A method and device for attacking fake base stations
A pseudo base station and base station technology, applied in the field of attacking pseudo base stations, can solve problems such as limited effect, difficulty in capturing, and inability to handle multiple pseudo base stations, achieving the effects of low performance requirements and simple attack process.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] In this embodiment, the implementation process of the method of attacking the fake base station is as follows figure 1 shown, including the following steps:
[0051] Step 101, the wireless terminal obtains the parameters of the base station to which it belongs;
[0052] Specifically, the pseudo base station usually sets the same MCC and MNC as the operator's network. At the same time, by modifying the LAC, the wireless terminal within the coverage area initiates a location update process, and induces the wireless terminal to access the pseudo base station by broadcasting relevant parameters. .
[0053] Here, the wireless terminal discovers broadcast system information in each frequency band, and acquires parameters of the system information.
[0054] Wherein, the system information includes: MNC, CRO, LAC, MCC, CRH and so on.
[0055] Step 102, sending information whose value is a boundary value to the base station;
[0056] Here, it is not necessary to judge the au...
Embodiment 2
[0062] In this embodiment, considering that the wireless terminal needs to actively eliminate the surrounding fake base stations, it can actively scan all the surrounding base stations to determine the authenticity of each base station; Communication content monitoring; according to whether it is monitored, it is determined whether to continue to send the content that triggers the exception or to disconnect.
[0063] The implementation process of the method for attacking the fake base station in this embodiment is as follows: image 3 shown, including the following steps:
[0064] Step 301, the wireless terminal scans a predetermined frequency band and discovers more than one base station.
[0065] Specifically, the wireless terminal scans the surrounding GSM frequency band information through wireless frequency scanning, and all base stations covering the wireless terminal can be obtained through frequency scanning.
[0066] Step 302, the wireless terminal obtains the param...
Embodiment 3
[0087] This embodiment is a device for attacking a fake base station, and the structural diagram of the device is as follows Figure 4As shown, the device for attacking a fake base station includes: an acquisition module 41 and a sending module 42; wherein,
[0088] The acquiring module 41 is configured to acquire parameters of the base station to which it belongs;
[0089] Specifically, the pseudo base station usually sets the same MCC and MNC as the operator's network. At the same time, by modifying the LAC, the wireless terminal within the coverage area initiates a location update process, and induces the wireless terminal to access the pseudo base station by broadcasting relevant parameters. .
[0090] Here, the acquiring module 41 finds broadcast system information of each frequency band, and acquires parameters of the system information.
[0091] Wherein, the system information includes: MNC, CRO, LAC, MCC, CRH and so on.
[0092] The sending module 42 is configured t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


