Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/W00t3k/Awesome-Cellular-Hacking

Awesome-Cellular-Hacking
https://github.com/W00t3k/Awesome-Cellular-Hacking

List: Awesome-Cellular-Hacking

eviltwin gsm gsm-network hacking lte lte-evil-twin rogue-bts sdr

Last synced: about 2 months ago
JSON representation

Awesome-Cellular-Hacking

Awesome Lists containing this project

README

        

# Awesome-Cellular-Hacking (-In the process of Updating-)
Please note multiple researchers published and compiled this work. This is a list of their research in the 3G/4G/5G Cellular security space. This information is intended to consolidate the community's knowledge. Thank you, I plan on frequently updating this "Awesome Cellular Hacking" curated list with the most up to date exploits, blogs, research, and papers.

The idea is to collect information like the BMW article below, that slowly gets cleared and wiped up from the Internet - making it less accessible, and harder to find. Feel free to email me any document or link to add.

## Rogue BTS & CDMA/GSM Traffic Impersonation and Interception

- [How To Build Your Own Rogue GSM BTS For Fun and Profit](https://www.evilsocket.net/2016/03/31/How-To-Build-Your-Own-Rogue-GSM-BTS-For-Fun-And-Profit/)
"In this blog post I’m going to explain how to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking … yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception."
- [How to create an Evil LTE Twin/LTE Rogue BTS](https://adam-toscher.medium.com/how-to-create-an-evil-lte-twin-34b0a9ce193b)
How to setup a 4G/LTE Evil Twin Base Station using srsLTE and a USRP SDR device.
- [Practical attacks against GSM networks: Impersonation](https://blog.blazeinfosec.com/practical-attacks-against-gsm-networks-part-1/)
"Impersonating a cellular base station with SDR: With the flexibility, relative low cost of Software Defined Radio (SDR) and abundance of open source projects that emulate a cell tower, successfully impersonating a GSM Base Station (BTS) is not a difficult task these days."
- [Tutorial-Analyzing GSM with-Airprobe and Wireshark](https://www.rtl-sdr.com/rtl-sdr-tutorial-analyzing-gsm-with-airprobe-and-wireshark/) "The RTL-SDR software defined radio can be used to analyze cellular phone GSM signals, using Linux based tools GR-GSM (or Airprobe) and Wireshark. This tutorial shows how to set up these tools for use with the RTL-SDR."
- [Traffic Interception for Penetration Testing Engagements](https://research.nccgroup.com/2016/05/19/gsm-gprs-traffic-interception-for-penetration-testing-engagements/) "Within the penetration testing domain quite often we have to deal with different technologies and devices. It’s important to cover all aspects of connectivity of a device being tested which is why we have built a GSM/GPRS interception capability. There are a number of different devices and systems that make use of GSM/GPRS, non-exhaustively we commonly see:"

# Rogue Base Stations or Evil BTS's, 2G/3G/4G

[OpenBTS software](http://openbts.org/) is a Linux application that uses a software-defined radio to present a standard 3GPP air interface to user devices, while simultaneously presenting those devices as SIP endpoints to the Internet

[YateBTS](https://yatebts.com/) is a software implementation of a GSM/GPRS radio access network based on Yate and is compatible with both 2.5G and 4G core networks comprised in our YateUCN unified core network server. Resiliency, customization and technology independence are the main attributes of YateBTS

[BladRF and YateBTS Configuration](https://github.com/Nuand/bladeRF/wiki/Setting-up-Yate-and-YateBTS-with-the-bladeRF)

[srsRAN](https://github.com/srsLTE/srsLTE) is an Open-source 4G and 5G software radio suite developed by Software Radio Systems (SRS). (www.softwareradiosystems.com) The srsLTE project has evolved. We are now srsRAN

# Installing a USRP Device on Linux

```
sudo add-apt-repository ppa:ettusresearch/uhd
sudo apt-get update
sudo apt-get install libuhd-dev libuhd003 uhd-host
uhd_find_devices
cd /usr/lib/uhd/utils/
./uhd_images_downloader.py
sudo uhd_usrp_probe
```

```
sudo uhd_usrp_probe
[INFO] [UHD] linux; GNU C++ version 7.4.0; Boost_106501; UHD_3.14.1.1-release
[INFO] [B200] Detected Device: B*****
[INFO] [B200] Operating over USB 3.
[INFO] [B200] Initialize CODEC control...
[INFO] [B200] Initialize Radio control...
[INFO] [B200] Performing register loopback test...
[INFO] [B200] Register loopback test passed
[INFO] [B200] Setting master clock rate selection to 'automatic'.
[INFO] [B200] Asking for clock rate 16.000000 MHz...
[INFO] [B200] Actually got clock rate 16.000000 MHz.
_____________________________________________________
/
| Device: B-Series Device

