Zitat von newtech <[email protected]>: > 2.As i understood the important thing is cracked Kc key which can > help to listen call voices , so if i found this key in other way, > for example i have some special tool which can show Kc key ,i want > to ask how can i use this Kc key listening voice calls ?
Sascha sent me those very useful mails some weeks ago which explain a) how to use kraken to get the Kc and b) how to use the Kc to decrypt the A5 ciphered data http://lists.lists.reflextor.com/pipermail/a51/2010-July/000683.html http://lists.lists.reflextor.com/pipermail/a51/2010-July/000803.html The most limiting aspect is that you still need a cell without channel hopping. i.e. a office micro-BTS. I heard that people work on GPU-powered multi-ARFCN splitting, but not sure how far these projects are at the moment. (correct me if that information is outdated) About other ways to get the Kc: (if it is your own SIM) I am running decryption in a replay where i record the whole ARFCN (and so the encrypted conversation) into a small "compressed" format without knowing the Kc. Later i re-run the decoding of this file using the SIM card which will answer the AUTH requests providing the Kc used for the next encrypted channel. (you need direct access to the SIM card and the PIN of course) After every conversation, the provider starts a new authentication request, so its an easy thing to get the Kc for all conversations if you have access to the SIM for only a few seconds. BR, Georg ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. _______________________________________________ A51 mailing list [email protected] http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
