3DS Pro
3DS Pro
Now, before we delve deeper into the subject, some basic terminology and
background information on GSM is provided below as it’s necessary for you to
understand and digest this article further ahead as you will scroll down and
more importantly how to go about making one for your own team (considering
you are part of an underground cybercrime network and a heavy hitter)
#AN SDR
SDR stands for “Software Defined Radio” it is a radio broadcast
communication technology, which is based on a software-defined wireless
communication protocol instead of being implemented through hard-wires.
SDR allows easy signal processing and experimentation with more complex
radiofrequency builds.
#AN RTL-SDR
#GSM
GSM stands for “Global System for Mobile” communication. FYI more than 5
billion people use GSM technology to communicate all over the world.
Operators in every country use a different frequency in the GSM possible
spectrum. If you want more info on that you can jump ahead and read more
here https://www.worldtimezone.com/gsm.html but doing so will open a new
window..
#IMSI
IMSI stands for “International Mobile Subscriber Identity” and is globally
unique for each subscriber. The IMSI consists of 15 digits, which contain the
Mobile Country Code (MCC), Mobile Network Code (MNC), and the Mobile
Subscriber Identification Number (MSIN). The IMSI is stored in the Subscriber
Identity Module also known as your SIM card.
So now you have a little bit of idea of where we are heading with this article,
let’s get the “generations” out of the way as well and of course, we always
aim is to keep our articles lean by only touching base on the information that is
important and necessary for that particular subject
#1G
The first generation of mobile phones was implemented in the 1980s. The data
sent from and to the phones were analog and naturally had no security
whatsoever.
Additionally, it was only possible to make voice calls with 1G networks, you
may remember that ext messaging was not yet possible at that point.
#2G
In the 1990s the second generation of mobile phone technology was rolling out.
Features such as SMS, data, MMS, voice mail, and call forwarding were
implemented also, the radio signals became digital and were encrypted.
Later 2.5G and 2.75G were introduced and both implemented improved
techniques for data transfer such as GPRS and EDGE.
The Global System for Mobile Communication (GSM) standard is the most
widely used 2G standard and as of 2007, the most widely used mobile phone
protocol in general.
#3G
3G was slowly rolled out in the 00s, the International Telecommunication Union
(ITU) set up specifications that label certain mobile networks like 3G. 3G mobile
networks support Global positioning systems (GPS), mobile television, and
video conferencing.
It also offers way more data transfer bandwidth and speed. Furthermore, the
encryption standard is improved by using two-way authentication between the
mobile phone and the base station and having improved encryption standards.
#4G
4G is also specified by the International Telecommunication Union (ITU). One of
the requirements of 4G is a speed of 100 Mbit/s in a car or train and 1 Gbit/s for
pedestrians.
A 4G internal network is also completely IP-based, so no more circuit-switched
telephone.
It must be noted that the current 4G standards are not actually fully compliant
yet with the ITU specifications. However, they are still considered 4G since they
are the closest to 4G speeds and are substantially better than 3G technologies.
#5G
The next-generation of telecom networks (fifth generation or 5G) started hitting
the market at the start of 2019 and will continue to expand worldwide in 2021
and beyond.
Besides the speed improvement, 5G is expected to unleash a massive IoT
(Internet of Things) ecosystem where networks can serve communication
needs for billions of connected devices, with the right trade-offs between
speed, latency, and cost, this is going to be very interesting, honestly, we can’t
wait!
#GSM ARCHITECTURE
Take a good look at this below as we will explain that for your ease so it will be
easier to understand as we are building your knowledge step by step before we
go for the kill, so to speak!
#MS
MS represents a “mobile station”. The mobile station is a device that can
access the GSM network via radio.
The mobile station can be broken down into two separate parts, the mobile
hardware, and the SIM card.
#BS
No, it’s not bull shit, BS stands for “base station” iit s the antenna and is also
called the “cell tower” or “cell site.”
One BS covers a cellular area in the cellular network. The size of this cell can
vary from a few hundred meters to several kilometers.
The size of the cell area depends on the landscape features and the population
density of the area.
In subway stations and large buildings, relay stations can be placed to act as
repeaters. These relay stations then wire the signal to the nearest base station.
#BSC
BSC means “base station controller” this controls several base stations. It
handles the session handoffs between the different base stations when a user
is moving through different cells.
