osqzss / gps-sdr-sim

Software-Defined GPS Signal Simulator

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CAN this tools Spoof newer gps receivers?

nxydyxsj123456 opened this issue · comments

I use hackrf, I use TCXO, I can successfully spoof old android phones, but I can't spoof 2019 samsung s10+, is it a setting problem or is this tool not able to spoof newer gps receivers

It looks like the latest smartphone devices aren't solely relying on GNSS receiver for the calculation of position. There are multiple aiding sensors such as network location, built-in IMU, even Google smartphones such as Pixel use GLP services which creates a cache of the user position based on the processed information obtained from the devices within its vicinity.

All these technologies make the smartphone somewhat resilient to basic type of spoofing attacks. Have you tried turning off the auto update time and date off and restarted the device before transmitting the signal? When you do this the device gets into cold start mode meaning it is more vulnerable to attacks now.

However, the chances are still pretty low, can you please share the data of your old smartphones during the attack in an open sky environment? I am working on something but due to lack of hardware and data I am not able to do it.

I've had success with more modern phones. Specifically clearing A-GPS data and blackholing the associated A-GPS domains helps greatly. Additionally, you have to make sure the clock matches what your GPS data is sending.

For Pixel devices, I blackhole:
xtrapath1.izatcloud.net
xtrapath2.izatcloud.net
xtrapath3.izatcloud.net

I've had success with more modern phones. Specifically clearing A-GPS data and blackholing the associated A-GPS domains helps greatly. Additionally, you have to make sure the clock matches what your GPS data is sending.

For Pixel devices, I blackhole:
xtrapath1.izatcloud.net
xtrapath2.izatcloud.net
xtrapath3.izatcloud.net

Can you please explain what transmitting front end are you using? I have a hackRF one without TCXO, also what about black holing the associated data? Never heard about that before...

I can success cheat old phone ,but in my samsung S10+, 10 satellite in view but 0 in use ,I have tried txco with 0.1~0.5ppm, open airplane mode,clear AGPS,and reboot my phone.

Does the phone clock match the spoofed GPS time and date used in your apoapsis data? If it does, then the S10+ might have some additional spoof detection.

I tried past time and real time attack ,both not success in samsung and gps antenna, can cheap hackrf do this job? i have more expensive device such as x310 n210 b210,but not found their code . i wonder wether it is a anti-cheat problem or my device problem.

It looks like the latest smartphone devices aren't solely relying on GNSS receiver for the calculation of position. There are multiple aiding sensors such as network location, built-in IMU, even Google smartphones such as Pixel use GLP services which creates a cache of the user position based on the processed information obtained from the devices within its vicinity.

All these technologies make the smartphone somewhat resilient to basic type of spoofing attacks. Have you tried turning off the auto update time and date off and restarted the device before transmitting the signal? When you do this the device gets into cold start mode meaning it is more vulnerable to attacks now.

However, the chances are still pretty low, can you please share the data of your old smartphones during the attack in an open sky environment? I am working on something but due to lack of hardware and data I am not able to do it.

i dont konw what the data mean i use old chinese xiaomi phone and success