The Long Awaited Osmocom-BB Tutorial (Part 1): GSM Security Research (Without The Expensive SDR!)

Опубликовано: 16 Ноябрь 2023
на канале: Rob VK8FOES
5,267
122

Regular viewers of my channel will know that I am a huge fan of the Osmocom-BB toolset. In this video, I thought I would throw together a tutorial on how exactly Osmocom-BB is used in the context of hobbyist GSM security research.

In part one today, I list all the hardware and software requirements to work with this software suite. Then, I proceed showcase how Osmocom-BB can be utilized to scan for GSM base transceiver stations (cell towers) in the local area. Next, I show my viewers how the control channel of a 2G cell tower can be decoded and the data viewed in Wireshark. Finally, I demonstrate the usage of the 'mobile' application, which allows telephone calls to be initiated and SMS messages to be send from the command line interface.

Part two of this video series will cover the usage of the GSM-sniffing variant of Osmocom-BB, called 'burst_ind'. Stay tuned for that in the coming days. In the meantime, go and checkout my other videos on the subject in this playlist:    • Osmocom-BB  

This video (and channel) wouldn't be possible without the amazing Linux distribution, DragonOS FocalX. Friend of the channel, Aaron from the ‪@cemaxecuter7783‬ YouTube channel works far too hard to provide this incredible Linux distro for us, free of charge. So please, go and subscribe to his channel, like his videos and follow him on Twitter/X!

Thanks for reading and watching!


HARDWARE:

Core i5 4th Gen PC
Motorola C117 Mobile Phone
Sysmocom Serial Cable


SOFTWARE:

DragonOS FocalX R31
Osmocom-BB
Wireshark
TShark (Optional)


COMMANDS:

Check if your serial cable is detected by Linux:

sudo dmesg | grep tty


Upload firmware to calypso phone:

sudo /usr/src/Osmocom-BB/Bin/osmocon -s /tmp/osmocom_l2 -m c123xor -p /dev/ttyUSB0 -c /usr/src/Osmocom-BB/Firmware/e88/layer1.highram.bin


Initiate 'cell_log' application:

sudo /usr/src/Osmocom-BB/Bin/cell_log -i 127.0.0.1 -s /tmp/osmocom_l2 -l cell_log.txt


'Tail' command to view GSM base station scan:

sudo /usr/src/Osmocom-BB/Bin/cell_log -i 127.0.0.1 -s /tmp/osmocom_l2 -l cell_log.txt


Initiate 'ccch_scan' application:

sudo /usr/src/Osmocom-BB/Bin/ccch_scan -i 127.0.0.1 -s /tmp/osmocom_l2 -a 975


Launch 'wireshark':

sudo wireshark -k -Y '!icmp && gsmtap' -i lo


Launch 'tshark':

sudo tshark -Y '!icmp && gsmtap' -i lo


Initiate 'mobile' application:

sudo /usr/src/Osmocom-BB/Bin/mobile -i 127.0.0.1 -c /usr/src/Osmocom-BB/Config/mobile.cfg


Login to telnet interface:

telnet 127.0.0.1 4247


Enable calypso phone radio hardware for 'mobile' application:

en
conf t
ms 1
no shut
write
exit
exit


'Mobile' application telnet commands:

list
show ms 1
show sub 1
show cell 1
sms 1 0062942 Hello, from Osmocom-BB!
call 1 0062942
call 1 hangup
call 1 answer
sim remove 1
sim reader 1


A (VERY STRONG) DISCLAIMER:
THIS VIDEO WAS MADE FOR THE PURPOSES OF EDUCATION AND EXPERIMENTATION ONLY. IMSI-CATCHING, SMS-SNIFFING AND VOICE CALL INTERCEPTION ON CELLULAR NETWORKS IS ILLEGAL AND PUNISHABLE BY HEFTY FINES AND IMPRISONMENT!