```

## Troubleshooting SDR's that are running BTS software

Common issues:
- Improper FW
- Lack of proper antennas
- Wrong cellular phone type
- Wrong SIM
- Not configured correctly - Mobile Country Codes (MCC) and Mobile Network Codes (MNC)
- Incorrect software BTS settings
- Virtualized platform is not fast enough
- Wrong SDR firmware

## [JAMMING SPECIFC ATTACKS](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-187.pdf)

4.5 Radio Jamming Attacks
Jamming attacks are a method of interrupting access to cellular networks by exploiting the radio
frequency channel being used to transmit and receive information. Specifically, this attack occurs
by decreasing the signal to noise ratio by transmitting static and/or noise at high power levels
across a given frequency band. This classification of attack can be accomplished in a variety of
ways requiring a varying level of skill and access to specialized equipment. Jamming that targets
specific channels in the LTE spectrum and is timed specifically to avoid detection is often
referred to as smart jamming. Broadcasting noise on a large swath of RF frequencies is referred
to as dumb jamming.

4.5.1 Jamming UE Radio Interface
A low cost, high complexity attack has been proposed to prevent the transmission of UE
signaling to an eNodeB.

4.5.2 Jamming eNodeB Radio Interface
Base stations may have physical (e.g., fiber optic) or wireless (e.g., microwave) links to other
base stations. These links are often used to perform call handoff operations. As mentioned in
section 4.5.1, it may be possible to jam the wireless connections eNodeBs use to communicate
with each other. Although theoretical, the same type of smart jamming attacks that are used
against the UE could be modified to target communicating eNodeBs, which would prevent the
transmission of eNodeB to eNodeB RF communication.

# *- To be updated - "TALK" section - To be updated -*

# Blackhat 2022 Talks
- [Attacks from a New Front Door in 4G & 5G mobile networks](https://i.blackhat.com/USA-22/Wednesday/US-22-Shaik-Attacks-From-a-New-Front-Door-in-4G-5G-Mobile-Networks.pdf)

# Blackhat 2021 Talks
- [Over The Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones Deck](https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Over-The-Air-Baseband-Exploit-Gaining-Remote-Code-Execution-On-5G-Smartphones.pdf)
- [Over The Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones](https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Over-The-Air-Baseband-Exploit-Gaining-Remote-Code-Execution-On-5G-Smartphones-wp.pdf)

## Equipment used in "Over The Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones"

* [Ettus USRP B210](https://www.ettus.com/all-products/ub210-kit/)
* [srsENB](https://github.com/srsran/srsRAN/tree/master/srsenb)
* [Open5GS](https://github.com/open5gs)
* [sysmo-usim-tool](https://osmocom.org/projects/cellular-infrastructure/wiki/SysmoISIM-SJA2)
* [pysim](https://github.com/osmocom/pysim)
* [CoIMS](https://play.google.com/store/apps/details?id=com.sherle.coims&hl=en_US&gl=US)
* [CoIMS_Wiki](https://github.com/herlesupreeth/CoIMS_Wiki/)
* [Docker_open5gs](https://open5gs.org/open5gs/docs/tutorial/03-VoLTE-dockerized/)

## [Recent SeaGlass IMSI-Catcher News](https://seaglass.cs.washington.edu/) - Organizing -
- [SeaGlass: Enabling City-Wide IMSI-Catcher Detection](https://seaglass-web.s3.amazonaws.com/SeaGlass___PETS_2017.pdf)

## CERT/Media Alerts
- [Voice over LTE implementations contain multiple vulnerabilities - CERT ALERT](https://www.kb.cert.org/vuls/id/943167/)

## 5G Cellular Attacks (Soon to be updated)
- [Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](https://assets.documentcloud.org/documents/5749002/4G-5G-paper-at-NDSS-2019.pdf)
- [European 5G Security in the Wild: Reality versus Expectations](https://arxiv.org/pdf/2305.08635.pdf)
- [Threat modeling framework for mobile communication system](https://arxiv.org/pdf/2005.05110v1.pdf)
- [ENISA THREAT LANDSCAPE FOR 5G NETWORKS](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/ENISA%20threat%20landscape%20for%205G%20Networks.pdf)
- [Protecting the 4G and 5G Cellular PagingProtocols against Security and Privacy Attacks](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/popets-2020-0008.pdf)
- [Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/wisec19-preprint.pdf)
- [5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/5GReasoner.pdf)
- [QCSniper - A tool For capture 2g-4g air traffic using qualcomm phones ](https://labs.p1sec.com/2019/07/09/presenting-qcsuper-a-tool-for-capturing-your-2g-3g-4g-air-traffic-on-qualcomm-based-phones/)
- [Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](http://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf)
- [New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols ](https://arxiv.org/pdf/1905.07617.pdf)
- [New Vulnerabilities in 5G Networks](https://threatpost.com/5g-security-flaw-mitm-targeted-attacks/147073/)
- [Side Channel Analysis in 4G and 5G Cellular Networks](https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)
- [5G NR Jamming, Spoofing, and Sniffing](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/5gjam.pdf)

