Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CAN this tools Spoof newer gps receivers? #378

Open
nxydyxsj123456 opened this issue Jul 3, 2023 · 8 comments
Open

CAN this tools Spoof newer gps receivers? #378

nxydyxsj123456 opened this issue Jul 3, 2023 · 8 comments

Comments

@nxydyxsj123456
Copy link

I use hackrf, I use TCXO, I can successfully spoof old android phones, but I can't spoof 2019 samsung s10+, is it a setting problem or is this tool not able to spoof newer gps receivers

@Imtiaz08
Copy link

Imtiaz08 commented Jul 5, 2023

It looks like the latest smartphone devices aren't solely relying on GNSS receiver for the calculation of position. There are multiple aiding sensors such as network location, built-in IMU, even Google smartphones such as Pixel use GLP services which creates a cache of the user position based on the processed information obtained from the devices within its vicinity.

All these technologies make the smartphone somewhat resilient to basic type of spoofing attacks. Have you tried turning off the auto update time and date off and restarted the device before transmitting the signal? When you do this the device gets into cold start mode meaning it is more vulnerable to attacks now.

However, the chances are still pretty low, can you please share the data of your old smartphones during the attack in an open sky environment? I am working on something but due to lack of hardware and data I am not able to do it.

@psmitty7373
Copy link

psmitty7373 commented Jul 5, 2023

I've had success with more modern phones. Specifically clearing A-GPS data and blackholing the associated A-GPS domains helps greatly. Additionally, you have to make sure the clock matches what your GPS data is sending.

For Pixel devices, I blackhole:
xtrapath1.izatcloud.net
xtrapath2.izatcloud.net
xtrapath3.izatcloud.net

@Imtiaz08
Copy link

Imtiaz08 commented Jul 5, 2023

I've had success with more modern phones. Specifically clearing A-GPS data and blackholing the associated A-GPS domains helps greatly. Additionally, you have to make sure the clock matches what your GPS data is sending.

For Pixel devices, I blackhole:
xtrapath1.izatcloud.net
xtrapath2.izatcloud.net
xtrapath3.izatcloud.net

Can you please explain what transmitting front end are you using? I have a hackRF one without TCXO, also what about black holing the associated data? Never heard about that before...

@psmitty7373
Copy link

psmitty7373 commented Jul 5, 2023 via email

@nxydyxsj123456
Copy link
Author

I can success cheat old phone ,but in my samsung S10+, 10 satellite in view but 0 in use ,I have tried txco with 0.1~0.5ppm, open airplane mode,clear AGPS,and reboot my phone.

@psmitty7373
Copy link

Does the phone clock match the spoofed GPS time and date used in your apoapsis data? If it does, then the S10+ might have some additional spoof detection.

@nxydyxsj123456
Copy link
Author

I tried past time and real time attack ,both not success in samsung and gps antenna, can cheap hackrf do this job? i have more expensive device such as x310 n210 b210,but not found their code . i wonder wether it is a anti-cheat problem or my device problem.

@nxydyxsj123456
Copy link
Author

It looks like the latest smartphone devices aren't solely relying on GNSS receiver for the calculation of position. There are multiple aiding sensors such as network location, built-in IMU, even Google smartphones such as Pixel use GLP services which creates a cache of the user position based on the processed information obtained from the devices within its vicinity.

All these technologies make the smartphone somewhat resilient to basic type of spoofing attacks. Have you tried turning off the auto update time and date off and restarted the device before transmitting the signal? When you do this the device gets into cold start mode meaning it is more vulnerable to attacks now.

However, the chances are still pretty low, can you please share the data of your old smartphones during the attack in an open sky environment? I am working on something but due to lack of hardware and data I am not able to do it.

i dont konw what the data mean i use old chinese xiaomi phone and success

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants