@Fabio, you mentioned to break kasumi, you need to multiply the cost by 5, but would you please let me know that what extra hardware i need to break it, waiting for your answer
On Mon, Jan 4, 2010 at 3:42 AM, <[email protected]> wrote: > Send A51 mailing list submissions to > [email protected] > > To subscribe or unsubscribe via the World Wide Web, visit > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > or, via email, send a message with subject or body 'help' to > [email protected] > > You can reach the person managing the list at > [email protected] > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of A51 digest..." > > > Today's Topics: > > 1. Re: Truth about this work (H2G-Labs Information Security) > 2. Re: A51 Digest, Vol 8, Issue 13 (sandeep mishra) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Sun, 3 Jan 2010 16:35:03 -0300 > From: H2G-Labs Information Security > <[email protected]> > Subject: Re: [A51] Truth about this work > To: [email protected], [email protected] > Message-ID: > <[email protected]> > Content-Type: text/plain; charset="iso-8859-1" > > 2010/1/3 Sylv1 <[email protected]> > > > Hi all, > > i agree with p q for all the presented points. I just would like that > > someone contradicts me with an example. > > Is anybody abble to listen and record his own GSM conversation up and > > downlink? > > > > I'm trying to do that with the USRP and airprobe stuff but im stuck with > > some problems. > > Just forget about frequency hopping to simplify. > > Im trying to eavesdrop with 2 RFX900 DB on for each frequencies of the > > ARFCN and i want to record it in two cfile in order to use gsmreceiver > and > > gsmdecode and get at least the not encrypted information. But im stuck > for > > the moment. > > > > Getting two raw streams directly from the USRP leads to the USB > bottleneck > > problem. > > > > Is anyone really able at that day to eavesdrop and record his own > > conversation? > > it is the required step to run the attack on A5/1 and finally proove that > > we did the job. > > > > Any input please. > > > > Regards, > > sylvain > > > > > I think nobody do this yet. > No proof at moment. > Regards... > > -- > H2G-Labs Information Security > Igor Marcel - Information Security Consultant > H2GLabs.Information.Security "at" Gmail.com > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: > http://lists.lists.reflextor.com/pipermail/a51/attachments/20100103/a71aeff8/attachment-0001.htm > > ------------------------------ > > Message: 2 > Date: Mon, 4 Jan 2010 03:42:04 +0530 > From: sandeep mishra <[email protected]> > Subject: Re: [A51] A51 Digest, Vol 8, Issue 13 > To: [email protected] > Message-ID: > <[email protected]> > Content-Type: text/plain; charset="iso-8859-1" > > @Jabeir, > I am having 1 usrp, ati4770 card, 2tb hdd, currently downloading rainbow > tables, os is Ubantu9.1(Karmic-kola), high gain gsm antenna, kindly let me > know what else I need to have to break 3G live, or is there anything that I > need in extra, please guide me, I have also problem while running usrp with > gnuradio on ubantu9.1. please reply, I am waiting > > On Sun, Jan 3, 2010 at 2:53 PM, <[email protected]> wrote: > > > Send A51 mailing list submissions to > > [email protected] > > > > To subscribe or unsubscribe via the World Wide Web, visit > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > > or, via email, send a message with subject or body 'help' to > > [email protected] > > > > You can reach the person managing the list at > > [email protected] > > > > When replying, please edit your Subject line so it is more specific > > than "Re: Contents of A51 digest..." > > > > > > Today's Topics: > > > > 1. Re: Attacks tool is required (Fabio Pietrosanti (naif)) > > 2. Re: Attacks tool is required (hardware required?) > > (Fabio Pietrosanti (naif)) > > > > > > ---------------------------------------------------------------------- > > > > Message: 1 > > Date: Sun, 3 Jan 2010 10:17:55 +0100 > > From: "Fabio Pietrosanti (naif)" <[email protected]> > > Subject: Re: [A51] Attacks tool is required > > To: GeleGrodan <[email protected]> > > Cc: [email protected] > > Message-ID: <[email protected]> > > Content-Type: text/plain; charset="us-ascii" > > > > In the 'old age' of WiFi, getting a serious Cisco Aironet LCM-352 (the > > one with external antenna plug) along with a couple of good antenna > > with MMCX interface cable would had cost not less than 400 EUR all > > together. > > > > It's the same "average" cost. > > > > However there's on guy here in the mailing lists with which we are > > discussing to make a "clone" of USRP2 by making it "much cheaper" and > > already integrating all the piece of hardware required to play with GSM. > > > > It's absolutely feasible, now let's wait for the release of the > > software including all the feature that should had been demonstrated. > > > > Then we'll put in place some "open" industrialization effort to reduce > > the entrance barrier to play with the stuff. > > > > Fabio > > > > On 03/gen/10, at 01:26, GeleGrodan wrote: > > > > > The problem with comparing with aircrack-ng is that together with a > > > supported wifi-card (often built-in in laptops, or bought for ca > > > 20usd) you have a complete tool for capture and cracking, out of box. > > > If you compare that with this project, the cracking/decoding is just > > > half the part, you still need expensive hardware to capture the > > > traffic. But sure, if the tool is well made, its just a matter of > > > money. > > > So if I understand everything correctly, what you need (in hardware) > > > to CAPTURE somebody's phone-call is: > > > USRP > > > Daughterboard > > > Some antenna > > > +Software of course > > > 700USD+150USD+35USD = 885USD > > > (http://www.ettus.com/order) > > > > > > Or am I missing something? > > > > > > On Fri, Jan 1, 2010 at 21:05, Fabio Pietrosanti (naif) < > > [email protected] > > > > wrote: > > > Hi all, > > > > > > this is a provocative email. > > > > > > IMHO we need "practical", really practical ability for hackers to > > > "easily" make gsm hacking and gsm interception. > > > > > > We need something like aircrack-ng for WiFi, we need that anyone with > > > basic knowledge and not that big costs could start playing and hacking > > > gsm. > > > > > > Why? > > > > > > Because if we don't reach that goal the problem will be always there, > > > GSM equipment is not going to be replaced easily. > > > > > > What's already happened with other technologies like 802.11/WEP? > > > > > > Until well known, cheap and easy to use attack tools was diffused the > > > industry did not reacted by making WPA1, WPA2 and working on security > > > awareness. > > > > > > The real sense of full disclosure is this. > > > > > > GSM is sensitive, mobile voice and data interception is a strong > > > matter and companies, governments and various agencies does not want > > > anyone being able to break it. > > > > > > The interception tool exists. > > > > > > But they costs a lot of money (200-600k) and officially can be brought > > > only by governments (even if most private agencies have it...). > > > So only private spies, organized crimes, law enforcement, secret > > > services and military can use it. > > > > > > And the general feeling of the man walking the street is that "calls > > > and data are secure". > > > Because they don't feel the risk, a real risk for the system, for the > > > economy, for the industry, for the democracy itself. > > > > > > If people does not "taste" the risk, they will not react. > > > > > > Is the "public" is not *strongly aware* about the problem, then > > > problem for them DOES NOT EXISTS (like has been done in past 15 > > > years). > > > > > > Mobile networks are building block of the information society, and > > > information society is the building block of the information and > > > services economy where we live. > > > > > > All past GSM hacking attempt got serious attention from authorities > > > and big lobbies, there was always "legal" problem and "pressure" on > > > the project founders. > > > > > > I think we should think about it seriously, Karsten also told in > > > various talk about such kind of "pressure". > > > > > > The project should probably increase it's resilience to possible > > > attacks to the project itself, with the creation of always up-to-date > > > mirror of the informations and development environment, sharing of > > > mailing lists subscribers to always keep the community up&running. > > > > > > Then on top of that framework it would be fine to get some financing > > > for additional development and refinement and eventually even build > > > some business around it to make it economically sustainable and reach > > > the "point-click-sniff" tool. > > > > > > It's a very difficult step but if we want to really change the > > > landscape of the mobile security we should reach a level that will > > > "force" the industry to upgrade or when not possible