SSB-Spoofer is a free open-source 5G Synchronization Signal Block (SSB) spoofing tool designed for security research and testing. The tool intercepts legitimate SSB signals from 5G base stations (gNBs), modifies critical Master Information Block (MIB) parameters, and retransmits spoofed SSB signals to prevent User Equipment (UE) network attachment. SSB-Spoofer is optimized to overcome several challenges in 5G NR signal manipulation and provides an effective denial-of-service capability against 5G devices.
The tool decodes authentic SSB signals, extracts the MIB information, applies strategic modifications (such as setting cell_barred flag, corrupting CORESET0 indices, and invalidating SearchSpace0 configurations), and continuously transmits the spoofed signals to overpower legitimate gNB transmissions.
This research tool was developed as part of security research into 5G network vulnerabilities and cellular communication protocols.
- 5G NR SSB Signal Interception: Captures and decodes legitimate SSB transmissions
- MIB Parameter Manipulation: Modifies critical MIB fields to prevent UE attachment
- Continuous Signal Transmission: Overpowers legitimate gNB signals through continuous spoofed SSB transmission
- SDR Hardware Support: Compatible with USRP B200/B210 and other UHD-supported devices
- Configurable Attack Parameters: Flexible configuration for different attack scenarios
- Real-time Signal Processing: Live capture, modification, and retransmission pipeline
- Cell Barring: Sets
cell_barredflag to true, causing UEs to reject the cell - CORESET0 Corruption: Invalidates PDCCH configuration by setting illegal CORESET0 indices
- SearchSpace0 Manipulation: Corrupts SIB1 search space configuration
All required dependencies can be installed on Ubuntu with the following:
sudo apt-get update
sudo apt-get install cmake make gcc g++ pkg-config libfftw3-dev libmbedtls-dev \
libsctp-dev libyaml-cpp-dev libgtest-dev libliquid-dev libconfig++-dev \
libzmq3-dev libspdlog-dev libfmt-dev libuhd-dev uhd-hostSSB-Spoofer requires srsRAN libraries for 5G signal processing:
git clone https://github.com/srsran/srsRAN_4G.git
cd srsRAN_4G
mkdir build && cd build
cmake ..
make -j$(nproc)
sudo make install
sudo ldconfigsudo apt-get install libuhd-dev uhd-host
# Download UHD firmware
sudo uhd_images_downloaderTo build the project run the following:
mkdir -p build && cd build
cmake ..
make -j$(nproc)
# Optional
sudo make install
sudo ldconfigAdd the -DCMAKE_BUILD_TYPE=Debug flag to build in developer/debug mode.
To target a specific 5G cell, configure the center frequency based on your target band:
cd build/SSB-Spoofer
./ssb_spoofer --config ../../config.yamlNote: A reference log file from a successful attack (ssb_spoofer.log) is included in the repository for comparison.
The tool will:
- Initialize SDR hardware and configure RF parameters
- Scan for target SSB signals at the specified frequency
- Decode MIB information from the legitimate signal
- Apply attack modifications to MIB parameters
- Generate and transmit spoofed SSB signals continuously
The effectiveness of the SSB spoofing attack can be observed through spectrum analysis. The following images show the RF spectrum before and during the attack:
Normal 5G spectrum showing legitimate SSB signals from the target gNB
Spectrum during attack showing continuous spoofed SSB transmission overpowering and out-numbering legitimate signals
The spoofed signals appear as continuous high-power transmissions that prevent UE devices from successfully completing cell selection and attachment procedures. The signal density and power demonstrate the attack in progress.
For targeting specific cells, you may need to:
- Identify Target PCI: Use a spectrum analyzer or cell scanner
- Determine Center Frequency: Find the exact SSB frequency
- Optimize TX Power: Adjust gain to overpower legitimate signals
- Configure Attack Parameters: Select appropriate MIB modifications
- Configure SDR for target frequency and bandwidth
- Capture 5G NR signals and search for SSB patterns
- Decode PSS/SSS to identify Physical Cell ID (PCI)
- Extract and decode MIB from PBCH
- Cell Barring: Set
cell_barred = trueto make cell appear unavailable - CORESET0 Corruption: Set invalid CORESET0 index (15) to break PDCCH decoding
- SearchSpace0 Corruption: Set invalid SearchSpace0 index to prevent SIB1 reception
- Power Amplification: Boost signal power to compete with legitimate gNB
- Re-encode modified MIB into PBCH payload
- Generate complete SSB signal with spoofed MIB
- Transmit continuously to maintain denial of service
- Monitor transmission statistics and adjust parameters
- Research Environments: Use only in controlled lab settings
- Authorized Testing: Obtain proper permissions before deployment
- Compliance: Follow local spectrum regulations and laws
- Responsible Disclosure: Report vulnerabilities through appropriate channels
- Range: Limited by SDR TX power and antenna configuration
- Detection: Continuous transmission may be detected by network monitoring
- Interference: May affect legitimate network operations in vicinity
UE still connects despite spoofing:
- Increase TX gain to maximum (89 dB for B200)
- Verify target frequency matches cell center frequency
- Check that continuous transmission mode is enabled
- Ensure spoofed signal power exceeds legitimate signal
SDR hardware not detected:
- Install UHD drivers:
sudo apt-get install libuhd-dev uhd-host - Download firmware:
sudo uhd_images_downloader - Check USB connection and try different USB port
- Verify device with:
uhd_find_devices
Build errors:
- Install all dependencies listed above
- Ensure srsRAN is properly installed and configured
- Try building srsRAN from source if packages are outdated
This project is part of the ORAN Testing Library initiative. Contributions are welcome through:
- Bug Reports: Submit issues with detailed reproduction steps
- Feature Requests: Propose new attack vectors or capabilities
- Code Contributions: Follow project coding standards and submit pull requests
- Documentation: Improve usage guides and technical documentation
If you use this tool in your research, please cite our work:
@software{ssb_spoofer_2025,
title={SSB-Spoofer: 5G NR SSB Signal Spoofing Tool},
author={ORAN Testing Team},
year={2025},
url={https://github.com/oran-testing/SSB-Spoofer}
}This project is licensed under the AGPL-3.0 License - see the LICENSE file for details.
Disclaimer: This tool is intended for security research and authorized testing purposes only. Users are responsible for compliance with applicable laws and regulations. The authors assume no liability for misuse of this software.