Go Down

Topic: Cracking monitoring data sent vias GSM (Read 307 times) previous topic - next topic

heinburgh

I am busy putting together a unit that will intercept and alter RS485 signal between a comms unit and the GSM module that sends monitoring data to a server. So far I have managed to divert the data to my own server by inserting my server address into the AT commands. So I managed to capture a bit of data. It's arranged in YAML and it seems to be openpgp.

How do I go about cracking this? Is this possible or a waste of time?

Code: [Select]
# Packet 6
peer0_0: !!binary |
  AQAxAAAAJgAAAAJ9occEtGzBnP7tRB/EiVYXvnbsazcP/AH0rZrK5+P+M3P/
# Packet 8
peer0_1: !!binary |
  AQAuAAAANgAAAAL4t/tXS/RZnz66LWaG0m14JH4OOrv870jgSiVAxQ4I2k1fIwX78pbCHuYs5CKb
  8zvh/wEANQAAABYAAAACV0IsmdSq4i6G1uxLeyK4MqP/
# Packet 10
peer0_2: !!binary |
  AQAuAAAANgAAAAL4t/tXS/RZnz66LWaG0m14JH4OOrv870jgSiVAxQ4I2k1fIwX78pbCHuYs5CKb
  8zvh/wEANQAAABYAAAACV0IsmdSq4i6G1uxLeyK4MqP/
# Packet 12
peer0_3: !!binary |
  AQAyAAAAFgAAAAIjNfqUPkbfQhcEoyFI9aYVGv8=
# Packet 14
peer0_4: !!binary |
  AQAyAAAAFgAAAAIjNfqUPkbfQhcEoyFI9aYVGv8=
# Packet 16
peer0_5: !!binary |
  AQAyAAAAFgAAAAK2TbCQTDmirgMPWqMe+zswEP8=

Go Up