to explicitly do > > > awareness about the risk. > > > > > > On Windows Vista if i connect to an open wifi network i receive the > > > advice that the network is insecure and someone could sniff the > > > traffic. > > > > > > Well, let's force them to do awareness on the users if the don't want > > > to upgrade, users should always know what they are using and what are > > > their risks. > > > > > > Telecommunication companies account 3 quarter of the european high > > > yield bonds ( > > http://www.cadwalader.com/assets/article/HighYieldBondMk.pdf > > > ), they are plenty of debt to invest in selling dumb sing and logos > > > for mobile, restricting network neutrality of the internet and a lot > > > of very nasty and lobbystic stuff. > > > > > > > > > I would like to see them to invest more in securing the information > > > society, that is the foundation of their business required to sustain > > > their debt. > > > > > > Let's do everything to make the project reach a "point-click-sniff" > > > tool, at least on software side. > > > > > > Let's release everything, with very precise documentation, so privacy > > > activists can demonstrate the risks to the masses. > > > Let's mirror everything across trusted networks. > > > Let's get public donations and private funding to carry on the > > > development. > > > Let's increase documentation and community strength to expand the > > > knowledge. > > > > > > That's my personal point of view, all you guys have made an excellent > > > job, now we should not stop. > > > > > > We should goes on, let anyone insisting on privacy activism in the > > > world, on information society right to "access" the technology that > > > demonstrate how the industry acted. > > > > > > We need more people involved that will start using the "tools" around > > > the policy and activism scene, that will make the process > > > unreversible. > > > > > > Without an easy to use attack tool available for anyone that want to > > > show up which are the risks, all this effort not reach the result. > > > > > > Citizens and politicians will not care about it, and worst things will > > > do all the bests to say that "everything it's ok, it was just a fun > > > stuff by some bunch of young hackers!". > > > > > > Fabio > > > _______________________________________________ > > > A51 mailing list > > > [email protected] > > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > > > > > > > -------------- next part -------------- > > An HTML attachment was scrubbed... > > URL: > > > http://lists.lists.reflextor.com/pipermail/a51/attachments/20100103/d601f28a/attachment-0001.htm > > > > ------------------------------ > > > > Message: 2 > > Date: Sun, 3 Jan 2010 10:23:38 +0100 > > From: "Fabio Pietrosanti (naif)" <[email protected]> > > Subject: Re: [A51] Attacks tool is required (hardware required?) > > To: javier falbo <[email protected]> > > Cc: [email protected] > > Message-ID: <[email protected]> > > Content-Type: text/plain; charset="iso-8859-1" > > > > This thread is making me understanding that there's not enough > > information. > > > > I read on airprobe website: > > https://svn.berlin.ccc.de/projects/airprobe/wiki/hardware > > > > But i read here that 1 USRP2 along with 2 daughterboards are required. > > > > Can we confirm that the equipment needed is 2 DBSRX daughterboards > > along with antennas? > > > > We should probably reach a practical 'how to for experiments'. > > > > Are the rainbowtables only 2TB in size? > > > > Fabio > > > > > > On 03/gen/10, at 05:52, javier falbo wrote: > > > > > You need also: > > > > > > Add: > > > 1 PC Computer (new one if possible) > > > 1 2tbytes hard disk (us$ 200 or more, depends on trademark) > > > 1 pc user :) > > > > > > Aprox us$ 2.500 to decode in realtime any GSM voice and message. > > > (without pc user salary jeje) > > > Multiply this by 5, to have LIVE A53 and Kasumi breaked. > > > > > > Javier > > > > > > > Date: Sun, 3 Jan 2010 02:52:22 +0100 > > > > From: [email protected] > > > > To: [email protected] > > > > Subject: Re: [A51] Attacks tool is required > > > > > > > > A usrp1 is not enough by current estimates. > > > > A usrp2 OTOH is. And you need 2 daughterboards. > > > > > > > > On Sun, Jan 03, 2010 at 01:26:25AM +0100, GeleGrodan wrote: > > > > > The problem with comparing with aircrack-ng is that together > > > with a > > > > > supported wifi-card (often built-in in laptops, or bought for ca > > > 20usd) you > > > > > have a complete tool for