Script for SDR (Arm64) “`bash #!/bin/bash rm -rf /opt/GSM mkdir /opt/GSM cd /opt/GSM apt update && sudo apt upgrade -y apt install -y libusb-1.0-0-dev libuhd-dev uhd-host cmake autoconf make git clone cd /opt/GSM/SoapySDR mkdir build && cd build && cmake .. && make -j4 && make install && ldconfig cd /opt/GSM sudo apt install -y libtool git […]

Downgrade from 4G to 3G w/ 2 LimeSDRs srsLTE and modmobjam on latest Kali host

# apt update && apt upgrade # apt install srslte limesuite-dev soapysdr0.6-module-all soapysdr-module-all libuhd-dev # apt remove soapysdr0.6-module-audio soapysdr-module-audio # git clone ~/.srs # git clone Running : Now there will be two frequencies that we name freq1 and freq2 freq1 is the basic LTE frequency earfcn 3050 by default. We can know […]

srsLTE w/ lime mini

# sudo apt-get install cmake libfftw3-dev libmbedtls-dev libboost-program-options-dev libconfig++-dev libsctp-dev RF front-end driver: nano /root/.config/srslte/enb.conf Change [rf] section edit /root/.config/srslte/user_db.csv with your sim card value running sudo srsenb sudo srsepc Note: The UE database file(user_db.csv) has to be within the same directory where you would run the srsepc command.

Some little things for mobile phone hacking… (LTE)

hello video where you see sms_request function and Virtual machine ctf_mobile.7z with clone function. I think it work just for the same base station between the target and the malicious UE. From this link could tell which branche does provide these function? Thank you Lte inspector 2018_modmobjam breaking_lte_on_layer_two us-17-Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback lin_huan_-_ue_security View post on […]

Back To Top