Email Techs

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 31 December 2009

The Anatomy Of GSM Encryption Hack

Posted on 23:43 by Unknown

After Karsten Nohl hacked the GSM encryption, I thought to Digg this a bit in more detail. So i have written this whole guide in favor of it. So lets start.

 

Karsten Nohl, A Germen Hacker have claimed that he have successfully cracked the GSM mobiles security algorithm. That we all know but the question that arises here is what he did to crack the GSM encryption which have been for years, actually from 1987.

 

There was a conference know as 26th Chaos Communication Congress (26C3) , as we all know which is indeed the most respected and one of the most seeable conferences in Europe.

 

3842740300_213911ed38_o

 

It takes place from December 27th to December 30th 2009 at the bcc Berliner Congress Center in Berlin, Germany. which is quite recent and what was special this time on it was the GSM encryption crack details which were going to be demoed in the conference.

 

The 26C3s slogan is "Here Be Dragons".

 

As a matter of fact i was not there in the conference and thus missed all the stuff going on there. but some of my twitter friends helped me out with this. When twitters started to tweet with the hash tag of #26C3 all was going clear about it...

 

Basics

 

Ok lets began with the basic of the attack and what can be done with, what we need, what he cracked etc

 

Karsten Nohl GSM Crack 26C3

Here is the presentation or you can say the slides, which Nohl presented during the 26C3 which gives all the detail regarding the whole GSM encryption hack.

 

“… the GSM call has to be identified and recorded from the radio interface. […] we strongly suspect the team developing the intercept approach has underestimated its practical complexity.


A hacker would need a radio receiver system and the signal processing software necessary to process the raw radio data.”

–GSMA, Aug.„09

What a Hacker Need

As written in the document a hacker would need a radio receive system and also a signal processing software which is necessary to produce the raw data to decrypt it.

 

image

 

A Radio Receiver System    -

 

 

 

 

2010-01-01_120838

 

A Signal processing software  -

 

 

Ok this might explain you a bit about what a hacked need. Actually its not the kind of hack which you can perform with a laptop. you would need to decrypt which the Nohl have used the rainbow tables which were not explained in the previous hacks between 1995 to 2008 which were not quite successful.

 

There are various different setting you would need to do in the radio and OpenBTS. and other configuration, mods. Its pretty complicated stuff there.

 

Rainbow Tables

The main reason why this crack with A5/1 attacks were not done in the previous years is because of the rainbow tables which the Nohl introduced in the cracking procedure.

 

Previously the crack used some big system to decrypt but it was too expensive that it any hacked would not be able to crack it and that's why the hack was also not released in the internet.

 rainbow-table-bundle-medium

 

But there come Nohl with his rainbow tables. They planned to do a workshop today, where you could bring your GSM data and they wanted to try to decrypt it. However, due to legal reasons they had to cancel it.

 

http://events.ccc.de/congress/2009/wiki/The_demonstration_is

 

The next step would be for someone to package the attack in the form of a script-kiddie-usable utility that would perform interception/decryption using an off-the-shelf GSM USB modem.

 

That seems to be how these things go; they'll drag their feet as long as possible, until the public pressure becomes unbearable.

 

So i guess most of you have to wait for the script-kiddies bundle to release so you can use it.

 

Get a working copy of the table generator rainbow tables by either :

A) Downloading binaries

1. Linux 32bit

2. Linux 64bit

3. windows 32bit

4. windows 64bit

revision 58 from October 25 2009

Or

B) Compiling The Program

 

Then, Running The Program

 

 

Stuff We Got For You

For more information i have made a list of papers, sildes, links, and videos of 26C3 presentation on the 26C3 for you.

 

Slides - Karsten Nohl GSM Crack 26C3

 

Videos - There are different sources of the videos. so i have written all the sources with the torrents.

 

1. 26c3-3654-en-gsm_srsly.mp4

2. 26c3-3654-en-gsm_srsly.mp4.md5

3. 26c3-3654-en-gsm_srsly.mp4.torrent

 

GSM: SRSLY? Part 1 - Part 2 - Part 3

 

Links -

1. http://rnmshot.dvrdns.org/

2. ftp://ftp.ccc.de/congress/26C3/mp4/

3. http://85.214.20.203/26C3/GSM/

4. http://reflextor.com/torrents/

5. http://reflextor.com/trac/a51

 

 