## 4G/LTE Cellular Attacks
- [LTRACK: Stealthy Tracking of Mobile Phones in LTE](https://www.usenix.org/system/files/sec22summer_kotuliak.pdf)
- [Detecting Fake 4G Base Stations In Real Time](https://i.blackhat.com/USA-20/Wednesday/us-20-Quintin-Detecting-Fake-4G-Base-Stations-In-Real-Time.pdf)
- [BaseSAFE: Baseband SAnitized Fuzzing through Emulation](https://arxiv.org/pdf/2005.07797.pdf)
- [Paging Storm Attacks against 4G/LTE Networks from Regional Android Botnets: Rationale, Practicality, and Implications](https://www.cs.binghamton.edu/~ghyan/papers/wisec20.pdf)
- [This is Your President Speaking:Spoofing Alerts in 4G LTE Networks](https://netstech.org/wp-content/uploads/2019/06/cmas-mobisys2019.pdf)
- [Hacking Public Warning System in LTE Mobile Networks](https://conference.hitb.org/hitbsecconf2019ams/materials/HAXPO%20D1%20-%20Hacking%20LTE%20Public%20Warning%20Systems%20-%20Weiguang%20Li.pdf)
- [RF Exploitation: IoT/OT Hacking with SDR](https://conference.hitb.org/hitbsecconf2019ams/materials/HAXPO%20D2%20-%20Demystifying%20IoT:OT%20Hacks%20With%20SDR%20-%20Himanshu%20Mehta%20&%20Harshit%20Agrawal.pdf)
- [Forcing a targeted LTE Cellphone Into an Eavesdropping Network](https://youtu.be/hNDChDM1hEE)
- [Hacking Cellular Networks](https://www.openairinterface.org/docs/workshop/3_OAI_Workshop_20170427/Session2_UE/Lin_Huan_-_UE_Security.pdf)
- [Bye-Bye-IMSI-Catchers](https://conference.hitb.org/hitbsecconf2018pek/materials/D2T2%20-%20Bye%20Bye%20IMSI%20Catchers%20-%20Security%20Enhancements%20in%205g%20-%20Lin%20Huang.pdf)
- [White-Stingray: Evaluating IMSI Catchers Detection Applications](http://www.cs.ox.ac.uk/files/9192/paper-final-woot-imsi.pdf)
- [Breaking_LTE_on_Layer_Two](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/breaking_lte_on_layer_two.pdf)
- [LTE/LTE-A Jamming, Spoofing, and Sniffing - Assessment and Mitigation](https://github.com/W00t3k/Awesome-cellularHacking/blob/master/LTE_Jamming_Magazine_Paper_final.pdf)
- [Exploring LTE security and protocol exploits with open source software and low-cost software radio by Roger Jover](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/LTE_open_source_HackerHalted.pdf)
- [LTE PROTOCOL EXPLOITS: IMSI CATCHERS,BLOCKING DEVICES AND LOCATION LEAKS](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/LTE_security_TakeDownCon.pdf)
- [Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/Prac-4G-Attacks.pdf)
- [Using OpenBTS - "Experimental_Security_Assessment_of_BMW_Cars by KeenLab"](https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Assessment_of_BMW_Cars_by_KeenLab.pdf)
- [LTE Security – How Good Is It?](https://csrc.nist.gov/CSRC/media/Presentations/LTE-Security-How-Good-is-it/images-media/day2_research_200-250.pdf)
- [Guide to LTE Security](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-187.pdf)
- [Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards](https://www.blackhat.com/docs/us-15/materials/us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security-wp.pdf)
- [4G Access Level Security Assessment](https://hackinparis.com/data/slides/2015/timur_yusinov_root_via_sms.pdf)
- [Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards](https://www.blackhat.com/docs/us-15/materials/us-15-Yu-Cloning-3G-4G-SIM-Cards-With-A-PC-And-An-Oscilloscope-Lessons-Learned-In-Physical-Security-wp.pdf)
- [LTE security and protocol exploits](https://github.com/W00t3k/Awesome-CellularHacking/blob/master/ShmooCon_talk_final_01162016.pdf)
- [LTE Recon - (Defcon 23)](https://www.rtl-sdr.com/one-more-rtl-sdr-talk-from-defcon-23/)
- [LTE Pwnage: Hacking HLR/HSS and MME CoreNetwork Elements](https://conference.hitb.org/hitbsecconf2013ams/materials/D1T2%20-%20Philippe%20Langlois%20-%20Hacking%20HLR%20HSS%20and%20MME%20Core%20Network%20Elements.pdf)
- [Modmobjam - Jam tomorrow, jam yesterday, but also jam today](https://www.synacktiv.com/ressources/sstic_rump_2018_modmobjam.pdf)
- [WiFi IMSI Catcher](https://www.blackhat.com/docs/eu-16/materials/eu-16-OHanlon-WiFi-IMSI-Catcher.pdf)
- [Analysis of the LTE Control Plane](https://syssec.kaist.ac.kr/pub/2019/kim_sp_2019.pdf)
- [Demystifying the Mobile Network by Chuck McAuley](http://2014.video.sector.ca/video/110383258)
- [NSA PLAYSET GSM](https://www.defcon.org/images/defcon-22/dc-22-presentations/Pierce-Loki/DEFCON-22-Pierce-Loki-NSA-PLAYSET-GSM.pdf)
- [VoLTE Phreaking - Ralph Moonen](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/HAXPO%20D1%20-%20VoLTE%20Phreaking%20-%20Ralph%20Moonen.pdf)
- [Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stack](https://www.usenix.org/system/files/conference/woot12/woot12-final24.pdf)
- [Hiding in Plain Signal:Physical Signal Overshadowing Attack on LTE](https://www.usenix.org/system/files/sec19-yang-hojoon.pdf)
- [LTE Security Disabled—Misconfiguration in Commercial Network](https://www.infsec.ruhr-uni-bochum.de/media/infsec/veroeffentlichungen/2019/04/23/wisec19-final123.pdf)
- [Shupeng-All-The-4G-Modules-Could-Be-Hacked](https://i.blackhat.com/USA-19/Wednesday/us-19-Shupeng-All-The-4G-Modules-Could-Be-Hacked.pdf)

