1. RF_Air_Interface

Legal & Ethical Notice — US Law

This document is for educational and defensive security research purposes only.

All techniques described herein are analyzed in a controlled lab environment using your own equipment and licensed test SIMs. Applying any of these techniques to real-world cellular infrastructure, third-party devices, or spectrum you do not own is illegal under US federal law, including:

  • 47 U.S.C. § 333 — Prohibits interference with radio communications. RF jamming is illegal for all private parties and state/local law enforcement with no exceptions. The FCC has imposed fines exceeding $34 million for marketing jamming devices.
  • 47 U.S.C. § 301 — Requires an FCC license to transmit on licensed spectrum. Operating a fake base station (eNodeB/gNB) on live cellular frequencies without authorization violates this statute.
  • 47 U.S.C. § 605 — Prohibits unauthorized interception of radio communications not intended for the recipient.
  • 18 U.S.C. § 2511 (Wiretap Act) — Prohibits intentional interception of electronic communications, including voice (VoLTE/RTP) and data.
  • 18 U.S.C. § 1029 — Prohibits fraud involving access devices. SIM cards are federally defined access devices; cloning, unauthorized key extraction, and related acts are federal crimes.
  • 18 U.S.C. § 1030 (CFAA) — Prohibits unauthorized access to computer systems, including telecom signaling infrastructure (Diameter, GTP, SBI APIs).

Lab use requirements: All radio experiments must be conducted in an RF-shielded environment (Faraday cage) using test SIMs provisioned in your own Open5GS/srsRAN lab. No transmission on live cellular bands is permitted without an FCC experimental license.

This document does not constitute legal advice. Consult a licensed attorney before conducting any security research involving radio spectrum or telecommunications infrastructure.

Layer 1 — RF & Air Interface Pentesting (4G/5G)

Overview

The air interface is the radio link between a User Equipment (UE) and a base station (eNodeB in 4G, gNB in 5G). It is the most externally accessible attack surface — no physical access to operator infrastructure required. With a USRP B210 and open-source software stacks, a researcher can both passively observe and actively interact with this layer.


Threat Points

1.1 Passive Channel Monitoring

What it is: Listening to unencrypted broadcast and control channels transmitted by every base station.

Channels exposed:

Channel 4G Name 5G Name Contents
Broadcast MIB / SIB1-SIB14 MIB / SIB1+ Cell identity, PLMN, freq config, TAC
Paging PCH PCH TMSI-based paging (reveals presence)
Random Access PRACH PRACH UE attach attempts
Control PDCCH PDCCH/CORESET Scheduling, RNTI assignments

What can be extracted:

Tools:

USRP B210 setup:

# Install srsRAN
sudo apt install srsran

# Scan for LTE cells
srslte_cell_search --rf.device_name=uhd --rf.device_args="type=b200"

# Decode MIB/SIB from found cell
srslte_pdsch_ue --rf.dl_earfcn=1575 --rf.device_name=uhd

1.2 IMSI/IMEI Harvesting (Fake Base Station / IMSI Catcher)

What it is: A rogue eNodeB/gNB that forces nearby UEs to attach, triggering identity request procedures that reveal IMSI or IMEI.

How it works:

  1. Attacker transmits a stronger signal than the legitimate cell on the same PLMN/EARFCN
  2. UE selects the cell with the best signal (standard 3GPP behavior)
  3. Attacker sends Identity Request (4G NAS) — legacy UEs respond with IMSI in cleartext
  4. In 4G: no mutual authentication before identity response
  5. In 5G: SUPI is concealed as SUCI using ECIES — direct IMSI harvest blocked at NAS layer

4G vulnerability:

5G mitigation (and its limits):

Tools:

Lab setup (4G fake eNB):

flowchart LR
    USRP["USRP B210"] --> srsENB --> EPC["srsEPC\n(Open5GS MME)"]
    EPC --> NAS["NAS Identity Request"]
    UE["UE attaches"] --> NAS
    NAS --> LOG["IMSI logged"]

Legal note: Transmitting on licensed cellular spectrum without FCC authorization violates 47 U.S.C. § 301. Operating a device that captures subscriber identities (IMSI/IMEI) from third-party devices may additionally violate 47 U.S.C. § 605 (unauthorized interception of radio communications). No "spectrum authority authorization" exists for private parties conducting IMSI-catching on live networks — the only lawful path is a fully isolated lab environment using your own test SIMs and an RF-shielded enclosure (Faraday cage). FCC experimental licenses do not authorize subscriber harvesting from third-party UEs.


1.3 Downgrade Attacks

What it is: Forcing a 5G/4G UE to fall back to 3G/2G to exploit weaker security in older generations.

