Zitat von newtech <[email protected]>:

> 2.As i understood the important thing is cracked Kc key which can  
> help to listen call voices , so if i found this key in other way,  
> for example i have some special tool which can show Kc key ,i want  
> to ask how can i use this Kc key  listening voice calls ?

Sascha sent me those very useful mails some weeks ago which explain
a) how to use kraken to get the Kc and
b) how to use the Kc to decrypt the A5 ciphered data

http://lists.lists.reflextor.com/pipermail/a51/2010-July/000683.html
http://lists.lists.reflextor.com/pipermail/a51/2010-July/000803.html

The most limiting aspect is that you still need a cell without channel  
hopping. i.e. a office micro-BTS.
I heard that people work on GPU-powered multi-ARFCN splitting, but not  
sure how far these projects are at the moment.
(correct me if that information is outdated)


About other ways to get the Kc: (if it is your own SIM)
I am running decryption in a replay where i record the whole ARFCN  
(and so the encrypted conversation) into a small "compressed" format  
without knowing the Kc.

Later i re-run the decoding of this file using the SIM card which will  
answer the AUTH requests providing the Kc used for the next encrypted  
channel. (you need direct access to the SIM card and the PIN of course)
After every conversation, the provider starts a new authentication request,
so its an easy thing to get the Kc for all conversations if you have  
access to the SIM for only a few seconds.

BR,
Georg



----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.


_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to