The fifth technology cellular communications protocol (5G) is maybe essentially the most difficult wi-fi protocol ever made. That includes wildly quick obtain speeds, beam forming base stations, and naturally non-standard additions, it’s quite daunting prospect to investigate for the house hacker and researcher alike. However this didn’t cease the ASSET Analysis Group from creating a 5G sniffer and downlink injector.
The crux of the undertaking is concentrated round real-time sniffing utilizing considered one of two Common Software program Radio Peripheral (USRP) software-defined radios (SDRs), and a considerable amount of compute energy. This sniffed information may even be piped into Wireshark for filtering. The frequency is hard-coded into the sniffer for improved efficiency with the n78 and n41 bands having been examined as of writing. Whereas we count on most of you don’t have the supported USRP {hardware}, they offered a pattern seize file for anybody to investigate.
The opposite primary characteristic of the undertaking is an exploitation framework with quite a few assault vectors developed by ASSET and others. By turning an SDR right into a malicious 5G base station, quite a few vulnerabilities and “options” may be exploited to with outcomes starting from downgrading the connection to 4G, fingerprinting and way more. It even consists of an assault technique we preciously lined known as 5Ghull which might trigger machine failure requiring elimination of the SIM Card. These vulnerabilities supply a singular look contained in the interior workings of 5G.
Should you too are desirous about 5G sniffing however don’t have entry to the {hardware} wanted, take a look at this hack turning a Qualcomm cellphone right into a 5G sniffer!