Hello everyone, I'm trying to go through the example of GSM voice decryption posted by Dieter Spaar at http://lists.lists.reflextor.com/pipermail/a51/2010-July/000803.html with the same example capture file provided by reflextor.com http://reflextor.com/vf_call6_a725_d174_g5_Kc1EF00BAB3BAC7002.cfile.gz
All steps go fine, I hear the voice - given that Kc is provided. With Kraken, I'm trying to crack all encrypted bursts, starting from frame 862344, and down to 862570. But Kraken does not find any key on any of these bursts. I think my Kraken setup is working, at least it successfully cracks the other example burst from Frank given here: http://lists.lists.reflextor.com/pipermail/a51/2010-July/000688.html I have 39 tables. Is the capture vf_call6... so unfortunate that none of its TS1 encrypted bursts - about 30 of them - can be cracked? Thanks in advance, Dave _______________________________________________ A51 mailing list [email protected] http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
