Jump to content
Wubi

DECT Sniffing Dedected

Recommended Posts

Posted

This article was contributed by 5M7X.

BIG FAT HAIRY WARNING: IT IS ILLEGAL TO RECORD PHONE CONVERSATIONS IN MANY COUNTRIES.

For a list of state privacy laws in the US, check State Privacy LawsState Privacy Laws and http://fjallfoss.fcc.gov/edocs_public/attachmatch/DOC-266204A1.pdf.

Contents

1 What is DECT?
1.1 The problem?
1.2 Tested on
2 Installing dedected
2.1 Install from repository
2.2 Install from source
3 Install some additional tools
4 Load the drivers
5 Scan for fixed parts a.k.a. fp (DECT base stations)
6 Ignore phones you don’t want to sniff (e.g. your neighbours!)
7 Record the phone call
8 Decode the call out of the datastream
9 Import the streams into audacity and listen to the calls
10 Clean up / Reload
11 DECT protocol
12 Video: Sniffing DECT phones with BackTrack 5

What is DECT?


Digital Enhanced Cordless Telecommunications - Wikipedia, the free encyclopedia

The problem?

Most vendors don’t implement encryption in their devices so one can sniff it with certain hardware and software.

For a previous post on the topic, check: http://www.offensive-security.com/backtrack/sniffing-dect-phones-the-details/

Tested on

  • BackTrack 5 final x86 KDE with kernel 2.6.38
  • Original Dosch&Amand Type II PCMCIA Card
  • SIEMENS C1 DECT Phones set up in repeater mode

NOTE: This is experimental software which is not very actively supported anymore!

Installing dedected


In order to get dedected installed on BackTrack, you have the choice between:

  1. Use dedected from the BackTrack 5 repositories.
  2. Compile it on your own if you want to experiment.

Install from repository

root@bt:~# [COLOR="#FF0000"]apt-get update[/COLOR]
root@bt:~# [COLOR="#FF0000"]apt-get install dedected[/COLOR]

Install from source

This stage is optional for those wanting to build the tools from source code.

root@bt:~# [COLOR="#FF0000"]prepare-kernel-sources[/COLOR]
root@bt:~# [COLOR="#FF0000"]cd /usr/src/linux[/COLOR]
root@bt:~# [COLOR="#FF0000"]cp -rf include/generated/* include/linux/[/COLOR]
root@bt:~# [COLOR="#FF0000"]cd /pentest/telephony[/COLOR]
root@bt:~# [COLOR="#FF0000"]svn co https://dedected.org/svn/trunk dedected_svn[/COLOR]
root@bt:~# [COLOR="#FF0000"]cd dedected_svn/com-on-air_cs-linux/[/COLOR]
root@bt:~# [COLOR="#FF0000"]make && make -C tools[/COLOR]

Install some additional tools

root@bt:~# [COLOR="#FF0000"]apt-get -y install audacity[/COLOR]

Load the drivers

root@bt:~# [COLOR="#FF0000"]cd /pentest/telephony/dedected/com-on-air_cs-linux[/COLOR]
root@bt:~# [COLOR="#FF0000"]make node[/COLOR]

If you did not insert your Dosch&Amand Type 2 or Type 3 or Voo:doo # PCMCIA-card do so now! Next, we load the driver:

root@bt:~# [COLOR="#FF0000"]make load[/COLOR]

Scan for fixed parts a.k.a. fp (DECT base stations)

root@bt:~# [COLOR="#FF0000"]cd /pentest/telephony/dedected/com-on-air_cs-linux/tools[/COLOR]
root@bt:~# .[COLOR="#FF0000"]/dect_cli[/COLOR]

If you need info on the usage type "help". If you live in the U.S. switch to the US/DECT 6 band via the "band" command. Let's enable someverbosity:

[COLOR="#008080"]verb[/COLOR]

And start scanning for base stations:

[COLOR="#008080"]fpscan[/COLOR]

After scanning 2-3 times through all channels disable verbosity, and stop scanning:

[COLOR="#008080"]verb
stop[/COLOR]

DECT-BT5-Image02.png

Ignore phones you don’t want to sniff (e.g. your neighbours!)


Start a callscan

[COLOR="#008080"]callscan[/COLOR]

Now grab your DECT handset and make a test phonecall and wait until you see the phonecall .It is also sufficient if you just get a dialing tone. You should see something like

### found new call on 00 82 31 33 73 on channel 7 RSSI 34

[COLOR="#008080"]stop[/COLOR]

Name your basestation if you want:

[COLOR="#008080"]name 00 82 31 33 73 stallowned[/COLOR]

Dump all found phones:

[COLOR="#008080"]dump[/COLOR]

Ignore every other phone except yours via the following command! IMPORTANT!!!

[COLOR="#008080"]ignore 01 30 95 13 37[/COLOR]

Record the phone call


Start automaticially recording of every phone call it detects:

[COLOR="#008080"]autorec[/COLOR]

Now grab your DECT telephony handset and do a testcall. I recommend to call a “time telling serivce” that can be reached over a normal phone number. You should get something like this:

### starting autorec
### stopping DIP
### starting callscan
### trying to sync on 00 82 ab b0 29
### got sync
### dumping to dump_2011-06-11_21_37_37_RFPI_00_82_ab_b0_29.pcap
### stopping DIP

After you hung up your phonecall the dumping should stop:

DECT-BT5-Image04.png

Decode the call out of the datastream


Stop the autorec:

[COLOR="#008080"]stop[/COLOR]

Decode the audiostream out of the raw dump

root@bt:~# [COLOR="#FF0000"]./decode.sh[/COLOR]

DECT-BT5-Image01.png

Import the streams into audacity and listen to the calls


Start audacity via "alt + f2" then type “audacity” and press enter. Import the fixed-part and hte portable-part .wav files from /pentest/telephony/dedected/com-on-air_cs-linux/tools via File -> Import -> Audio or simply "ctrl + shift + I" . Import the files which end in .pcap_fp.ima.g721.wav and .pcap_pp.ima.g721.wav.

Play your phone call with the play button:

DECT-BT5-Image00.png

Hint: if you can only hear noise your phone seems to use some encoding/encryption. You can enable the repeater mode in your telephone so it disables encryption and you can test if your setup is working properly.

Clean up / Reload


If you need to reload the drivers

root@bt:~# [COLOR="#FF0000"]cd /pentest/telephony/dedected/com-on-air_cs-linux[/COLOR]
root@bt:~# [COLOR="#FF0000"]make reload[/COLOR]

If you’re finished and want to clean up:

root@bt:~# [COLOR="#FF0000"]cd /pentest/telephony/dedected/com-on-air_cs-linux[/COLOR]
root@bt:~# [COLOR="#FF0000"]make unload[/COLOR]
root@bt:~# [COLOR="#FF0000"]rm /dev/coa[/COLOR]

DECT protocol


If you are interested in more details of the protocol you can open the .pcap file in Wireshark:

DECT-BT5-Image03.png

Video: Sniffing DECT phones with BackTrack 5


http://player.vimeo.com/video/25027253

Sursa: http://www.backtrack-linux.org/wiki/index.php/DECT_Sniffing_Dedected

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...