Categories

DeepSec 2011: hacking GSM packets using scapy

Posted on Sunday, August 26th, 2012 in open source, security, tools, wireless by the machinegeek

In this talk from the DeepSec 2011 security conference Laurent ‘Kabel’ Weber, co-founder of the Chaos Computer Club in Berlin, details the enhanced scapy software tool to attack GSM via packet manipulation. This presentation introduces a scapy-addon allowing users to create GSM layer 3 packets using simple Python syntax. His hardware setup includes a USRP1 with RFX900 daughterboard, with clock generation via a Clocktamer. He sends messages to mobile GSM devices using openBTS.

This entry was posted on Sunday, August 26th, 2012 at 2:23 pm and is filed under open source, security, tools, wireless. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

One Response to “DeepSec 2011: hacking GSM packets using scapy”

  1. Ronald says:

    alert(“It works!”);

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • KH: On searching for commcloud, I guess this is what they are using: http://www.itsoc.org/people/bog/bog-meeting-chicago-il-2017/cloudproposal.pdf If the audio signal path on their commcloud server is simple wiring,...
  • Alex Lao: Wow, I didn't expect to be featured on here! It's an honor.
  • Inyaki: Hi, Would you si king to point me the corsair's single 12v rail supplies? I am interested on it but I can't find it.....
  • peter: In the middle of the geek reading I get a tweet. Here I am
  • icserny: Unfortunately the DIY PCB homepage.is no longer available. Something happened...