欢迎光临 AirProbe 社区AirProbe 是前 GSM-Sniffer 项目的新家。其目标是构建一个 GSM(或许以后还有 3G)的空中接口分析工具。其源动力是学习技术细节,帮助那些开发开源 GSM 技术(诸如 OpenBTS、OpenMoko、及 BS11/OpenBSC 等等)的人们并展示现行标准的不安全性。 本维客涵盖有关该项目的一般资讯。源代码位于 git , 籍借下面命令便可获得: $ git clone git://svn.berlin.ccc.de/airprobe 项目的邮件列表:MailingLists
Take a look at the Roadmap for current Milestones that need your contribution. Feel free to generate tickets for these Milestones and work on them. 构架 - StructureAirProbe is divided into three main subprojects: Acquisition, Demodulation and Analysis. Acquisition The Acquisition module is hardware dependent and contains everything that has to do with receiving and digitizing the air interface. This is the part that needs to be rewritten for different receiver hardware, so it should be kept small and limited to the necessary functions. Most parts should be inherited from GNURadio, to keep workload limited. DeModulation The Demodulation module contains all necessary code to make bits out of the signal captured by Acquisition. It is in principle hardware independent, but should be open to use DSPs is desired. Analysis This module contains all the protocol parsing and decoding. Wireshark can be used to handle parts of the visualisation and UI tasks. An important part of the Analysis module is non-realtime A5 DeCryption based on a generic fast CPU. Realtime or near-realtime A5 dercyption is not a goal of the project. For purposes of protocol analysis and demonstration of insecurities, non-realtime decryption is sufficient. 正在建设的项目 - Work in Progress
资讯页 - Info pages
注:AirProbe WikiStart(原文出处,翻译整理仅供参考!) |