SlideShare a Scribd company logo
1 of 30
Sniffer For Detecting Lost Mobile
By
Arvind Negi
What Happens when you
lost your Mobile Phone?
Reporting…Searching… Praying…
But still not found?
What is the best Solution
then?
What is the best Solution then?
Sniffer
Abstract
• Feature: help to create database using RAM
• IMEA - embedded in a chip
• RAM stores - IMEI no.
• Act as a database
What is Sniffer?The cell phone though the mobile communication system
is proved to be an advantageous method of communication
over wired communication, there is another problem that is
the mobile phones get lost or get misplaced. The losses are
increasing day by day and there has been very little effort that
has been done to obtain the lost mobile phone.
Introduction
• Feature: help to create database using RAM
• IMEA - embedded in a chip
• RAM stores - IMEI no.
• Act as a database
A sniffer is a program or a device that eavesdrops on the network traffic by grabbing
information traffic over a network. A cell phone really like a radio an extremely
sophisticated radio, which uses some band of frequency that has the basic working
similar to the ordinary cordless phone.
One of the most interesting things about cell phone is that it is really a
radio an extremely sophisticated radio, which uses some band of frequency that has
the basic working similar to the ordinary cordless phone. The mobile cellular
communication has been appreciated since its birth in the early 70’s and the
advancement in the field of VLSI has helped in designing less power, smaller size but
efficient transceiver for the purpose of communication. But however the technology
has not yet answered the loss or misplacement of the lost mobile phone which is
significantly increasing. In this paper we discuss the problem and the probable solution
that could be done. The IMEI number is a unique number that is embedded in the
mobile phone the main purpose of which is the blocking of calls that is made by
unauthorized person once the mobile is reported as stolen but here we use it
effectively for the purpose of detection.
Literature Survey
• 42% of lost mobiles have no security in place to protect data
• 20% of lost devices had access to work email
• 20% contained sensitive personal information such as national insurance
numbers, addresses and dates of birth
• 35% had access to social networking accounts via apps or web browser-
stored cookies
What is Sniffer?period 2004-2011, by focusing on high-level attacks, such those to user
applications. We group existing approaches aimed at protecting mobile
devices against these classes of attacks into different categories, based
upon the detection principles, architectures, collected data and
operating systems, especially focusing on IDS-based models and tools.
With this categorization we aim to provide an easy and concise view of
the underlying model adopted by each approach.
Proposed Methods
SNIFFER
• A program and/or device that monitors data traveling over a network
• It is a wire-tap device
• Sniffing refers to capture the data and information over the network traffic
• With the help of “sniffing” program a programmer can listen in on computer
conversations
• A sniffer can catch all packet traffic on network block
What Sniffer actually has?
Small Base Station
Plays major role
Transceiver section
operated at frequency (different)
Directional antenna
Includes:
Experimentation
EMEI(International Mobile Equipment Identity)
• Unique number
• Used for blocking of call made by unauthorized person
• 15 digit unique code
• identify-GSM/DCS/PCM
• check EIR (Equipment Identity Register)
• The function of an IMEI code is to identify the phone
What is IMEI?
I n t e r n a t i o n a l M o b i l e E q u i p m e n t I d e n t i f i e r
If EIR & IMEI matched
NETWORKS CAN DO NO. OF THINGS
TO KNOW IMEI NUMBER DIAL *#06#
BUT, We use IMEI EFFECTIVELY in SNIFFER
For the purpose of DETECTON
Gray List
Allow the Phone to be used, but can be
tracked to see who has it.
Black List
Listing the phone from being used on any
number where there is an EMI match
Designing for the Sniffer
1.SNIFFER BASE STATION
2.UNIDIRECTIONAL ANTENNA
3.TRACKING S/W
Design Of Unidirectional Antenna
Designing for the Sniffer - Design Of Unidirectional Antenna
• Act as a eyes for the sniffer
• Antenna is a device works at specified frequency
• Transmitting & receiving data signal
• Transmit power
• Used to show radiation pattern
(Unidirectional Antenna Radio
Pattern)
Sniffer Base Station
Designing for the Sniffer - Sniffer Base Station
• Small base station
• Include transceiver section
• Operated at frequency (900mhz which is VHF
range)
• OSCILLATOR circuit-for frequency range
• Important is cooling
• Low power transmitter (help in nature)
S/W for the Tracking
Designing for the Sniffer - S/W for the Tracking
• Feature: help to create database using
RAM
• IMEA - embedded in a chip
• RAM stores - IMEI no.
• Act as a database
S/W for the Tracking
Designing for the Sniffer - S/W for the Tracking
RAM
IMEI Number
Lost mobile
Signaling information
i/p
Working of a Sniffer Device
• Sniffer works as a transceiver
• BTS (Base Transceiver Station) - Act as a middle
man
• MTSO (Mobile Telephone Switching office) =
MSC(Mobile Switching Centre)
Before Sniffer Increase The Frequency
After Sniffer Increase The Frequency
IMEI no. provided by MTSO or MSC
BTS(base transceiver station)-act as a middle man
MTSO(mobile telephone switching office)=MSC(mobile
switching centre)
Sniffer tries to Communicate with the
Lost Mobile
Key Finding
• SNIFFER (The small transceiver used for detecting lost mobile phone)
• IMEA (International Mobile Equipment Identifier)
• MTSO (Mobile Telephone Switching Office)
• MSC (Mobile Station Switching Controller)
• BTS (Base transceiver station)
Conclusion
Designing for the Sniffer - S/W for the Tracking
• Feature: help to create database using RAM
• IMEA - embedded in a chip
• RAM stores - IMEI no.
• Act as a database
Reference
Designing for the Sniffer - S/W for the Tracking
• http://www.google.com
• http://www.seminarsonly.com
• John D Kraus, “Electromagnetics”, TMH,
• Schiller , “Mobile Communication”, Pearson Education 1 Edition, 7th
reprint-2003
• Jordan et al, “Electromagnetic waves
Thank You

More Related Content

What's hot

Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
Mahmoud Abdeen
 

What's hot (20)

Outes
OutesOutes
Outes
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Wi Vi Technology
Wi Vi TechnologyWi Vi Technology
Wi Vi Technology
 
Microstrip antenna for awp class
Microstrip antenna for awp classMicrostrip antenna for awp class
Microstrip antenna for awp class
 
Cell Phone Antennas
Cell Phone AntennasCell Phone Antennas
Cell Phone Antennas
 
Catching IMSI Catchers
Catching IMSI CatchersCatching IMSI Catchers
Catching IMSI Catchers
 
Ultra wide band antenna
Ultra wide band antennaUltra wide band antenna
Ultra wide band antenna
 
Wi vi
Wi viWi vi
Wi vi
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
Microstrip patch-antenna
Microstrip patch-antennaMicrostrip patch-antenna
Microstrip patch-antenna
 
Wi-Vi Technology - Seminar Presentation
Wi-Vi Technology - Seminar PresentationWi-Vi Technology - Seminar Presentation
Wi-Vi Technology - Seminar Presentation
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Wi-VI TECHNOLOGY
Wi-VI TECHNOLOGYWi-VI TECHNOLOGY
Wi-VI TECHNOLOGY
 
Log periodic antenna designing
Log periodic antenna designingLog periodic antenna designing
Log periodic antenna designing
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Assignment Of 5G Antenna Design Technique
Assignment Of 5G Antenna Design TechniqueAssignment Of 5G Antenna Design Technique
Assignment Of 5G Antenna Design Technique
 
Metamaterial Patch Antenna
Metamaterial Patch AntennaMetamaterial Patch Antenna
Metamaterial Patch Antenna
 

Viewers also liked

Viewers also liked (15)

Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
 
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone UsageWhen Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
When Attention is not Scarce – Detecting Boredom from Mobile Phone Usage
 