If the base stations are not connected to the same BSC, then the Mobile
Switching Center (MSC) handles the handover.
#MSC
MSC is a “mobile switching center” it is responsible for managing the
authentication, handover to the other BSCs and routing calls to the landline.
#VLR
VLR is for “Visitor Location Register” and each MSC has its own Visitor Location
Register (VLR). The VLR holds subscriber information of subscribers that are
under the care of the MSC (which are copied from the Home Location Register
(HLR)).
The VLR, for example, holds the Temporary Mobile Subscriber Identity (TMSI),
which is a temporary alias for the IMSI. This is to reduce the frequent
broadcasting of the IMSI.
#HLR
The “home location register” HLR stores personal subscriber information
like the IMSI and the phone number. There is only one HLR for every GSM
network provider.
#AUC
AUC means an “Authentication Center” it handles the authentication
process of a subscriber to the network.
The AUC holds the shared secret key and generates the random challenge that
is used to authenticate.
An IMSI Catcher is a device, with the right software it can be used to locate and
track all mobile phones that are switched on in a certain area.
The IMSI Catcher does this by “pretending” to be a mobile phone tower so it
basically tricks your phone into connecting to it and then revealing your
personal details without your knowledge.
IMSI catchers are indiscriminate surveillance tools that could be used to track
the activities of your target, they can also monitor calls and edit your target
messages and the best part is that they wouldn’t even know it had happened.
#HOW DOES AN IMSI CATCHER WORK?
As explained above, IMSI Catchers are devices that act like fake cell towers,
which trick a target’s device to connect to them and then relay the
communication to an actual cell tower of the network carrier.
The target’s communications in the form of calls, text messages, internet
traffic, etc. go through the IMSI Catcher, which can read messages, listen to the
calls, and so on.
While all this is happening at the same time your victim will have no knowledge
that this is happening as everything will seemingly work as normal, in
underground terms we can refer to it as a “Man-In-Middle” attack.
This is possible because mobile phones are always looking for the mobile tower
with the strongest signal to provide the best commutation. This is usually the
nearest one. At the same time, when a device connects to a cell tower, it
authenticates to it via an IMSI number.
However, the tower doesn’t have to authenticate back. This is why every time
someone places a device that acts as a cell tower near your phone, it would
connect to it and give away its IMSI.
#INSTALLATION
#Hardware
Feel free to search any of the hardware below on aliexpress or alibaba as you
will find every single piece of hardware needed to make your own IMSI catcher.
You will then use the device for practical purposes to bypass 3D-secure
protocols, of course, you can use it for a whole range of things other than just
for your cybercriminal activities but we recommends that you use the tools that
are needed to do specific jobs and not get into extra-curricular activities that
may end up wasting your time, if you are into gathering intel for blackmailing
and what not then suit yourself, but always weigh the risks involved before
getting into things to see if you have the infrastructure needed to carry out the
jobs that you are after or else you can always talk to us (only if you are serious
and ready to take action).
So, the hardware that you will need is:
• RTL-SDR
• Hackrf
• USRP
• Blade-RF
#SOFTWARE
The following software tools are required for practical purposes.
• GR-GSM – A python module used for receiving information transmitted
by GSM.
• Wireshark – Captures the wireless traffic.
• IMSI-Catcher – This program shows the IMSI number, country, brand,
and operator of cellphones.
• GQRX – Software defined radio receiver.
• RTL-SDR Tools – Gets the information on the RTL SDR dongle.
• Kailbrate – Determines the signal strength.
cd gr-gsm
mkdir build
cd build
cmake ..
make
sudo ldconfig
export PYTHONPATH=/usr/local/lib/python3/dist-packages/:
$PYTHONPATH
#KALIBRATE INSTALLATION
sudo apt-get update
cd kalibrate-rtl
./configure
make
See you can easily search for nearby GSM base stations using “Kalibrate” or
“GRGSM_Scanner” tools.
Three base stations were found. The signal mentioned above was relatively
strong with a frequency of 945.4MHz and 945.6MHz.
In the above manner, we obtained some parameter information of the base
station, such as: center frequency, channel, ARFCN value, LAC, MCC, MNC
value, etc.
With the above details, we want to sniff the base station frequency. For that the
program called “grgsm_livemon” will be used.
The help guide of the “grgsm_livemon” tool.
In Wireshark, the captured data of the base station’s MNC, MCC, LAI, and other
information can be seen.