Project

General

Profile

CatcherCatcher » History » Version 3

Linus, 12/23/2013 05:28 PM

1 1 Linus
h1. CatcherCatcher
2
3
The CatcherCatcher tool detects mobile network irregularities hinting at fake base station activity.
4
5
h3. Requirements
6
7
* Osmocom phone
8
* Osmocom cable
9
* Linux computer
10
11
h3. Download:
12
13 3 Linus
* Source Code is available in the OSMOCOM repository
14
<pre>git clone git://git.osmocom.org/osmocom-bb.git
15
git checkout luca/catcher</pre>
16 2 Linus
* "Live System":https://opensource.srlabs.de/projects/mobile-network-assessment-tools/wiki/GSMmap-live
17 1 Linus
18
h3. Instructions
19
20
# Download TODO
21
# unpack TODO
22
# run: TODO call
23
* TODO command line parameters
24
25
h3. Mailing list
26
27
A public mailing list discussion is "here":https://lists.srlabs.de/cgi-bin/mailman/listinfo/catchercatcher
28
29
30
h1. OsmocomBB software
31
32
Currently, the IMSI Catcher detector is available only for the OsmocomBB platform.
33
If you'd like to test it, you can find all the needed information in our [[Tutorial]]
34
Please upload improvements as patches to this site or post to the "mailing list":http://lists.srlabs.de/cgi-bin/mailman/listinfo/catchercatcher until a Git is set up.
35
36
h1. Implementation on other platforms
37
38
While Osmocom provides access to most detailed GSM data, other platforms could, too, provide useful information for detecting IMSI catcher attacks.
39
40
Folks with insights into phone programming APIs, please help fill out this list:
41
42
|                           |\4.*Available on*                      |
43
| *Evidence*                | Blackberry  | [[Android]] | iOS | Symbian |
44
| Cipher indication         | |[1] *#32489# // OEM_SM_TYPE_SUB_CIPHERING_PROTECTION_ENTER | | |
45
| LAC                       | |[1a] getLac() | | |
46
| Cell ID                   | |[1a] getCid() | | |
47
| Retransmission counters   | | | | |
48
| TMSI                      | | | | |
49
| Send power                | |[1] LISTEN_SIGNAL_STRENGTHS ? | | |
50
| Silent call               | |[1]| | |
51
| Silent SMS                | |[1]|[2]| |
52
| Remote install            | |[1c] // INSTALL_ASSET| | |
53
| Network Roaming           | |[1b] getRoaming()| | |
54
|                 | | | | |
55
56
[1] TODO: Reference / API call needed
57
[1a]: android.telephony.gsm.GsmCellLocation
58
[1b]: android.telephony.ServiceState
59
[1c]: GTalkService
60
61
[2] TODO: Reference / API call needed
62
63
Preliminary information for developing an Android based Catcher can be found on the [[Android]] page. 
64
65
h1. IMSI catcher detection
66
67
68
For IMSI catchers to achieve their goals they will need to show behavior different from normal base stations. We distinguish between yellow, red, and black flags. Yellow flag are an indication that you might have been caught; red flags are a very strong indication; and black flags tell you: "You are being tracked down; throw away your phone and run."
69
70
| #   | *Flag* | *Evidence* | *Implementable in Osmocom* |
71
| Setup: |
72
| S1  | R | No encryption after using encryption with the same operator before | done |
73
| S2  | Y | Cipher mode complete message is sent more than twice               | wip  |
74
| S3  | R | … more than four times                                             | wip  |
75
| S4  | Y | IMEI not requested in Cipher Mode Complete message                 | done |
76
| S5  | Y | Cell is not advertising any neighbor cells                         | todo |
77
| S6  | Y | Cell reselection offset > 80db                                     | todo |
78
| Location updating (for information gathering, MITM): |
79
| L1  | Y | The LAC of a base station changes                                  | done |
80
| L2  | R | The LAC changes more than once                                     | done |
81
| L3  | Y | The LAC differs from all neighboring cells                         | wip  |
82
| L4  | Y | The network queries the phones IMEI during location update         | done |
83
| L5  | Y | The registration timer is set to a value < 10 minutes              | wip  |
84
| L6  | Y | The "IMSI attach procedure" flag is set                            | wip  |
85
| (when locating a victim): |
86
| L7  | Y | Receive a silent text message                                      | done |
87
| L8  | R | You are paged, but do not enter any transaction                    | done |
88
| L9  | R | Being assigned a traffic channel but not entering call control state/receiving a text message for 2 seconds | wip |
89
| L10 | B | ... 10 seconds                                                     | wip  |
90
| L11 | Y | You do not receive a call setup message while already being on a traffic channel for 2 seconds | done |
91
| L12 | R | ... 10 seconds                                                     | done |
92
| L13 | Y | Your phone sends at the highest possible power                     | wip  |