Jagumicropill
JagumicropillJagumicropill
Jagumicropill
 
BYTE bdva Valencia Summit November 2016
BYTE bdva Valencia Summit November 2016BYTE bdva Valencia Summit November 2016
BYTE bdva Valencia Summit November 2016
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
 
3-D TECHNOLOGY
3-D TECHNOLOGY 3-D TECHNOLOGY
3-D TECHNOLOGY
 
Microelectronic pill
Microelectronic pillMicroelectronic pill
Microelectronic pill
 
pill camera
pill camerapill camera
pill camera
 
MINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORMINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTOR
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Pill Camera ppt
Pill Camera pptPill Camera ppt
Pill Camera ppt
 
Electronic pill
Electronic pillElectronic pill
Electronic pill
 
Pill camera
Pill cameraPill camera
Pill camera
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 

Similar to Sniffer for detecting lost mobiles

Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Edwin Manuel
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01
puja kumari
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02
Anjali Verma
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobiles
Ruqeya Afshan
 

Similar to Sniffer for detecting lost mobiles (20)

Sniffer
SnifferSniffer
Sniffer
 
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
Snifferfordetectinglostmobile 130811054537 phpapp01 (1)
 
Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01Snifferfordetectinglostmobile 130811054537-phpapp01
Snifferfordetectinglostmobile 130811054537-phpapp01
 
sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptx
 
SNIFFER FOR DETECTING LOST MOBILE ppt arya
SNIFFER FOR DETECTING LOST MOBILE ppt  aryaSNIFFER FOR DETECTING LOST MOBILE ppt  arya
SNIFFER FOR DETECTING LOST MOBILE ppt arya
 
Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02Snifferforthemobilephones 120304120929-phpapp02
Snifferforthemobilephones 120304120929-phpapp02
 
Sniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobilesSniffer for-detecting-lost-mobiles
Sniffer for-detecting-lost-mobiles
 
Protect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacksProtect your IPPBX against VOIP attacks
Protect your IPPBX against VOIP attacks
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Ivr system
Ivr systemIvr system
Ivr system
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 