capture and cracking, out of box. > > > > > If you compare that with this project, the cracking/decoding is > > > just half > > > > > the part, you still need expensive hardware to capture the > > > traffic. But > > > > > sure, if the tool is well made, its just a matter of money. > > > > > So if I understand everything correctly, what you need (in > > > hardware) to > > > > > CAPTURE somebody's phone-call is: > > > > > USRP > > > > > Daughterboard > > > > > Some antenna > > > > > +Software of course > > > > > 700USD+150USD+35USD = 885USD > > > > > (http://www.ettus.com/order) > > > > > > > > > > Or am I missing something? > > > > > > > > > > On Fri, Jan 1, 2010 at 21:05, Fabio Pietrosanti (naif) < > > > > > [email protected]> wrote: > > > > > > > > > > > Hi all, > > > > > > > > > > > > this is a provocative email. > > > > > > > > > > > > IMHO we need "practical", really practical ability for hackers > > > to > > > > > > "easily" make gsm hacking and gsm interception. > > > > > > > > > > > > We need something like aircrack-ng for WiFi, we need that > > > anyone with > > > > > > basic knowledge and not that big costs could start playing and > > > hacking > > > > > > gsm. > > > > > > > > > > > > Why? > > > > > > > > > > > > Because if we don't reach that goal the problem will be always > > > there, > > > > > > GSM equipment is not going to be replaced easily. > > > > > > > > > > > > What's already happened with other technologies like 802.11/WEP? > > > > > > > > > > > > Until well known, cheap and easy to use attack tools was > > > diffused the > > > > > > industry did not reacted by making WPA1, WPA2 and working on > > > security > > > > > > awareness. > > > > > > > > > > > > The real sense of full disclosure is this. > > > > > > > > > > > > GSM is sensitive, mobile voice and data interception is a strong > > > > > > matter and companies, governments and various agencies does > > > not want > > > > > > anyone being able to break it. > > > > > > > > > > > > The interception tool exists. > > > > > > > > > > > > But they costs a lot of money (200-600k) and officially can be > > > brought > > > > > > only by governments (even if most private agencies have it...). > > > > > > So only private spies, organized crimes, law enforcement, secret > > > > > > services and military can use it. > > > > > > > > > > > > And the general feeling of the man walking the street is that > > > "calls > > > > > > and data are secure". > > > > > > Because they don't feel the risk, a real risk for the system, > > > for the > > > > > > economy, for the industry, for the democracy itself. > > > > > > > > > > > > If people does not "taste" the risk, they will not react. > > > > > > > > > > > > Is the "public" is not *strongly aware* about the problem, then > > > > > > problem for them DOES NOT EXISTS (like has been done in past > > > 15 years). > > > > > > > > > > > > Mobile networks are building block of the information society, > > > and > > > > > > information society is the building block of the information and > > > > > > services economy where we live. > > > > > > > > > > > > All past GSM hacking attempt got serious attention from > > > authorities > > > > > > and big lobbies, there was always "legal" problem and > > > "pressure" on > > > > > > the project founders. > > > > > > > > > > > > I think we should think about it seriously, Karsten also told in > > > > > > various talk about such kind of "pressure". > > > > > > > > > > > > The project should probably increase it's resilience to possible > > > > > > attacks to the project itself, with the creation of always up- > > > to-date > > > > > > mirror of the informations and development environment, > > > sharing of > > > > > > mailing lists subscribers to always keep the community > > > up&running. > > > > > > > > > > > > Then on top of that framework it would be fine to get some > > > financing > > > > > > for additional development and refinement and eventually even > > > build > > > > > > some business around it to make it economically sustainable > > > and reach > > > > > > the "point-click-sniff" tool. > > > > > > > > > > > > It's a very difficult step but if we want to really change the > > > > > > landscape of the mobile security we should reach a level that > > > will > > > > > > "force" the industry to upgrade or when not possible to > > > explicitly do > > > > > > awareness about the risk. > > > > > > > > > > > > On Windows Vista if i connect to an open wifi network i > > > receive the > > > > > > advice that the network is insecure and someone could sniff > > > the traffic. > > > > > > > > > > > > Well, let's force them to do awareness on the users if the > > > don't want > > > > > > to upgrade, users should always know what they are using and > > > what are > > > > > > their risks. > > > > > > > > > > > > Telecommunication companies account 3 quarter of the european > > > high > > > > > > yield bonds ( > > http://www.cadwalader.com/assets/article/HighYieldBondMk.pdf > > > > > > ), they are plenty of debt to invest in selling dumb sing and > > > logos > > > > > > for mobile, restricting network neutrality of the internet and > > > a lot > > > > > > of very nasty and lobbystic stuff. > > > > > > > > > > > > > > > > > > I would like to see them to invest more in securing the > > > information > > > > > > society, that is the foundation of their business required to > > > sustain > > > > > > their debt. > > > > > > > > > > > > Let's do everything to make the project reach a "point-click- > > > sniff" > > > > > > tool, at least on software side. > > > > > > > > > > > > Let's release everything, with very precise documentation, so > > > privacy > > > > > > activists can demonstrate the risks to the masses. > > > > > > Let's mirror everything across trusted networks. > > > > > > Let's get public donations and private funding to carry on the > > > > > > development. > > > > > > Let's increase documentation and community strength to expand > > > the > > > > > > knowledge. > > > > > > > > > > > > That's my personal point of view, all you guys have made an > > > excellent > > > > > > job, now we should not stop. > > > > > > > > > > > > We should goes on, let anyone insisting on privacy activism in > > > the > > > > > > world, on information society right to "access" the technology > > > that > > > > > > demonstrate how the industry acted. > > > > > > > > > > > > We need more people involved that will start using the "tools" > > > around > > > > > > the policy and activism scene, that will make the process > > > unreversible. > > > > > > > > > > > > Without an easy to use attack tool available for anyone that > > > want to > > > > > > show up which are the risks, all this effort not reach the > > > result. > > > > > > > > > > > > Citizens and politicians will not care about it, and worst > > > things will > > > > > > do all the bests to say that "everything it's ok, it was just > > > a fun > > > > > > stuff by some bunch of young hackers!". > > > > > > > > > > > > Fabio > > > > > > _______________________________________________ > > > > > > A51 mailing list > > > > > > [email protected] > > > > > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > > > > > > > > > > > > > > > _______________________________________________ > > > > > A51 mailing list > > > > > [email protected] > > > > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > > > > > > > > _______________________________________________ > > > > A51 mailing list > > > > [email protected] > > > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > > > > > > ?Te llegan demasiados emails? Organizate con Hotmail. ?Cre? carpetas > > > para todos tus correos!_______________________________________________ > > > A51 mailing list > > > [email protected] > > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > > > > -------------- next part -------------- > > An HTML attachment was scrubbed... > > URL: > > > http://lists.lists.reflextor.com/pipermail/a51/attachments/20100103/d233f054/attachment.htm > > > > ------------------------------ > > > > _______________________________________________ > > A51 mailing list > > [email protected] > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > > > > > > End of A51 Digest, Vol 8, Issue 13 > > ********************************** > > > > > > -- > Thanks. > Best Regards..... > Sandeep Mishra(System Analyst, 8th Angle System) > +91-9953996009 > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: > http://lists.lists.reflextor.com/pipermail/a51/attachments/20100104/2a084f2d/attachment.htm > > ------------------------------ > > _______________________________________________ > A51 mailing list > [email protected] > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 > > > End of A51 Digest, Vol 8, Issue 17 > ********************************** > -- Thanks.....
_______________________________________________ A51 mailing list [email protected] http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
