@Fabio,
you mentioned to break kasumi, you need to multiply the cost by 5, but would
you please let me know that what extra hardware i need to break it, waiting
for your answer

On Mon, Jan 4, 2010 at 3:42 AM, <[email protected]> wrote:

> Send A51 mailing list submissions to
>        [email protected]
>
> To subscribe or unsubscribe via the World Wide Web, visit
>        http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
> or, via email, send a message with subject or body 'help' to
>        [email protected]
>
> You can reach the person managing the list at
>        [email protected]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of A51 digest..."
>
>
> Today's Topics:
>
>   1. Re: Truth about this work (H2G-Labs Information Security)
>   2. Re: A51 Digest, Vol 8, Issue 13 (sandeep mishra)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Sun, 3 Jan 2010 16:35:03 -0300
> From: H2G-Labs Information Security
>        <[email protected]>
> Subject: Re: [A51] Truth about this work
> To: [email protected], [email protected]
> Message-ID:
>        <[email protected]>
> Content-Type: text/plain; charset="iso-8859-1"
>
> 2010/1/3 Sylv1 <[email protected]>
>
> > Hi all,
> > i agree with p q for all the presented points. I just would like that
> > someone contradicts me with an example.
> > Is anybody abble to listen and record his own GSM conversation up and
> > downlink?
> >
> > I'm trying to do that with the USRP and airprobe stuff but im stuck with
> > some problems.
> > Just forget about frequency hopping to simplify.
> > Im trying to eavesdrop with 2 RFX900 DB on for each frequencies of the
> > ARFCN and i want to record it in two cfile in order to use gsmreceiver
> and
> > gsmdecode and get at least the not encrypted information. But im stuck
> for
> > the moment.
> >
> > Getting two raw streams directly from the USRP leads to the USB
> bottleneck
> > problem.
> >
> > Is anyone really able at that day to eavesdrop and record his own
> > conversation?
> > it is the required step to run the attack on A5/1 and finally proove that
> > we did the job.
> >
> > Any input please.
> >
> > Regards,
> > sylvain
> >
> >
> I think nobody do this yet.
> No proof at moment.
> Regards...
>
> --
> H2G-Labs Information Security
> Igor Marcel - Information Security Consultant
> H2GLabs.Information.Security "at" Gmail.com
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> http://lists.lists.reflextor.com/pipermail/a51/attachments/20100103/a71aeff8/attachment-0001.htm
>
> ------------------------------
>
> Message: 2
> Date: Mon, 4 Jan 2010 03:42:04 +0530
> From: sandeep mishra <[email protected]>
> Subject: Re: [A51] A51 Digest, Vol 8, Issue 13
> To: [email protected]
> Message-ID:
>        <[email protected]>
> Content-Type: text/plain; charset="iso-8859-1"
>
> @Jabeir,
> I am having 1 usrp, ati4770 card, 2tb hdd, currently downloading rainbow
> tables, os is Ubantu9.1(Karmic-kola), high gain gsm antenna, kindly let me
> know what else I need to have to break 3G live, or is there anything that I
> need in extra, please guide me, I have also problem while running usrp with
> gnuradio on ubantu9.1. please reply, I am waiting
>
> On Sun, Jan 3, 2010 at 2:53 PM, <[email protected]> wrote:
>
> > Send A51 mailing list submissions to
> >        [email protected]
> >
> > To subscribe or unsubscribe via the World Wide Web, visit
> >        http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
> > or, via email, send a message with subject or body 'help' to
> >        [email protected]
> >
> > You can reach the person managing the list at
> >        [email protected]
> >
> > When replying, please edit your Subject line so it is more specific
> > than "Re: Contents of A51 digest..."
> >
> >
> > Today's Topics:
> >
> >   1. Re: Attacks tool is required (Fabio Pietrosanti (naif))
> >   2. Re: Attacks tool is required (hardware required?)
> >      (Fabio Pietrosanti (naif))
> >
> >
> > ----------------------------------------------------------------------
> >
> > Message: 1
> > Date: Sun, 3 Jan 2010 10:17:55 +0100
> > From: "Fabio Pietrosanti (naif)" <[email protected]>
> > Subject: Re: [A51] Attacks tool is required
> > To: GeleGrodan <[email protected]>
> > Cc: [email protected]
> > Message-ID: <[email protected]>
> > Content-Type: text/plain; charset="us-ascii"
> >
> > In the 'old age' of WiFi, getting a serious Cisco Aironet LCM-352 (the
> > one with external antenna plug) along with a couple of good antenna
> > with MMCX interface cable would had cost not less than 400 EUR all
> > together.
