Releases: domai-tb/mobilesniper
MobileSniper v0.3 - WIP
New Features
- Command
enum sdc consumer
: Enumerates the connected network by sending a UDP multicast to discovery SDC consumers. A consumer will receive the hello message send by MobileSniper and should anwser this message (in theory). If the provider enforce TLS, there is no method implemented to bypass these restriction. (Work in Progress)
Improvements
- SOAP message handling uses generics for easier and more consitent parsing of received messages.
Refactoring
- Command
enum sdc
was renamed toenum sdc provider
. - SOAP models recived consitent naming for receiving and sending models
Miscellaneous
- Updated README to link to the correct repositories
- VSCode launch options for SDC commands
Full Changelog: v0.2...v0.3-wip
MobileSniper v0.2
New Features
- Command
enum sdc
: Enumerates the connected network by sending a UDP multicast to discovery SDC providers. A provider will receive the probe message send by MobileSniper and will return a probe match message. This message contains usually sensitive information about the connected device. If the provider enforce TLS, there is no method implemented to bypass these restriction.
Refactoring
- Added directory
cli
as top-level package to provide all CLI specific commands / libaries in a specific directory. All CLI packages are wrappers arround MobileSnipers packages stored inpkg
. The commandcmd/mobilesniper/main.go
brings them into a single executable.
Miscellaneous
- Added GNU Makefiles to allow UDP multicast inside a QubesOS AppVM:
scripts/networking.mk
- Added GNU Makefiles to patch sdcX demo-binaries to search for shared libaries in the current working directoy:
scripts/patchsdcxbin.mk
. The proprietary sdcX binaries are not included inside of this repository. Contact "SurgiTAIX AG" for more information. - Ignore proprietary binaries and XML dump of SOAP messages within git.
Full Changelog: v0.1...v0.2
MobileSniper v0.1
Initial Features
-
enum services
: Enumerates ports on a given network or IP to identify potential 5G networking functions. This command scans open ports to detect services that could be linked to specific 5G functions. -
enum nf
: Enumerates the given network or IP on HTTP(S) ports and checks if 5G network function endpoints match the responses on those ports. The results are presented as a percentage of matching HTTP endpoints, helping identify 5G services based on known endpoint patterns. -
analyze pcap
: Analyzes a given PCAP file to detect HTTP endpoints that have been called during network activity. If any of the called endpoints match predefined network function definitions, the tool flags them as potential 5G networking functions. -
scan nuclei
: Runs a Nuclei scan against the given network or IP, utilizing templates to check for known vulnerabilities or misconfigurations in the 5G network. -
scan nessus
: Executes a Nessus scan on the specified network or IP, performing a comprehensive vulnerability assessment to uncover potential security weaknesses in the 5G infrastructure.
Full Changelog: https://github.com/domai-tb/mobilesniper/commits/v0.1