All the encryption keys and details {Firmware Signing & two-way
commutation via the network port to AT&T} are stored on the SIM card
inside the system which can not be changed.
All I'll say is play around with the very "AT&T Custom" web interface......
On 14 March 2011 02:43, Joel Esler <[email protected]> wrote:
> I have one, I haven't played with it yet, as I actually USE the thing.
>
> I know the data is all UDP (duh), as I have monitored some of it going out.
> I haven't had the time to dig into one yet, maybe I will now that you have
> peaked my interest.
>
>
> On Mar 9, 2011, at 2:09 PM, Kameron Gasso wrote:
>
>> Anyone had the chance to play with the AT&T 3G MicroCell devices yet?
>>
>> http://www.att.com/3gmicrocell
>>
>> I really would love to see what kind of encryption is being used on the back
>> end (ethernet side) for the voice/3G data transfer, and to see if there's a
>> JTAG port on the board (or if the EPROM could be popped and re-flashed).
>>
>> If there is a way into these devices, I'd be curious if one could hack them
>> to change the IMEI access list (handsets allowed to connect) and the mobile
>> network code (carrier ID) that it broadcasts. :D
>>
>> Cheers,
>> --
>> Kameron Gasso | [email protected]
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
> --
> Joel Esler
> http://www.joelesler.net
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
--
BaconZombie
….all text in this mail is double-rot13 encrypted. ...
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com