Script for SDR (Arm64)

https://github.com/bbaranoff/PimpMyPi “`bash #!/bin/bash rm -rf /opt/GSM mkdir /opt/GSM cd /opt/GSM apt update && sudo apt upgrade -y apt install -y libusb-1.0-0-dev libuhd-dev uhd-host cmake autoconf make git clone https://github.com/pothosware/SoapySDR cd /opt/GSM/SoapySDR mkdir build && cd build && cmake .. && make -j4 && make install && ldconfig cd /opt/GSM sudo apt install -y libtool git […]

Downgrade from 4G to 3G w/ 2 LimeSDRs srsLTE and modmobjam on latest Kali host

# apt update && apt upgrade # apt install srslte limesuite-dev soapysdr0.6-module-all soapysdr-module-all libuhd-dev # apt remove soapysdr0.6-module-audio soapysdr-module-audio # git clone https://github.com/bbaranoff/srslteconfigs ~/.srs # git clone https://github.com/Synacktiv/modmobjam Running : Now there will be two frequencies that we name freq1 and freq2 freq1 is the basic LTE frequency earfcn 3050 by default. We can know […]

srsLTE w/ lime mini

# sudo apt-get install cmake libfftw3-dev libmbedtls-dev libboost-program-options-dev libconfig++-dev libsctp-dev RF front-end driver: nano /root/.config/srslte/enb.conf Change [rf] section edit /root/.config/srslte/user_db.csv with your sim card value running sudo srsenb sudo srsepc Note: The UE database file(user_db.csv) has to be within the same directory where you would run the srsepc command.

Some little things for mobile phone hacking… (LTE)

hello video where you see sms_request function and Virtual machine ctf_mobile.7z with clone function. I think it work just for the same base station between the target and the malicious UE. From this link http://blog.ptsecurity.com/2015/07/the-mitm-mobile-contest-gsm-network.html could tell which branche does provide these function? Thank you Lte inspector 2018_modmobjam breaking_lte_on_layer_two us-17-Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback lin_huan_-_ue_security View post on imgur.com […]

Back To Top
getCurrentPosition()