Recently uploaded

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 

Sniffer for detecting lost mobiles

  • 1. Sniffer For Detecting Lost Mobile By Arvind Negi
  • 2. What Happens when you lost your Mobile Phone?
  • 4. But still not found?
  • 5. What is the best Solution then?
  • 6. What is the best Solution then? Sniffer
  • 7. Abstract • Feature: help to create database using RAM • IMEA - embedded in a chip • RAM stores - IMEI no. • Act as a database
  • 8. What is Sniffer?The cell phone though the mobile communication system is proved to be an advantageous method of communication over wired communication, there is another problem that is the mobile phones get lost or get misplaced. The losses are increasing day by day and there has been very little effort that has been done to obtain the lost mobile phone.
  • 9. Introduction • Feature: help to create database using RAM • IMEA - embedded in a chip • RAM stores - IMEI no. • Act as a database
  • 10. A sniffer is a program or a device that eavesdrops on the network traffic by grabbing information traffic over a network. A cell phone really like a radio an extremely sophisticated radio, which uses some band of frequency that has the basic working similar to the ordinary cordless phone. One of the most interesting things about cell phone is that it is really a radio an extremely sophisticated radio, which uses some band of frequency that has the basic working similar to the ordinary cordless phone. The mobile cellular communication has been appreciated since its birth in the early 70’s and the advancement in the field of VLSI has helped in designing less power, smaller size but efficient transceiver for the purpose of communication. But however the technology has not yet answered the loss or misplacement of the lost mobile phone which is significantly increasing. In this paper we discuss the problem and the probable solution that could be done. The IMEI number is a unique number that is embedded in the mobile phone the main purpose of which is the blocking of calls that is made by unauthorized person once the mobile is reported as stolen but here we use it effectively for the purpose of detection.
  • 11. Literature Survey • 42% of lost mobiles have no security in place to protect data • 20% of lost devices had access to work email • 20% contained sensitive personal information such as national insurance numbers, addresses and dates of birth • 35% had access to social networking accounts via apps or web browser- stored cookies
  • 12. What is Sniffer?period 2004-2011, by focusing on high-level attacks, such those to user applications. We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach.
  • 13. Proposed Methods SNIFFER • A program and/or device that monitors data traveling over a network • It is a wire-tap device • Sniffing refers to capture the data and information over the network traffic • With the help of “sniffing” program a programmer can listen in on computer conversations • A sniffer can catch all packet traffic on network block
  • 14. What Sniffer actually has? Small Base Station Plays major role Transceiver section operated at frequency (different) Directional antenna Includes:
  • 15. Experimentation EMEI(International Mobile Equipment Identity) • Unique number • Used for blocking of call made by unauthorized person • 15 digit unique code • identify-GSM/DCS/PCM • check EIR (Equipment Identity Register) • The function of an IMEI code is to identify the phone
  • 16. What is IMEI? I n t e r n a t i o n a l M o b i l e E q u i p m e n t I d e n t i f i e r If EIR & IMEI matched NETWORKS CAN DO NO. OF THINGS TO KNOW IMEI NUMBER DIAL *#06# BUT, We use IMEI EFFECTIVELY in SNIFFER For the purpose of DETECTON
  • 17. Gray List Allow the Phone to be used, but can be tracked to see who has it. Black List Listing the phone from being used on any number where there is an EMI match
  • 18. Designing for the Sniffer 1.SNIFFER BASE STATION 2.UNIDIRECTIONAL ANTENNA 3.TRACKING S/W
  • 19. Design Of Unidirectional Antenna Designing for the Sniffer - Design Of Unidirectional Antenna • Act as a eyes for the sniffer • Antenna is a device works at specified frequency • Transmitting & receiving data signal • Transmit power • Used to show radiation pattern (Unidirectional Antenna Radio Pattern)
  • 20. Sniffer Base Station Designing for the Sniffer - Sniffer Base Station • Small base station • Include transceiver section • Operated at frequency (900mhz which is VHF range) • OSCILLATOR circuit-for frequency range • Important is cooling • Low power transmitter (help in nature)
  • 21. S/W for the Tracking Designing for the Sniffer - S/W for the Tracking • Feature: help to create database using RAM • IMEA - embedded in a chip • RAM stores - IMEI no. • Act as a database
  • 22. S/W for the Tracking Designing for the Sniffer - S/W for the Tracking RAM IMEI Number Lost mobile Signaling information i/p
  • 23. Working of a Sniffer Device • Sniffer works as a transceiver • BTS (Base Transceiver Station) - Act as a middle man • MTSO (Mobile Telephone Switching office) = MSC(Mobile Switching Centre)
  • 24. Before Sniffer Increase The Frequency
  • 25. After Sniffer Increase The Frequency IMEI no. provided by MTSO or MSC BTS(base transceiver station)-act as a middle man MTSO(mobile telephone switching office)=MSC(mobile switching centre)
  • 26. Sniffer tries to Communicate with the Lost Mobile
  • 27. Key Finding • SNIFFER (The small transceiver used for detecting lost mobile phone) • IMEA (International Mobile Equipment Identifier) • MTSO (Mobile Telephone Switching Office) • MSC (Mobile Station Switching Controller) • BTS (Base transceiver station)
  • 28. Conclusion Designing for the Sniffer - S/W for the Tracking • Feature: help to create database using RAM • IMEA - embedded in a chip • RAM stores - IMEI no. • Act as a database
  • 29. Reference Designing for the Sniffer - S/W for the Tracking • http://www.google.com • http://www.seminarsonly.com • John D Kraus, “Electromagnetics”, TMH, • Schiller , “Mobile Communication”, Pearson Education 1 Edition, 7th reprint-2003 • Jordan et al, “Electromagnetic waves