Thursday, February 17, 2011

Breaker application is ready to supply GSM


A researcher security ready to demonstrate how to break into and tapping phone calls nearby. Two software supporting the action that was ready to publish.

If the application is needed that has spread, tapping telephone calls will be ranahnya alias the script kiddies can be done by anyone who wanted to, simply by downloading software available on the internet.

"GSM Hacking has entered the stage of script kiddie, just like Wi-Fi Hacking few years ago when people everywhere is easy to break into the neighbor's Wi-Fi," said Karsten Nohl, a cryptography and security researchers at Security Research Labs.

According to Nohl, with the spread of software that, it hoped the industry will switch to a more secure encryption. "Just as Wi-Fi, when they switch to WPA encryption. Hopefully it will also occur in GSM," he said.


What software is used? Here are two of them:
Kraken, this software will be circulated at the Black Hat Security Conference in Las Vegas. Usefulness of this tool is to take the secret key in an SMS message encryption and voice conversation in less than 30 seconds. Developer is none other than Frank A. Stevenson, known as breaker CSS encryption on DVDs.
AirProbe, the latest version of this software will also be distributed at the same event. AirProbe is able to record a digital signal that 'passing' between the tower base stations with mobile phones. Combined with the GNU Radio, AirProbe can retrieve data in real time and store only the packages required for wiretapping.
In addition, security and computer forensics investigators TheGrugq have explained the existence of weaknesses in the GSM system. And certain weaknesses can be exploited even with the use of hand held devices only.
Through the attack named Rachel, the perpetrator could plied BTSs with RAC Request to 'collapse' (not functioning). Another technique, called IMSI detach, can prevent a specific phone to receive SMS and voice calls over the mobile phone number was known. quoted from "detikinet"

No comments:

Post a Comment