> >
> > It's the same "average" cost.
> >
> > However there's on guy here in the mailing lists with which we are
> > discussing to make a "clone" of USRP2 by making it "much cheaper" and
> > already integrating all the piece of hardware required to play with GSM.
> >
> > It's absolutely feasible, now let's wait for the release of the
> > software including all the feature that should had been demonstrated.
> >
> > Then we'll put in place some "open" industrialization effort to reduce
> > the entrance barrier to play with the stuff.
> >
> > Fabio
> >
> > On 03/gen/10, at 01:26, GeleGrodan wrote:
> >
> > > The problem with comparing with aircrack-ng is that together with a
> > > supported wifi-card (often built-in in laptops, or bought for ca
> > > 20usd) you have a complete tool for capture and cracking, out of box.
> > > If you compare that with this project, the cracking/decoding is just
> > > half the part, you still need expensive hardware to capture the
> > > traffic. But sure, if the tool is well made, its just a matter of
> > > money.
> > > So if I understand everything correctly, what you need (in hardware)
> > > to CAPTURE somebody's phone-call is:
> > > USRP
> > > Daughterboard
> > > Some antenna
> > > +Software of course
> > > 700USD+150USD+35USD = 885USD
> > > (http://www.ettus.com/order)
> > >
> > > Or am I missing something?
> > >
> > > On Fri, Jan 1, 2010 at 21:05, Fabio Pietrosanti (naif) <
> > [email protected]
> > > > wrote:
> > > Hi all,
> > >
> > > this is a provocative email.
> > >
> > > IMHO we need "practical", really practical ability for hackers to
> > > "easily" make gsm hacking and gsm interception.
> > >
> > > We need something like aircrack-ng for WiFi, we need that anyone with
> > > basic knowledge and not that big costs could start playing and hacking
> > > gsm.
> > >
> > > Why?
> > >
> > > Because if we don't reach that goal the problem will be always there,
> > > GSM equipment is not going to be replaced easily.
> > >
> > > What's already happened with other technologies like 802.11/WEP?
> > >
> > > Until well known, cheap and easy to use attack tools was diffused the
> > > industry did not reacted by making WPA1, WPA2 and working on security
> > > awareness.
> > >
> > > The real sense of full disclosure is this.
> > >
> > > GSM is sensitive, mobile voice and data interception is a strong
> > > matter and companies, governments and various agencies does not want
> > > anyone being able to break it.
> > >
> > > The interception tool exists.
> > >
> > > But they costs a lot of money (200-600k) and officially can be brought
> > > only by governments (even if most private agencies have it...).
> > > So only private spies, organized crimes, law enforcement, secret
> > > services and military can use it.
> > >
> > > And the general feeling of the man walking the street is that "calls
> > > and data are secure".
> > > Because they don't feel the risk, a real risk for the system, for the
> > > economy, for the industry, for the democracy itself.
> > >
> > > If people does not "taste" the risk, they will not react.
> > >
> > > Is the "public" is not *strongly aware* about the problem, then
> > > problem for them DOES NOT EXISTS (like has been done in past 15
> > > years).
> > >
> > > Mobile networks are building block of the information society, and
> > > information society is the building block of the information and
> > > services economy where we live.
> > >
> > > All past GSM hacking attempt got serious attention from authorities
> > > and big lobbies, there was always "legal" problem and "pressure" on
> > > the project founders.
> > >
> > > I think we should think about it seriously, Karsten also told in
> > > various talk about such kind of "pressure".
> > >
> > > The project should probably increase it's resilience to possible
> > > attacks to the project itself, with the creation of always up-to-date
> > > mirror of the informations and development environment, sharing of
> > > mailing lists subscribers to always keep the community up&running.
> > >
> > > Then on top of that framework it would be fine to get some financing
> > > for additional development and refinement and eventually even build
> > > some business around it to make it economically sustainable and reach
> > > the "point-click-sniff" tool.