Happy Hacking @hackerthedude

Email ThisBlogThis!Share to XShare to Facebook
Posted in Guides, News, Pro Hacks, Torrent | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • New iPhone Worm That Attacks Jail Broken iPhones Also
    Well its again the iPhone which have come to the headlines again , But this time the apple is really pissed of with the kind of work the Ha...
  • Ophcrack Guide : Hack Any Password In Windows
    There might be many times you have heard of Ophcrack, now what is actually it well is a popular to crack passwords in windows. Many...
  • ‘New Moon” Fans Beware Of Hackers
    We are Getting Constant Rumors from many places that Hackers are going to target the the fans of the upcoming movie “New Moon” ...
  • Modern Warfare 2 Hacked By Hackers Now Up For Sale
    Looks like our hackers mate out there have now come with some cool shit, Its the New COD : MODERN WARFARE 2 which is the continuation o...
  • Official Indian Army Website –“Safe From Hackers”
    The new website for the Indian army (IA) have been launched and the authorities are saying it is really safe from any Hackers Activity. ...
  • Dear Mozilla, Please “DONT” fix this. [Pic]
    Today only i found this pic on Digg and i thought there should be a “DONT” in it. isn't it ? ..
  • Norton And Kaspersky On Commercial Fight For Security Suit’s 2010
    When there is Cyber crime there are antivirus and after that there is a fight in between them. You all be knowing about the two most pop...
  • Ubisoft Hacked : Fake or Real ?
    Some days ago we got news about Ubisoft being hacked by some hackers and was being believed till yet but after then some news breached out...
  • Peer Block : Safeguard Yourself From Harmful Server’s
    Have you ever heard of a software called Peer Guardian . So do you know what it is actually well here is the guide for you guys. Peer G...
  • 30 Million Facebook, MySpace, and Orkut ID’s Hacked
    Hackers Have crossed the security boundaries of a widget and multi-social networking based company RockYou.com which host many users from s...

Categories

  • Broadband
  • cyberwar
  • Ebooks
  • email
  • Gamers
  • Guides
  • Hacked
  • Hacker The Dude News
  • Hacking
  • Hacking Software
  • keylogger
  • Misc
  • Mobie's
  • News
  • Orkut
  • PHP
  • Pics
  • Pro Hacks
  • Small Hacks
  • Stylize
  • Tools
  • Torrent
  • Tricks
  • Twitter
  • Video's
  • Virus's
  • Weekly Top 10 Internet Tools
  • Windows
  • XSS

Blog Archive

  • ►  2010 (32)
    • ►  March (7)
    • ►  February (3)
    • ►  January (22)
  • ▼  2009 (123)
    • ▼  December (34)
      • The Anatomy Of GSM Encryption Hack
      • Your Mobile Is In Danger : Karsten Nohl Cracks GSM...
      • WinScanX : A Simple, Fast and Portable Windows Aud...
      • Total Round Up For "Top 10 Sexy Hackers of 2009"
      • Christmas Present For Hackers [Pic]
      • Net Wars : New Challenge For Hackers [Video]
      • FBI Is Watching You : Now On Facebook, Twitter, Yo...
      • Process Hacker V1.9 Released
      • AWeber Hacked : Recent Data Compromise
      • RSnake's 2nd Take On DNS Rebinding
      • Finding IP address in Gmail From Email Header's
      • The Top Targeted Brands Of 2009 [Pic]
      • Bootkit : One Deadly Weapon In The Attacker Arsenal
      • Is Google Public DNS Safe ?
      • New Html 5 XSS Vector’s By Gareth Heyes
      • Keep Your Encrypted Notes Safe With Fsekrit
      • The Anatomy of the Twitter Hack - Twitter's DNS Se...
      • Wireshark v1.2.5 Released
      • 30 Million Facebook, MySpace, and Orkut ID’s Hacked
      • Hackers Slays Microsoft’s Forensics Toolkit
      • Torpig Domain Generator : Hackers Using Twitter Tr...
      • Motorola Droid Jailbroken By Hackers
      • The History of Hacking [Pic]
      • The Year's Most-Hacked Software – Forbes
      • Hackers Like Google Chrome OS
      • Co-NASA Websites Hacked With SQL Injections
      • OllyDbg Beta 2 Final Released
      • RSnake On DNS Rebinding [Video]
      • Is Your Son a Computer Hacker ?
      • Safe Yourself From XSS Attack : Microsoft Anti-Cro...
      • Hackers Now Attacking Swine Flu Patients – Fake Va...
      • Hackers Don’t Give A Shit [Pic]
      • Team Viewer 5 Beta Released
      • Basic XSS Cross Site Scripting Demo [Video]
    • ►  November (30)
    • ►  October (24)
    • ►  September (9)
    • ►  August (6)
    • ►  July (1)
    • ►  June (3)
    • ►  May (16)
Powered by Blogger.

About Me

Unknown
View my complete profile