Hello everyone,

I'm trying to go through the example of GSM voice decryption 
posted by Dieter Spaar at
http://lists.lists.reflextor.com/pipermail/a51/2010-July/000803.html
with the same example capture file provided by reflextor.com
http://reflextor.com/vf_call6_a725_d174_g5_Kc1EF00BAB3BAC7002.cfile.gz

All steps go fine, I hear the voice - given that Kc is provided.
With Kraken, I'm trying to crack all encrypted bursts, starting
from frame 862344, and down to 862570. But Kraken does not find
any key on any of these bursts.

I think my Kraken setup is working, at least it successfully cracks
the other example burst from Frank given here:
http://lists.lists.reflextor.com/pipermail/a51/2010-July/000688.html
I have 39 tables.

Is the capture vf_call6... so unfortunate that none of its TS1
encrypted bursts - about 30 of them - can be cracked?

Thanks in advance,

Dave
_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to