> > >
> > > It's a very difficult step but if we want to really change the
> > > landscape of the mobile security we should reach a level that will
> > > "force" the industry to upgrade or when not possible to explicitly do
> > > awareness about the risk.
> > >
> > > On Windows Vista if i connect to an open wifi network i receive the
> > > advice that the network is insecure and someone could sniff the
> > > traffic.
> > >
> > > Well, let's force them to do awareness on the users if the don't want
> > > to upgrade, users should always know what they are using and what are
> > > their risks.
> > >
> > > Telecommunication companies account 3 quarter of the european high
> > > yield bonds (
> > http://www.cadwalader.com/assets/article/HighYieldBondMk.pdf
> > > ), they are plenty of debt to invest in selling dumb sing and logos
> > > for mobile, restricting network neutrality of the internet and a lot
> > > of very nasty and lobbystic stuff.
> > >
> > >
> > > I would like to see them to invest more in securing the information
> > > society, that is the foundation of their business required to sustain
> > > their debt.
> > >
> > > Let's do everything to make the project reach a "point-click-sniff"
> > > tool, at least on software side.
> > >
> > > Let's release everything, with very precise documentation, so privacy
> > > activists can demonstrate the risks to the masses.
> > > Let's mirror everything across trusted networks.
> > > Let's get public donations and private funding to carry on the
> > > development.
> > > Let's increase documentation and community strength to expand the
> > > knowledge.
> > >
> > > That's my personal point of view, all you guys have made an excellent
> > > job, now we should not stop.
> > >
> > > We should goes on, let anyone insisting on privacy activism in the
> > > world, on information society right to "access" the technology that
> > > demonstrate how the industry acted.
> > >
> > > We need more people involved that will start using the "tools" around
> > > the policy and activism scene, that will make the process
> > > unreversible.
> > >
> > > Without an easy to use attack tool available for anyone that want to
> > > show up which are the risks, all this effort not reach the result.
> > >
> > > Citizens and politicians will not care about it, and worst things will
> > > do all the bests to say that "everything it's ok, it was just a fun
> > > stuff by some bunch of young hackers!".
> > >
> > > Fabio
> > > _______________________________________________
> > > A51 mailing list
> > > [email protected]
> > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
> > >
> >
> > -------------- next part --------------
> > An HTML attachment was scrubbed...
> > URL:
> >
> http://lists.lists.reflextor.com/pipermail/a51/attachments/20100103/d601f28a/attachment-0001.htm
> >
> > ------------------------------
> >
> > Message: 2
> > Date: Sun, 3 Jan 2010 10:23:38 +0100
> > From: "Fabio Pietrosanti (naif)" <[email protected]>
> > Subject: Re: [A51] Attacks tool is required (hardware required?)
> > To: javier falbo <[email protected]>
> > Cc: [email protected]
> > Message-ID: <[email protected]>
> > Content-Type: text/plain; charset="iso-8859-1"
> >
> > This thread is making me understanding that there's not enough
> > information.
> >
> > I read on airprobe website:
> > https://svn.berlin.ccc.de/projects/airprobe/wiki/hardware
> >
> > But i read here that 1 USRP2 along with 2 daughterboards are required.
> >
> > Can we confirm that the equipment needed is 2 DBSRX daughterboards
> > along with antennas?
> >
> > We should probably reach a practical 'how to for experiments'.
> >
> > Are the rainbowtables only 2TB in size?
> >
> > Fabio
> >
> >
> > On 03/gen/10, at 05:52, javier falbo wrote:
> >
> > > You need also:
> > >
> > > Add:
> > > 1 PC Computer (new one if possible)
> > > 1 2tbytes hard disk (us$ 200 or more, depends on trademark)
> > > 1 pc user :)
> > >
> > > Aprox us$ 2.500 to decode in realtime any GSM voice and message.
> > > (without pc user salary jeje)
> > > Multiply this by 5, to have LIVE A53 and Kasumi breaked.
> > >
> > > Javier
> > >
> > > > Date: Sun, 3 Jan 2010 02:52:22 +0100
> > > > From: [email protected]
> > > > To: [email protected]
> > > > Subject: Re: [A51] Attacks tool is required
> > > >
> > > > A usrp1 is not enough by current estimates.
> > > > A usrp2 OTOH is. And you need 2 daughterboards.
