Dear Karsten, thanks for your reply.
Could you post us the basic steps on console to decrypt calls using OsmocomBB and Kraken? I have already installed OsmocomBB and Kraken with your rainbow table. In the next days I will flash a cheap Motorola C123 with OsmocomBB's firmware to use it for gsm sniffing. Thanks and best regards, Philipp. Von meinem iPhone gesendet Am 10.08.2013 um 22:55 schrieb Karsten Nohl <n...@virginia.edu>: > Dear Philipp, > > The tool of choice is OsmocomBB's burst_ind branch. It captures call data, > incl. hopping calls, and can be combined with Kraken for decoding. However, a > how-to for merging the two is not available. > > Cheers, > > -Karsten > > On Aug 10, 2013, at 19:30 , Philipp Hoffmann <phoffman...@icloud.com> wrote: > >> Hi list, >> >> I have followed Srlab's Airprobe How-To page. Question: Is it possible to >> capture a *.cfile also with a Motorola C123, instead of a URSP box? Our aim >> is in decrypt our own calls. >> >> Thanks. >> >> Best regards, >> Philipp. >> _______________________________________________ >> A51 mailing list >> A51@lists.srlabs.de >> http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51 > > _______________________________________________ > A51 mailing list > A51@lists.srlabs.de > http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51 _______________________________________________ A51 mailing list A51@lists.srlabs.de http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51