Why it works:

Attack flow:

  1. Attacker jams or blocks 4G/5G frequencies selectively
  2. Or: broadcasts fake 4G cell with system info indicating "no 5G available" (indicating flag in SIB2)
  3. UE falls back to 3G/2G
  4. Attacker can now perform 2G IMSI catch or intercept with A5/1 cracking

Tools:

Legal note: Selectively jamming or blocking 4G/5G frequencies to force a UE to downgrade violates 47 U.S.C. § 333 (prohibition on willful interference with radio communications). This applies regardless of whether the jamming is targeted or broadband. Lab use only — test exclusively on your own devices inside an RF-shielded enclosure.


1.4 Paging Channel Attacks

What it is: Exploiting the LTE/5G paging mechanism to infer UE presence and location.

Attack types:

What you need:

Tools: srsRAN patched NAS layer, custom EPC modifications


1.5 RF Jamming / Denial of Service

What it is: Transmitting interference to prevent legitimate UEs from connecting.

Types:

Tools: GNU Radio + USRP B210 with custom jamming flowgraphs

Legal note: RF jamming of cellular, Wi-Fi, GPS, or any licensed spectrum is illegal under 47 U.S.C. § 333 for all private parties and state/local law enforcement — no authorization pathway exists for non-federal entities. The FCC has imposed fines of $48,000 against individual users and $34.9 million against companies that marketed jammers (see FCC Enforcement Advisory DA-14-1785). These penalties apply regardless of intent or duration. Any flowgraph implementing jamming must only ever execute inside a fully RF-shielded enclosure with zero signal leakage to live spectrum.


USRP B210 Capability Map for Layer 1

Attack USRP B210 Capable Notes
Passive LTE scanning Yes srsRAN, LTE-Cell-Scanner
MIB/SIB decode Yes Full decode with srsRAN
IMSI catching (4G) Yes srsRAN + Open5GS EPC
IMSI catching (5G SA) Partial IMEI still exposed; SUPI concealed
Downgrade to 2G/3G Yes gr-gsm, OsmocomBB
Paging analysis Yes Passive via FALCON/LTESniffer
RF jamming Yes GNU Radio flowgraph
5G NR passive Partial 5G NR support limited; OAI/srsRAN NR builds improving
RF Jamming Capability — Legal Warning

The "RF jamming" row above is included for threat modeling completeness only. Implementing jamming on live spectrum is a federal crime under 47 U.S.C. § 333 regardless of intent or duration. Lab use requires complete RF isolation (Faraday cage with verified attenuation).


Lab Environment Recommendations

flowchart TB
    FC["Faraday Cage / RF-shielded room"]
    USRP["USRP B210"]
    PC["Host PC — Ubuntu 22.04"]
    STACK["srsRAN (eNB) + Open5GS (EPC/MME)"]
    UE["Test SIM + Android phone\n(target UE — your own device)"]

    FC --- USRP --- PC --- STACK --- UE

Host PC specs:

Linux (Recommended) macOS (Partial)
OS Ubuntu 22.04 LTS macOS 13+ (Ventura+)
CPU Intel i7+ / Ryzen 7+ Apple M-series or Intel
RAM 16 GB+ 16 GB+
USRP support Full (UHD native) Partial (UHD via Homebrew; real-time PHY less stable)
srsRAN PHY Full real-time Limited; prefer Linux VM for radio work

Recommendation: For USRP B210 + srsRAN real-time LTE/NR, use a dedicated Linux host or VM. macOS is suitable for passive analysis (LTE-Cell-Scanner, FALCON) and the core network side (Open5GS via Docker), but real-time PHY is unreliable on macOS due to USB timing and UHD driver limitations.

Software stack:

# UHD drivers
sudo apt install libuhd-dev uhd-host
uhd_images_downloader

# srsRAN 4G
git clone https://github.com/srsran/srsRAN_4G
cd srsRAN_4G && mkdir build && cd build
cmake .. && make -j$(nproc)
sudo make install

# Open5GS (EPC)
# Follow: https://open5gs.org/open5gs/docs/guide/01-quickstart/

# FALCON (PDCCH decoder)
git clone https://github.com/falkenber9/falcon

Key 3GPP References

Spec Topic
TS 36.331 LTE RRC protocol
TS 38.331 NR RRC protocol
TS 36.304 LTE cell selection/reselection
TS 33.401 LTE security architecture
TS 33.501 5G security architecture (SUCI/SUPI)
TS 36.211 LTE physical channels
TS 38.211 NR physical channels

Next Layer

Layer 2: RRC/NAS Signaling Attacks — authentication bypass, AKA relay, null encryption negotiation, IMSI paging exploitation at the protocol level.