Project

General

Profile

Mobile Network Assessment Tools » History » Revision 15

Revision 14 (Karsten, 12/23/2013 05:15 PM) → Revision 15/32 (Linus, 12/23/2013 05:18 PM)

h2. Overview 

 This is a collection of tools for the assessment of mobile network security. 
 It includes: 

 * *[[GSMmap-apk]]* 
 Android application that collects 2G and 3G network traces from Samsung Galaxy phones 

 * *[[xgoldscanner]]* 
 Linux application that collects 2G and 3G network traces from Samsung Galaxy phones 

 * *[[CatcherCatcher]]* 
 Collect evidence of 2G fake base station activity (requires Osmocom phone) 


 The tools are included in the *[[GSMmap-live]]* system, which auto-submits data for analysis at "GSMmap.org":https://GSMmap.org 
 Also on the live system lives: 

 * "*SIMtester*":https://opensource.srlabs.de/projects/simtester/wiki 
 Finds configuration bugs in SIM cards 

 A public mailing list for discussions and occasional announcements is found "here":https://lists.srlabs.de/cgi-bin/mailman/listinfo/gsmmap 

 ***** 


 

 h1. xgoldscanner 

 This script collects 2G and 3G traces using Samsung Android phones. 
 The trace log files can be analyzed with Tobias Engel's "xgoldmon":https://github.com/2b-as/xgoldmon tool, which heavily inspired the development of xgoldscanner. 

 h3. Requirements 

 * Samsung Galaxy S2 / S3    phone 
 * Micro-USB cable 
 * Linux computer 

 h3. Download 

 TODO: 

 * Source Code (bash) 
 * Live System 

 h3. Disclaimer 

 The tests include an active part. First, your phone will place outgoing calls to a dedicated number. This number will always be busy and never answer in order to rule out voice charges as best as we can. 

 Second, your phone will send SMS short messages via an invalid SMS-C to an invalid number. 

 During our tests (in Europe) we have not encounter any network that would charge for these transactions. However, we can not rule out that you may be charged in specific settings. 

 To control for involuntary charges, we strongly advise the use of a dedicated pre-paid SIM card for these tests. 

 h3. Instructions 

 # Download TODO 
 # unpack TODO 
 # run:    <pre>sudo ./xgoldscanner.sh -n [telephone number, e.g. +491234567]</pre> 
 Optional parameters: 
 *    -g    conduct GPRS test 
 *    -d    display debug messages 
 *    -o    offline mode [skip log upload for manual submission] 
 *    -3    conduct 3G tests only [skip 2G tests] 
 *    -y    assume "yes" to questions and confirmation dialogues [for automated testing] 
 *    -i    <n> repeat each test <n> times (default is 5) 

 h3. Advanced usage 

 Use Tobias Engel's "xgoldmon":https://github.com/2b-as/xgoldmon tool to analyze the trace log files. 

 h3. Mailing list 

 A public mailing list for discussions is found "here":https://lists.srlabs.de/cgi-bin/mailman/listinfo/gsmmap 

 ***** 

 h2. CatcherCatcher 

 The CatcherCatcher tool detects mobile network irregularities hinting at fake base station activity. 

 h3. Requirements 

 * Osmocom phone 
 * Osmocom cable 
 * Linux computer 

 h3. Download: 

 * Source Code TODO 
 * Live System TODO 

 h3. Instructions 

 # Download TODO 
 # unpack TODO 
 # run: TODO call 
 * TODO command line parameters 

 h3. Mailing list 

 A public mailing list discussion is "here":https://lists.srlabs.de/cgi-bin/mailman/listinfo/catchercatcher 

 ***** 

 h2. GSMmap-apk 

 Actively collect 2G and 3G traces using Samsung Android phones. 

 h3. Requirements: 

 * Samsung Galaxy S2 / S3 phone 

 h3. Download: 

 * Pre-compiled .apk TODO 
 * Source Code TODO 

 h3. Disclaimer 

 The tests include an active part. First, your phone will place outgoing calls to a dedicated number. This number will always be busy and never answer in order to rule out voice charges as best as we can. 

 Second, your phone will send SMS short messages via an invalid SMS-C to an invalid number. 

 During our tests (in Europe) we have not encounter any network that would charge for these transactions. However, we can not rule out that you may be charged in specific settings. 

 To control for involuntary charges, we strongly advise the use of a dedicated pre-paid SIM card for these tests. 

 h3. Instructions 

 # Install application from Google Play app store TODO 
 # Run 

 h3. Mailing list 

 A public mailing list for discussions is "here":https://lists.srlabs.de/cgi-bin/mailman/listinfo/gsmmap 

 ***** 

 h2. GSMmap-live 

 This live Linux system is equipped with all the assessment tools listed above. It furthermore includes TODO 
 The live system facilitates their use and automatically uploads logs to GSMmap.org. 

 h3. Requirements 

 * Computer capable of running 64bit Linus 
 * For each test: Requirements listed in the respective tool wiki pages 

 h3. Download 

 * Live system image TODO 


 h3. Disclaimer 

 The tests include an active part. First, your phone will place outgoing calls to a dedicated number. This number will always be busy and never answer in order to rule out voice charges as best as we can. 

 Second, your phone will send SMS short messages via an invalid SMS-C to an invalid number. 

 During our tests (in Europe) we have not encounter any network that would charge for these transactions. However, we can not rule out that you may be charged in specific settings. 

 To control for involuntary charges, we strongly advise the use of a dedicated pre-paid SIM card for these tests. 

 h3. Instructions 

 # Download TODO 
 # Unpack: <pre>tar xvzf gsmmap-live.img.tar.gz</pre> 
 # Write to stick <pre>dd if=gsmmap-live.img of=/dev/[USB-stick] [bs=1M]</pre> 
 # Boot from stick 

 h3. Mailing list 

 A public mailing list for discussions is "here":https://lists.srlabs.de/cgi-bin/mailman/listinfo/gsmmap 

 Please file bugs and support requests through the "issue tracker":https://opensource.srlabs.de/projects/mobile-network-assessment-tools/issues/new as they may be of little relevance to the majority of the mailing list subscribers.