Read Me
About Airean
============
Airean is a proof-of-concept application showing that eavesdropping of GSM
traffic (voice calls, mobile locations, SMS messages) is possible using a
standard desktop PC with a small investment in hardware.
However, intercepting other peoples' communications is unethical, and may
also be illegal in your country. It is released with the sole hope that it
will lead to an accelerated adoption of A5/3 for GSM networks.
Air interface
=============
Airean requires hardware to capture signals from the air. The following
devices are supported:
Ettus Research USRP: Airean has been tested with the USRP1 and a DBSRX2
daughterboard. It should work with other configurations, but may require
changes to the resampling filters for devices not using a 64 MHz clock
source.
Great Scott Gadgets HackRF: Support for this device is planned. It will be
implemented when the devices start shipping, estimated Feb-Mar 2014.
Session key cracking
====================
Airean can be used stand-alone to decode the broadcast channels of a GSM
base station or for connections for which the session key is known. To
crack the session key of a connection, Airean interfaces with external
programs. The following are supported:
Skraken: Skraken implements a time-memory trade-off attack utilizing pre-
computed rainbow tables of ~1.7 TB. The interface is over a TCP connection.
Compiling
=========
Compiling Airean has the following dependencies:
uhd: USRP driver, www.ettus.com
boost >= 1.46
libqt >= 4.8
cmake
libqwt >= 6.0
libfftw3 >= 3.3
libconfig++8 >= 1.3
libcap >= 2.22
The build system uses cmake. Compile with:
$ mkdir build
$ cd build
$ cmake ..
$ make
Then run the program with ./airean
Usage
=====
For usage instructions, see the project's Sourceforge wiki page at
https://sourceforge.net/p/airean/
Authors
=======
Airean was written by Anton Blad, PhD in Electrical Engineering. Feedback and
contributions are welcome.
Email: trolltok@gmail.com