> > > >
> > > > On Sun, Jan 03, 2010 at 01:26:25AM +0100, GeleGrodan wrote:
> > > > > The problem with comparing with aircrack-ng is that together
> > > with a
> > > > > supported wifi-card (often built-in in laptops, or bought for ca
> > > 20usd) you
> > > > > have a complete tool for capture and cracking, out of box.
> > > > > If you compare that with this project, the cracking/decoding is
> > > just half
> > > > > the part, you still need expensive hardware to capture the
> > > traffic. But
> > > > > sure, if the tool is well made, its just a matter of money.
> > > > > So if I understand everything correctly, what you need (in
> > > hardware) to
> > > > > CAPTURE somebody's phone-call is:
> > > > > USRP
> > > > > Daughterboard
> > > > > Some antenna
> > > > > +Software of course
> > > > > 700USD+150USD+35USD = 885USD
> > > > > (http://www.ettus.com/order)
> > > > >
> > > > > Or am I missing something?
> > > > >
> > > > > On Fri, Jan 1, 2010 at 21:05, Fabio Pietrosanti (naif) <
> > > > > [email protected]> wrote:
> > > > >
> > > > > > Hi all,
> > > > > >
> > > > > > this is a provocative email.
> > > > > >
> > > > > > IMHO we need "practical", really practical ability for hackers
> > > to
> > > > > > "easily" make gsm hacking and gsm interception.
> > > > > >
> > > > > > We need something like aircrack-ng for WiFi, we need that
> > > anyone with
> > > > > > basic knowledge and not that big costs could start playing and
> > > hacking
> > > > > > gsm.
> > > > > >
> > > > > > Why?
> > > > > >
> > > > > > Because if we don't reach that goal the problem will be always
> > > there,
> > > > > > GSM equipment is not going to be replaced easily.
> > > > > >
> > > > > > What's already happened with other technologies like 802.11/WEP?
> > > > > >
> > > > > > Until well known, cheap and easy to use attack tools was
> > > diffused the
> > > > > > industry did not reacted by making WPA1, WPA2 and working on
> > > security
> > > > > > awareness.
> > > > > >
> > > > > > The real sense of full disclosure is this.
> > > > > >
> > > > > > GSM is sensitive, mobile voice and data interception is a strong
> > > > > > matter and companies, governments and various agencies does
> > > not want
> > > > > > anyone being able to break it.
> > > > > >
> > > > > > The interception tool exists.
> > > > > >
> > > > > > But they costs a lot of money (200-600k) and officially can be
> > > brought
> > > > > > only by governments (even if most private agencies have it...).
> > > > > > So only private spies, organized crimes, law enforcement, secret
> > > > > > services and military can use it.
> > > > > >
> > > > > > And the general feeling of the man walking the street is that
> > > "calls
> > > > > > and data are secure".
> > > > > > Because they don't feel the risk, a real risk for the system,
> > > for the
> > > > > > economy, for the industry, for the democracy itself.
> > > > > >
> > > > > > If people does not "taste" the risk, they will not react.
> > > > > >
> > > > > > Is the "public" is not *strongly aware* about the problem, then
> > > > > > problem for them DOES NOT EXISTS (like has been done in past
> > > 15 years).
> > > > > >
> > > > > > Mobile networks are building block of the information society,
> > > and
> > > > > > information society is the building block of the information and
> > > > > > services economy where we live.
> > > > > >
> > > > > > All past GSM hacking attempt got serious attention from
> > > authorities
> > > > > > and big lobbies, there was always "legal" problem and
> > > "pressure" on
> > > > > > the project founders.
> > > > > >
> > > > > > I think we should think about it seriously, Karsten also told in
> > > > > > various talk about such kind of "pressure".
> > > > > >
> > > > > > The project should probably increase it's resilience to possible
> > > > > > attacks to the project itself, with the creation of always up-
> > > to-date
> > > > > > mirror of the informations and development environment,
> > > sharing of
> > > > > > mailing lists subscribers to always keep the community
> > > up&running.
> > > > > >
> > > > > > Then on top of that framework it would be fine to get some
> > > financing
> > > > > > for additional development and refinement and eventually even
> > > build
> > > > > > some business around it to make it economically sustainable
> > > and reach
> > > > > > the "point-click-sniff" tool.
