 +
    A5 Tables Hardware
 +
 +
Info pages
 +
 +
    Some hardware description
 +
    Working With the USRP
 +
    GSM decoding with Nokia 3310/3390 phone
 +
    Presentations and papers on the project topics
 +
    Some basics about SIM cards and how to build and use SIM Card Reader
 +
    Over-the-Air (OTA) attack
 +
    Beginners howto
 +
 +
 +
 
On Fri, Mar 2, 2012 at 5:46 PM, Deddi Hariprawira <deddihp@gmail.com> wrote:
 
On Fri, Mar 2, 2012 at 5:46 PM, Deddi Hariprawira <deddihp@gmail.com> wrote:
 
> CMIIW,
 
> CMIIW,

Revision as of 06:23, 3 March 2012

Welcome to AirProbe

AirProbe is the new home of the former GSM-Sniffer project. The goal is to build an air-interface analysis tool for the GSM (and possible later 3G) mobile phone standard. The prime motivation is to learn the details of the technology, help people who develop other open GSM technology (like OpenBTS, OpenMoko?, BS11/OpenBSC and others) and demonstrate the insecurity of the current standard.

General information about the project can be found in the Wiki. Source code is in the git. Get it using

 $ git clone git://svn.berlin.ccc.de/airprobe

The project mailing lists can be found here: MailingLists

Take a look at the Roadmap for current Milestones that need your contribution. Feel free to generate tickets for these Milestones and work on them. Structure

AirProbe is divided into three main subprojects: Acquisition, Demodulation and Analysis.

Acquisition The Acquisition module is hardware dependent and contains everything that has to do with receiving and digitizing the air interface. This is the part that needs to be rewritten for different receiver hardware, so it should be kept small and limited to the necessary functions. Most parts should be inherited from GNURadio, to keep workload limited.

DeModulation The Demodulation module contains all necessary code to make bits out of the signal captured by Acquisition. It is in principle hardware independent, but should be open to use DSPs is desired.

Analysis This module contains all the protocol parsing and decoding. Wireshark can be used to handle parts of the visualisation and UI tasks. An important part of the Analysis module is non-realtime A5 DeCryption based on a generic fast CPU. Realtime or near-realtime A5 dercyption is not a goal of the project. For purposes of protocol analysis and demonstration of insecurities, non-realtime decryption is sufficient. Work in Progress

   A5 Tables Hardware 

Info pages

   Some hardware description
   Working With the USRP
   GSM decoding with Nokia 3310/3390 phone
   Presentations and papers on the project topics
   Some basics about SIM cards and how to build and use SIM Card Reader
   Over-the-Air (OTA) attack
   Beginners howto 


On Fri, Mar 2, 2012 at 5:46 PM, Deddi Hariprawira <deddihp@gmail.com> wrote: > CMIIW, > > my command is like follow : > uhd_rx_cfile.py -f 1960.8M --samp-rate 52000000 > what is supposed to be value for sampling rate for GSM ?. is it refer to GSM > Clock standard ?. > Do you have an idea what is the correct value of using uhd_rx_cfile.py ?.

The default Airprobe setting based on the old USRP1 driver was 112 decimation with a 64MHz clock. That's a sample rate of 571428.571429.

 Thomas


Referensi

Pranala Menarik