Categories
EPC EUTRAN IMS / VoLTE LTE Mobile Networks Security VoIP

Using Wireshark to peer inside IPsec ESP VoLTE data from the P-CSCF

Viewing the payload of an Encapsulated Security Payload in Wireshark.

Categories
EPC IMS / VoLTE Kamailio LTE Mobile Networks SDM

Kamailio Bytes – Configuring Diameter Peers with CDP

Introducing C Diameter Peer module in Kamailio to manage Diameter Peers, monitor their state and handle the connections.

Categories
IMS / VoLTE LTE Mobile Networks Security Software

Reverse Engineering Samsung Sysdump Utils to Unlock IMS Debug & TCPdump on Samsung Phones

Reverse Engineering the Samsung Sysdump app to unlock IMS Debug and TCPdump functions

Categories
EPC EUTRAN IMS / VoLTE LTE Mobile Networks Security Software VoIP

VoLTE/IMS Debugging on Samsung Handsets using Sysdump & Samsung IMS Logger

Unlocking the built in IMS Debugging tool in Samsung’s Sysdump Utility

Categories
EPC EUTRAN IMS / VoLTE LTE Mobile Networks SDM Security SIM Cards

Roll your own USIMs for Private LTE Networks

Adventures in getting USIMs to use on private LTE networks.

Categories
EPC EUTRAN IMS / VoLTE LTE Mobile Networks RFCs & Standards VoIP

The case for Header Compression in VoIP/VoLTE

Robust Header Compression (ROHC) and it’s use for compressing RTP / VoLTE traffic headers.

Categories
EPC EUTRAN GSM IMS / VoLTE LTE Mobile Networks SIM Cards Software

Building Android APN / Carrier Config

How Android OS autoprovisions APN settings and how to set your own for your unique MCC & MNC.

Categories
EPC EUTRAN IMS / VoLTE LTE Mobile Networks Python RF RFCs & Standards SDM

PyHSS – Python 3GPP LTE Home Subscriber Server

I recently started working on an issue that I’d seen was to do with the HSS response to the MME on an Update Location Answer. I took some Wireshark traces of a connection from the MME to the HSS, and compared that to a trace from a different HSS. (Amarisoft EPC/HSS) The Update Location Answer […]

Categories
EPC IMS / VoLTE LTE Mobile Networks Notes RFCs & Standards SDM Security SIM Cards Software VoIP

All About IMS Authentication (AKAv1-MD5) in VoLTE Networks

How the AKAv1-MD5 algorith derives keys and how it’s used in IMS Networks