## SIM Specific Attacks

- [Rooting SIM-cards](https://media.blackhat.com/us-13/us-13-Nohl-Rooting-SIM-cards-Slides.pdf)
- [The Most Expensive Lesson Of My Life: Details of SIM port hack](https://medium.com/coinmonks/the-most-expensive-lesson-of-my-life-details-of-sim-port-hack-35de11517124)

## Stingray's

- https://www.wired.com/story/dcs-stingray-dhs-surveillance/
- https://www.vice.com/en_us/article/gv5k3x/heres-how-much-a-stingray-cell-phone-surveillance-tool-costs
- https://www.nyclu.org/en/stingrays

## SS7/Telecom Specific

- [D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/D1T2%20-%20Bypassing%20GSMA%20Recommendations%20on%20SS7%20Networks%20-%20Kirill%20Puzankov.pdf)
- http://www.hackitoergosum.org/2010/HES2010-planglois-Attacking-SS7.pdf
- [Getting in the SS7 kingdom: hard technology and disturbingly easy hacks= to get entry points in the walled garden](http://www.hackitoergosum.org/2010/HES2010-planglois-Attacking-SS7.pdf)

## Github/Code Repo's

* https://github.com/Synacktiv-contrib/Modmobjam
* https://github.com/Synacktiv-contrib/Modmobmap

# Misc IMSI/Cellular Tools
* https://github.com/Evrytania/LTE-Cell-Scanner
* https://harrisonsand.com/imsi-catcher/
* https://github.com/Oros42/IMSI-catcher
* https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
* https://github.com/ptrkrysik/gr-gsm/wiki/Passive-IMSI-Catcher

## Resources
* [RTL-SDR](https://www.rtl-sdr.com/)
* [MCC-MNC Codes for Base Stations](http://www.mcc-mnc.com/)
* [RFSec-ToolKit](https://github.com/cn0xroot/RFSec-ToolKit)
* [FakeBTS](http://fakebts.com/category/attacks/)
* https://rmusser.net/docs/Wireless.html#cn

## Misc

- [Touching the Untouchables: Dynamic Security](https://syssec.kaist.ac.kr/pub/2019/kim_sp_2019.pdf)
- https://www.eff.org/pages/cell-site-simulatorsimsi-catchers
- http://leetupload.com/blagosphere/2014/03/28/analyze-and-crack-gsm-downlink-with-a-usrp/
- [AT&T Microcell FAIL - fail0verflow (Older blog article, but still a good read)](https://fail0verflow.com/blog/2012/microcell-fail/)