In most cases, this is accomplished by having the StingRay broadcast a pilot signal that is either stronger than, or made to appear stronger than, the pilot signals being broadcast by legitimate cell sites operating in the area. In active mode, the StingRay will force each compatible cellular device in a given area to disconnect from its service provider cell site (e.g., operated by Verizon, AT&T, etc.) and establish a new connection with the StingRay. conducting base station surveys, which is the process of using over-the-air signals to identify legitimate cell sites and precisely map their coverage areasĪctive (cell site simulator) capabilities.Radio jamming for either general denial of service purposes or to aid in active mode protocol rollback attacks. Using received signal strength indicators to spatially locate the cellular device.Interception of communications data or metadata.Forcing a downgrade to an older and less secure communications protocol if the older protocol is allowed by the target device, by making the Stingray pretend to be unable to communicate on an up-to-date protocol.Forcing an abundance of radio signals to be transmitted.Forcing an increase in signal transmission power.Writing cellular protocol metadata to internal storage.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |