layer2/3 ported to target? paging attack code?

Kevin Redon ml at mail.tsaitgaist.info
Wed Sep 4 22:08:45 CEST 2013


sorry, here the scripts to push the values

Excerpts from Tim Ehlers's message of 2013-09-04 20:46:34 +0200:
> On Wed, 4 Sep 2013, Dario Lombardo wrote:
> 
> Hi,
> 
> > Anyone tried it? I've downloaded the patch and applied it to the 
> > changset you said. Compilation is ok. Should it generate new images to 
> > dump to phone? I can see only standard targets.Dario
> 
> yes, as I can see, the rssi Target has been modified. So need to load that 
> target with the modified osmocon, which opens another UNIX-Socket 
> /tmp/osmocom_mi to read the victims TMSI. Whith "*" you can toggle the 
> attack modes, which are DETACH, PAGING, RANGE_PAGING, ALL_PAGING, 
> STEAL_SMS.
> 
> My only problem is, that I can't find out how to send the TMSI over the 
> Socket. If I only send the TMSI with e.g. socat, I get
> 
> Err from socket: Bad address
> 
> from osmocon...
> 
> What do I miss?
> 
> Cheers
> 
> Tim
-------------- next part --------------
A non-text attachment was scrubbed...
Name: push-tmsi.sh
Type: application/x-sh
Size: 335 bytes
Desc: not available
URL: <http://lists.osmocom.org/pipermail/baseband-devel/attachments/20130904/5438dbdc/attachment.sh>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: push-kc.sh
Type: application/x-sh
Size: 431 bytes
Desc: not available
URL: <http://lists.osmocom.org/pipermail/baseband-devel/attachments/20130904/5438dbdc/attachment-0001.sh>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: push-range.sh
Type: application/x-sh
Size: 395 bytes
Desc: not available
URL: <http://lists.osmocom.org/pipermail/baseband-devel/attachments/20130904/5438dbdc/attachment-0002.sh>


More information about the baseband-devel mailing list