Not Sentenced To Prison Yet? Cracking Another GSM Capture File. But With A More Simplified Workflow!

2024/01/27 · 1080p
Recently, my first GSM cracking tutorial video went viral. But unfortunately, it was riddled with various errors and mistakes. In addition to this, it also relied on the very old GSM decoding software toolset Airprobe which is notoriously hard to compile and get running on newer editions of Linux. I managed to find a method of 2G cellular cracking that can utilize the much newer GSM decoding software suite called gr-gsm. This eliminates the need to run Airprobe in an older version of Linux and earlier release of GNU-Radio. Using the latest version of DragonOS FocalX, I show a potential workflow of how GSM communications are cracked in real-time from start to finish. This particular method using gr-gsm has been streamlined and simplified compared to the previous method using Airprobe. Dropping Airprobe from the requirements will no doubt make this method more accessible to most people who follow my channel that have an interest in cryptography and cellular decoding. I tried to make the fonts in the terminal window, wireshark and the text document as large a possible. But for a more immersive experience, please full-screen this video. The actual cracking tutorial segment begins at the 5 minute and 15 second mark. Thanks for reading and watching! LINKS: Cfile Download: https://github.com/ptrkrysik/gr-gsm/i... COMMANDS: sudo wireshark -k -Y '!icmp && gsmtap' -i lo grgsm_decode -c voicecall_f952.0M_s2e6.cfile -f 952.0M -s 2e6 -m SDCCH8 -t 1 -p -v ./find_kc 10749739382471168565x 48 1152173 1152140 111111010101111110100001101011111100000000111101011000011111101001100100111101100001100111000110011000010000000010