Sim Hacking Attack
Sim Hacking Attack
Sim Hacking Attack
HACKING
ATTACKS
By: Suliman Hacker
1: SIM Jacker Attack
Due to your increasing personal and financial information
tied to your online identity, attacks and hackings of
phone numbers are more likely to occur. According to
AdaptiveMobile Security, which is a company specialized
in mobile phone security, the attack takes place through
a defect and a gap in the SIM cards called (SIMJaker). This
is capable of opening a back door for the hackers to
attack the SIM card, and short SMS is enough to do the
mission.
Step 8: Now click start, it will take about 10 minutes to write it,
once it is complete, it will ask for a security code, enter the
security code the network provider gave you, then click Finish
4: WIB ATTACK
As an alternative to static SIM toolkit applications with a
fixed pre-installed menu, some operators opt for
dynamic SIM toolkit, where the menus and user dialogs
are generated on the fly based on information provided
by a central server. SIM applications that provide this
functionality are generally referred to as SIM-browsers or
µ-browsers.
Two browsers are currently available, the Wireless
Internet Browser (WIB) which was the first successful
browser released and promoted on the market by
SmartTrust.
The Wireless Internet Browser (WIB) is specified by
SmartTrust and is the market leading solution for SIM
toolkit based browsing. The WIB-enabled SIM has a menu
stored on the SIM. This menu can be managed and
updated using Over The Air (OTA) services.
Attack Scenario
cmd
The SIM can issue a variety of commands through this
mechanism, given in alphabetical order:
….
– DISPLAY TEXT, which displays text or an icon on screen. A
high priority is available, to replace anything else on screen.
LAUNCH BROWSER, which requests a browser inside a
browser enabled ME to interpret the content corresponding
to a URL.
– OPEN CHANNEL, which requests the ME to open a data
channel with parameters indicated in the command (if class “e”
is supported.)
– PLAY TONE, which requests the ME to play a tone in its
earpiece, ringer, or other appropriate loudspeaker.
– PROVIDE LOCAL INFORMATION which requests the ME to
pass local information to the SIM, for example the mobile
country and network codes (MCC + MNC) of the network on
which the user is registered.
– SEND SHORT MESSAGE, which sends a short message or
SMS-COMMAND to the network.
– SEND SS, which sends an SS request to the network.
– SEND USSD, which sends a USSD string to the network.
– SET UP CALL, of which there are three types:
– set up a call, but only if not currently busy on another call;
– set up a call, putting all other calls (if any) on hold;
– set up a call, disconnecting all other calls (if any);
…..”” [4]
3.4. Security mechanisms of OTA SMS
OTA (Over-The-Air) is a technology used to communicate with,
download applications to, and manage a SIM card without being
connected physically to the card.
OTA enables a Network Operator to introduce new SIM services
or to modify the contents of SIM cards in a rapid and cost-
effective way.
OTA is based on client/server architecture where at one end
there is an operator back-end system (customer care, billing
system, application server … ) and at the other end there is a SIM
card.
Telegram : T.me/RevolutionZone0
website :https://sulimanhacker.blogspot.com