W00t3k

Awesome-Cellular-Hacking

Awesome-Cellular-Hacking
By W00t3k

hacking sdr lte gsm eviltwin lte-evil-twin gsm-network rogue-bts

Awesome-Cellular-Hacking

Please note multiple researchers published and compiled this work. This is a list of their research in the 3G/4G/5G Cellular security space. This information is intended to consolidate the community's knowledge. Thank you, I plan on frequently updating this "Awesome Cellular Hacking" curated list with the most up to date exploits, blogs, research, and papers.


The idea is to collect information like the BMW article below, that slowly gets cleared and wiped up from the Internet - making it less accessible, and harder to find. Feel free to email me any document or link to add.


Rogue BTS & CDMA/GSM Traffic Impersonation and Interception

Rogue Base Stations or Evil BTS's, 2G/3G/4G

OpenBTS software is a Linux application that uses a software-defined radio to present a standard 3GPP air interface to user devices, while simultaneously presenting those devices as SIP endpoints to the Internet


YateBTS is a software implementation of a GSM/GPRS radio access network based on Yate and is compatible with both 2.5G and 4G core networks comprised in our YateUCN unified core network server. Resiliency, customization and technology independence are the main attributes of YateBTS


BladRF and YateBTS Configuration


srsLTE is a free and open-source LTE software suite developed by SRS (www.softwareradiosystems.com)


Installing a USRP Device on Linux

sudo add-apt-repository ppa:ettusresearch/uhd
sudo apt-get update
sudo apt-get install libuhd-dev libuhd003 uhd-host
uhd_find_devices
cd /usr/lib/uhd/utils/
./uhd_images_downloader.py
sudo uhd_usrp_probe


```
sudo uhd_usrp_probe
[INFO] [UHD] linux; GNU C++ version 7.4.0; Boost_106501; UHD_3.14.1.1-release
[INFO] [B200] Detected Device: B*
[INFO] [B200] Operating over USB 3.
[INFO] [B200] Initialize CODEC control...
[INFO] [B200] Initialize Radio control...
[INFO] [B200] Performing register loopback test...
[INFO] [B200] Register loopback test passed
[INFO] [B200] Setting master clock rate selection to 'automatic'.
[INFO] [B200] Asking for clock rate 16.000000 MHz...
[INFO] [B200] Actually got clock rate 16.000000 MHz.

/
| Device: B-Series Device


```


Troubleshooting SDR's that are running BTS software

Common issues:
- Improper FW
- Lack of proper antennas
- Wrong cellular phone type
- Wrong SIM
- Not configured correctly - Mobile Country Codes (MCC) and Mobile Network Codes (MNC)
- Incorrect software BTS settings
- Virtualized platform is not fast enough
- Wrong SDR firmware


JAMMING SPECIFC ATTACKS

4.5 Radio Jamming Attacks
Jamming attacks are a method of interrupting access to cellular networks by exploiting the radio
frequency channel being used to transmit and receive information. Specifically, this attack occurs
by decreasing the signal to noise ratio by transmitting static and/or noise at high power levels
across a given frequency band. This classification of attack can be accomplished in a variety of
ways requiring a varying level of skill and access to specialized equipment. Jamming that targets
specific channels in the LTE spectrum and is timed specifically to avoid detection is often
referred to as smart jamming. Broadcasting noise on a large swath of RF frequencies is referred
to as dumb jamming.


4.5.1 Jamming UE Radio Interface
A low cost, high complexity attack has been proposed to prevent the transmission of UE
signaling to an eNodeB.


4.5.2 Jamming eNodeB Radio Interface
Base stations may have physical (e.g., fiber optic) or wireless (e.g., microwave) links to other
base stations. These links are often used to perform call handoff operations. As mentioned in
section 4.5.1, it may be possible to jam the wireless connections eNodeBs use to communicate
with each other. Although theoretical, the same type of smart jamming attacks that are used
against the UE could be modified to target communicating eNodeBs, which would prevent the
transmission of eNodeB to eNodeB RF communication.


Blackhat 2021 Talks

## Equipment used in "Over The Air Baseband Exploit: Gaining Remote Code Execution on 5G Smartphones"



Recent SeaGlass IMSI-Catcher News

CERT/Media Alerts

5G Cellular Attacks

4G/LTE Cellular Attacks

SIM Specific Attacks

Stingray's

SS7/Telecom Specific

Github/Code Repo's

Misc IMSI/Cellular Tools

Resources

Misc