> > > > > >
> > > > > > It's a very difficult step but if we want to really change the
> > > > > > landscape of the mobile security we should reach a level that
> > > will
> > > > > > "force" the industry to upgrade or when not possible to
> > > explicitly do
> > > > > > awareness about the risk.
> > > > > >
> > > > > > On Windows Vista if i connect to an open wifi network i
> > > receive the
> > > > > > advice that the network is insecure and someone could sniff
> > > the traffic.
> > > > > >
> > > > > > Well, let's force them to do awareness on the users if the
> > > don't want
> > > > > > to upgrade, users should always know what they are using and
> > > what are
> > > > > > their risks.
> > > > > >
> > > > > > Telecommunication companies account 3 quarter of the european
> > > high
> > > > > > yield bonds (
> > http://www.cadwalader.com/assets/article/HighYieldBondMk.pdf
> > > > > > ), they are plenty of debt to invest in selling dumb sing and
> > > logos
> > > > > > for mobile, restricting network neutrality of the internet and
> > > a lot
> > > > > > of very nasty and lobbystic stuff.
> > > > > >
> > > > > >
> > > > > > I would like to see them to invest more in securing the
> > > information
> > > > > > society, that is the foundation of their business required to
> > > sustain
> > > > > > their debt.
> > > > > >
> > > > > > Let's do everything to make the project reach a "point-click-
> > > sniff"
> > > > > > tool, at least on software side.
> > > > > >
> > > > > > Let's release everything, with very precise documentation, so
> > > privacy
> > > > > > activists can demonstrate the risks to the masses.
> > > > > > Let's mirror everything across trusted networks.
> > > > > > Let's get public donations and private funding to carry on the
> > > > > > development.
> > > > > > Let's increase documentation and community strength to expand
> > > the
> > > > > > knowledge.
> > > > > >
> > > > > > That's my personal point of view, all you guys have made an
> > > excellent
> > > > > > job, now we should not stop.
> > > > > >
> > > > > > We should goes on, let anyone insisting on privacy activism in
> > > the
> > > > > > world, on information society right to "access" the technology
> > > that
> > > > > > demonstrate how the industry acted.
> > > > > >
> > > > > > We need more people involved that will start using the "tools"
> > > around
> > > > > > the policy and activism scene, that will make the process
> > > unreversible.
> > > > > >
> > > > > > Without an easy to use attack tool available for anyone that
> > > want to
> > > > > > show up which are the risks, all this effort not reach the
> > > result.
> > > > > >
> > > > > > Citizens and politicians will not care about it, and worst
> > > things will
> > > > > > do all the bests to say that "everything it's ok, it was just
> > > a fun
> > > > > > stuff by some bunch of young hackers!".
> > > > > >
> > > > > > Fabio
> > > > > > _______________________________________________
> > > > > > A51 mailing list
> > > > > > [email protected]
> > > > > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
> > > > > >
> > > >
> > > > > _______________________________________________
> > > > > A51 mailing list
> > > > > [email protected]
> > > > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
> > > >
> > > > _______________________________________________
> > > > A51 mailing list
> > > > [email protected]
> > > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
> > >
> > > ?Te llegan demasiados emails? Organizate con Hotmail. ?Cre? carpetas
> > > para todos tus correos!_______________________________________________
> > > A51 mailing list
> > > [email protected]
> > > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
> >
> > -------------- next part --------------
> > An HTML attachment was scrubbed...
> > URL:
> >
> http://lists.lists.reflextor.com/pipermail/a51/attachments/20100103/d233f054/attachment.htm
> >
> > ------------------------------
> >
> > _______________________________________________
> > A51 mailing list
> > [email protected]
> > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
> >
> >
> > End of A51 Digest, Vol 8, Issue 13
> > **********************************
> >
>
>
>
> --
> Thanks.
> Best Regards.....
> Sandeep Mishra(System Analyst, 8th Angle System)
> +91-9953996009
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> http://lists.lists.reflextor.com/pipermail/a51/attachments/20100104/2a084f2d/attachment.htm
>
> ------------------------------
>
> _______________________________________________
> A51 mailing list
> [email protected]
> http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
>
>
> End of A51 Digest, Vol 8, Issue 17
> **********************************
>



-- 
Thanks.....
_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to