Dear Philipp, We are not publishing attack tutorials. The line we are walking -- between warning about possible abuse and enabling it -- is already very fine.
Cheers, -Karsten On Aug 11, 2013, at 13:21 , Philipp Hoffmann <phoffman...@icloud.com> wrote: > Dear Karsten, > > thanks for your reply. > > Could you post us the basic steps on console to decrypt calls using OsmocomBB > and Kraken? > > I have already installed OsmocomBB and Kraken with your rainbow table. > > In the next days I will flash a cheap Motorola C123 with OsmocomBB's firmware > to use it for gsm sniffing. > > Thanks and best regards, > Philipp. > > Von meinem iPhone gesendet > > Am 10.08.2013 um 22:55 schrieb Karsten Nohl <n...@virginia.edu>: > >> Dear Philipp, >> >> The tool of choice is OsmocomBB's burst_ind branch. It captures call data, >> incl. hopping calls, and can be combined with Kraken for decoding. However, >> a how-to for merging the two is not available. >> >> Cheers, >> >> -Karsten >> >> On Aug 10, 2013, at 19:30 , Philipp Hoffmann <phoffman...@icloud.com> wrote: >> >>> Hi list, >>> >>> I have followed Srlab's Airprobe How-To page. Question: Is it possible to >>> capture a *.cfile also with a Motorola C123, instead of a URSP box? Our aim >>> is in decrypt our own calls. >>> >>> Thanks. >>> >>> Best regards, >>> Philipp. >>> _______________________________________________ >>> A51 mailing list >>> A51@lists.srlabs.de >>> http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51 >> >> _______________________________________________ >> A51 mailing list >> A51@lists.srlabs.de >> http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51 _______________________________________________ A51 mailing list A51@lists.srlabs.de http://lists.srlabs.de/cgi-bin/mailman/listinfo/a51