-
Notifications
You must be signed in to change notification settings - Fork 109
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Another indicator of IMSI catcher activity (compare public IP with announced IP ranges) #153
Comments
Actually, TP-Link devices have So, Go app would be a solution:
Cross compile for ARM32:
It should return you a JSON with IP and network data:
|
I think this is a daemon we could integrate into rayhunter if we wrote it in Rust. My question is how up to date is the ip.guide service and is this likely to give us false positives? I would want to give it lots of thought and testing before integrating it into rayhunter since we very much want to avoid false positives. |
Also definitely would want to write this in rust for consistency across the project. |
I guess ther eshould not be too much false positives. I believe that mobile networks are pretty much stable, i.e. ASN numbers, IP ranges and BGP data do not change very frequently. But I agree, we need a lot of testing. This indicator could be introduced, but should have very low weight at the beginning (until tested enough). What do you think? |
hmm but wouldnt' this trigger if someone was connected to say a femto-cell? Perhaps not but I woudl want to test it. The other concern I have is that this requires an active sim to connect to ip.guide service so we would need to make sure we don't run this heuristic on devices that don't have an active subscription. Other than that I'm fine with this and would welcome a PR for a heuristic with a low warning level for now. |
There is an app, called Wiretap Detector that compares your public IP with the announced IP ranges of the mobile operator (of course, you should not be using VPN).
It is using
ip.guide
service.With wget, you can get:
wget -qO- ip.guide | grep -E 'organization' | sed -E 's/.*"([^"]+)".*/\1/'
wget -qO- ip.guide | grep -E 'country' | sed -E 's/.*"([^"]+)".*/\1/'
wget -qO- ip.guide | grep -E 'ip' | sed -E 's/.*"([^"]+)".*/\1/'
wget -qO- ip.guide | grep -oP '"asn":\s*\K\d+'
Storing and comparing those data when there is some suspicious network change/activity, would be useful.
The text was updated successfully, but these errors were encountered: