theapache64 / sim-jacker

Source code for the new SIM card flaw which lets hijack any phone just by sending SMS - Source Code + Demo Video
https://simjacker.com/
Apache License 2.0
114 stars 19 forks source link

sim-jacker update #1

Open theapache64 opened 4 years ago

theapache64 commented 4 years ago

Website: https://simjacker.com :globe_with_meridians: News : https://thehackernews.com/2019/09/simjacker-mobile-hacking.html :newspaper: Reddit : https://www.reddit.com/r/simjacking

What do you have ?

Ilori-Jaiyeola commented 4 years ago

@bbaranoff where can i get the source code of the script

bbaranoff commented 4 years ago

@Ilori-Jaiyeola made a tutorial about SIMTester with Motorola C1XX https://pl4y.store/index.php/2019/09/13/simjacker/

bbaranoff commented 4 years ago

@Ilori-Jaiyeola for ShadySim see here https://osmocom.org/projects/cellular-infrastructure/wiki/Shadysimpy

bbaranoff commented 4 years ago

To all SIMTester v1.9 has a new function which detect S@T or WIB vulnerability on the SIM with a PL2303 usb serial reader or Motorola C1xx

Ilori-Jaiyeola commented 4 years ago

Hello world have that may be interesting https://research.checkpoint.com/advanced-sms-phishing-attacks-against-modern-android-based-smartphones/ @bbranoff thanks , what about the above tutorial, is code available.

bbaranoff commented 4 years ago

@Ilori-Jaiyeola yes the source code is here https://opensource.srlabs.de/projects/simtester/wiki

djhashh commented 4 years ago

@theapache64 i have physical access to it and the person who is in charge is my friend so he will let me in without doubt. What my questions are 1) Can we create a backdoor to windows server 2) What we can do after getting the access to the network tower. Contact me at infinitytechz8@gmail.com

please do not attempt anything like this..You must understand, although built for reliability; tel systems configurations are sometimes very fragile. Often, engineers can be in short supply and expensive etc. especially for small telcos. These systems are complex and sometimes difficult to install, so usually everything is working, it goes into production environment asap. That said, security can sadly be an afterthought.. ABOVE ALL.. YOU COULD INTERFERE WITH EMERGENCY SERVICES! THAT'S BAD

i'm sorry to be so blunt but please.. relax and take a moment to imagine ..you or a loved one has sustained a serious accident.. you are calling 911 etc and the phone WILL NOT WORK. RIP..FUNERAL

cuz some 1337 haxor was tinkering around for a laugh....

sorry for the rant but bro come'on. clearly we alredy know that towe already sucks (windows). also that is somewhat doubtful. If im not mistaken, many run embedded nix systems. Although could be as simple as asterix/yates/openbts etc dont be an a$$hole


well, this simjacker ...that requires further research..unrelated, aadesh9985 whats your mobile number? asking for a friend ;)

spawn111 commented 4 years ago

Всем привет. Есть какие-то успехи ?) кто-то разобрался как это сделать ?)

stalkerned commented 4 years ago

Но, вы знаете, в Google Play есть «SMS-пинг».

Привет бро! Как тебя найти в телеграм? У тебя есть этот файл apk?

stalkerned commented 4 years ago

Well. Whenever you're looking for new info, i've found an interesting .apk file. This programm sands invisible messages to the phone number you write. Anyway, it's possible to recode this programm to sand other codes, lul. Here it is. (Fuck, i can't attache it) sec. Ahhhah, lul, "we don't support this type" Well, u can ask me for this .apk in telegram or gmail

hi bro! I am also Russian-speaking. How can you be found in a telegram?

Ilori-Jaiyeola commented 4 years ago

Well. Whenever you're looking for new info, i've found an interesting .apk file. This programm sands invisible messages to the phone number you write. Anyway, it's possible to recode this programm to sand other codes, lul. Here it is. (Fuck, i can't attache it) sec. Ahhhah, lul, "we don't support this type" Well, u can ask me for this .apk in telegram or gmail

hi bro! I am also Russian-speaking. How can you be found in a telegram?

Hey bro! Give your telegram or gmail info

GiamMaBasedResearchers commented 4 years ago

Other APK Source: https://giammaiot.blogspot.com/2020/03/link-to-learn-more-about-simjacker.html

periquillosarniento commented 4 years ago

i have the source code, it used to work but the last part isnt working because some numbering plan update its fixable, im looking to repair it somehow.

theapache64 commented 4 years ago

Feel free to create a PR :wink:

On 5/27/20, periquillosarniento notifications@github.com wrote:

i have the source code, it used to work but the last part isnt working because some numbering plan update its fixable, im looking to repair it somehow.

-- You are receiving this because you were mentioned. Reply to this email directly or view it on GitHub: https://github.com/theapache64/sim-jacker/issues/1#issuecomment-634204512

periquillosarniento commented 4 years ago

i have some wireshark caps, it gets stuck on the last part trying to send the info back. someone know about this?

periquillosarniento commented 4 years ago

ok this is what im gettin from wireshark, when i send the command the sim do most of the stuff but the last part, to send back the info asked.

00 D6 00 00 0B 3B 49 E2 89 33 04 50 7B 12 00 00 90 00 80 14 00 00 0D 81 03 01 13 01 02 02 82 81 83 02 35 32 91 0B 80 12 00 00 0B D0 09 81 03 01 02 00 82 02 81 82 90 00 80 14 00 00 0C 81 03 01 02 00 02 02 82 81 83 01 00 91 13 80 12 00 00 13 D0 11 81 03 01 27 00 82 02 81 82 24 01 08 25 03 00 10 00 90 00 80 14 00 00 0F 81 03 01 27 00 02 02 82 81 83 01 00 24 01 08 90 00 00 A4 08 04 04 7F FF 6F 5B 61 1E 00 C0 00 00 1E 62 1C 82 02 41 21 83 02 6F 5B A5 03 80 01 71 8A 01 05 8B 03 6F 06 06 80 02 00 06 88 01 78 90 00 00 D6 00 00 06 F0 00 0E F0 00 02 90 00

33 04 50 7B 12 00 00 -- > MCC, MNC, LAC , CELLID RESPONSE 7F FF 6F 5B-- > IDK WHAT THIS DOES BUT ACCES THIS SIM MEMORY ADDRESSES, SOME SIMCARDS DONT HAVE THIS MEMORY ADRESS ANYMORE IDK WHY

GiamMaBasedResearchers commented 4 years ago

hardware, software and firmware may be different...   https://osmocom.org/projects/simtrace/wiki/SIMtrace

Tit-7 commented 4 years ago

Hi guys! Have a good day everyone! I've got a good news, that I'm back. Fortunately, I'm alive, lool))0) What's new?

Tit-7 commented 4 years ago

Хорошо. Всякий раз, когда вы ищете новую информацию, я нашел интересный файл .apk. Эта программа отправляет невидимые сообщения на номер телефона, который вы пишете. В любом случае, можно перекодировать эту программу, чтобы отшлифовать другие коды, lul. Вот. (Черт, я не могу это прикрепить) сек. Ааа, Лул, «мы не поддерживаем этот тип». Ну, вы можете попросить меня об этом .apk в telegram или gmail.

Привет, брат! Я тоже русскоговорящий. Как вас найти в телеграмме?

Мой линк в телеграм @Living_in_fog

Tit-7 commented 4 years ago

Хорошо. Всякий раз, когда вы ищете новую информацию, я нашел интересный файл .apk. Эта программа отправляет невидимые сообщения на номер телефона, который вы пишете. В любом случае, можно перекодировать эту программу, чтобы отшлифовать другие коды, lul. Вот. (Черт, я не могу это прикрепить) сек. Ааа, Лул, «мы не поддерживаем этот тип». Ну, вы можете попросить меня об этом .apk в telegram или gmail.

Привет, брат! Я тоже русскоговорящий. Как вас найти в телеграмме?

Эй братан! Дайте свою телеграмму или информацию Gmail

Мой телеграм @Living_in_fog

poweredbycocaine commented 3 years ago

kinda late but good to join u guys

maikeruit commented 3 years ago

vulnerability simjacker is present in esim?

GiamMaBasedResearchers commented 3 years ago

If I'm not mistaken ... The anomaly seems to have been present since the birth of the esim technology. The manufacturers have simply changed the plastic support with a chip support to be soldered ... the mechanisms and technologies related to mobile networks have not changed, we will see with the 5g, which already has several bugs, what will happen ...

GiamMaBasedResearchers commented 3 years ago

the commercial 5g is the result of a mainly open source work based on some 5g codes, LTE, NBIoT, VoLTE and many other substrates present online in different reposostories ... nothing new .. nothing secret and perhaps too hasty.

GiamMaBasedResearchers commented 3 years ago

I couldn't find much information on the 6g but the chips have already been registered and produced for testing...

periquillosarniento commented 2 years ago

Feel free to create a PR 😉 On 5/27/20, periquillosarniento @.***> wrote: i have the source code, it used to work but the last part isnt working because some numbering plan update its fixable, im looking to repair it somehow. -- You are receiving this because you were mentioned. Reply to this email directly or view it on GitHub: #1 (comment)

apache are you still there? ive start trying to fix the source code for simjacker theres many versions of it (send sms with location info, do phone call, open browser) i got the first two ones as i wrote on the post, they stopped working after some numbering call update, i got simtrace and wireshark im gonna start fixing it can you help? or someone can?

Ilori-Jaiyeola commented 2 years ago

Feel free to create a PR 😉 On 5/27/20, periquillosarniento @.***> wrote: i have the source code, it used to work but the last part isnt working because some numbering plan update its fixable, im looking to repair it somehow. -- You are receiving this because you were mentioned. Reply to this email directly or view it on GitHub: #1 (comment)

apache are you still there? ive start trying to fix the source code for simjacker theres many versions of it (send sms with location info, do phone call, open browser) i got the first two ones as i wrote on the post, they stopped working after some numbering call update, i got simtrace and wireshark im gonna start fixing it can you help? or someone can?

@periquillosarniento Tell me what the issue is, I think I can help you out.

periquillosarniento commented 2 years ago

it stopped sending the sms response back, i have been testing it using simtrace2 http://shop.sysmocom.de/products/simtrace, the payload is send to the network and the phone receive it good, and some part of the command is executed ok (provide local information) after that theres the problem it wont send the response sms back.

Ilori-Jaiyeola commented 2 years ago

Can you paste the error here, let me get an insight of what is going on.

JAIYEOLA

periquillosarniento commented 2 years ago

ok this is what im gettin from wireshark, when i send the command the sim do most of the stuff but the last part, to send back the info asked.

00 D6 00 00 0B 3B 49 E2 89 33 04 50 7B 12 00 00 90 00 80 14 00 00 0D 81 03 01 13 01 02 02 82 81 83 02 35 32 91 0B 80 12 00 00 0B D0 09 81 03 01 02 00 82 02 81 82 90 00 80 14 00 00 0C 81 03 01 02 00 02 02 82 81 83 01 00 91 13 80 12 00 00 13 D0 11 81 03 01 27 00 82 02 81 82 24 01 08 25 03 00 10 00 90 00 80 14 00 00 0F 81 03 01 27 00 02 02 82 81 83 01 00 24 01 08 90 00 00 A4 08 04 04 7F FF 6F 5B 61 1E 00 C0 00 00 1E 62 1C 82 02 41 21 83 02 6F 5B A5 03 80 01 71 8A 01 05 8B 03 6F 06 06 80 02 00 06 88 01 78 90 00 00 D6 00 00 06 F0 00 0E F0 00 02 90 00

33 04 50 7B 12 00 00 -- > MCC, MNC, LAC , CELLID RESPONSE 7F FF 6F 5B-- > IDK WHAT THIS DOES BUT ACCES THIS SIM MEMORY ADDRESSES, SOME SIMCARDS DONT HAVE THIS MEMORY ADRESS ANYMORE IDK WHY

any ideas?

Iskandar-Khyon commented 2 years ago

It's not going to happen. Maybe an android phone which some moron (no implications) had enabled / disabled every security feature imaginable would be susceptible.

Geolocation is possible from just a text in some cases when sending to iPhone.

From what I've seen, the trick here is going to be finding a HLR / VLR provider who returns the SIM card IMSI/MSISDN key pair*

*I'm hunting for said SP who provides a lookup against the VLR (visitor location register). There seem to be a fair amount of providers offering this on the face of it, however thus far they've turned out to return just the IMEI).

If you're unfamiliar with these two above terms I've put a little info at the end of my reply (copied from a Google query response).

Gut instinct tells me it would have to be a pretty dodgy provider outside of "Westernised world" given how sensitive that info is. If you do find one, let's exchange info offline and not on here!

STAGE 1

So, solution time: you'd need to use something like Femtocell which would act in the same way as a signal booster, bit presents itself in the same way a cell tower does. See below

https://threatpost.com/verizon-femtocell-hack-intercepts-calls-data-transmissions/101309/

You'd need to be within reasonable proximity to your target. You can get femtocell device with several hundred meters of range for c£200

Any mobile phone device which you've configured (mainly based on network range (2G) and network (Voda, O2 etc)) will immediately jump onto your 'network' which is just acting as a signa booster and relaying to the nearest actual cell tower.

Now that the device (mobile) is relaying via you, you can easily grab all the SIM info you need to go to stage 2 (and can you intercept mesages at this point too, but are obviously restricted by locality)

STAGE 2

Grab yourself a SIM reader and blank SIM card from amazon for sub £30.

Signup with a HLR provider (a quick Google will be worth it if you're not familiar with this)

HLR the number to get the network**

Use your SIM reader / blank SIM and the SIM info you nobbled from your femtocell MITM and you're ready

**DO NOT REGISTER THE SIM ON THE SAME NETWORK AS THE TARGET. NOR DO YOU WANT TO BE ON THE SAME CELL TOWER / CENTRE***

It will instantly flag up as a duplicate and both your SIM and the EU will be locked.

There are legitimate reasons to have DUAL SIM cards, but for obvious reasons you may not want to broadcast your endeavours.

Roaming means that a user could in theory move tower / network but you can mitigate this down to realistically impossible

***See cell tower locator on Play Store. This gives you cell tower ID you are using in real-time. You'd get this at stage 1.

Bang the SIM into a mobile, power on, and any text messages or phone calls until the EU power cycles their mobile, or does a forced network reconnect (flight mode on / off) are coming to yours truly.

Now, picture this: at the moment you take over registration (there are no EU notifications that this has occurred) you enter their number in WhatsApp****, confirm it and say yet to receive the SMS 2FA SMS 😱) and 'Robert is your mother's brother' you are now in full command and have full access to the targets whatsapp account in history.

****There is a notification with this, so sensible timing would be applied.

IMEI vs. IMSI

IMEI stands for International Mobile Equipment Identity and is a unique number assigned to every mobile device including mobile phones, dongles, data cards etc. IMSI stands for International Mobile Subscriber Identity and is a unique number assigned to the SIM card used by the mobile device.

If you've found this useful, please like. If you would like more information on remote geolocation just comment and ask.

DISCLAIMER

All this information is for educational purposes only.

It is an offence under the Communications Act 2003 and Misuse of Computer Act 1990 to clone a SIM card and / or intercept communication not expressly intended for you without full, and explicit, consent from the end user.

Breaching either act can lead to significant custodial sentences.

Given the premeditatation and (some) effort involved, it is highly likely, even as a first time offender, that you would spend some time at her Majesty's pleasure if caught.

Some Metatags now

Femtocell, Mobile phone clone, cloning, SMS interception, mobile phone interception, MITM, Man in the middle, whatsapp, hacking, remote

secretanonimo2017 commented 2 years ago

todo esto me interesa, tuvieron buenos avances porque se detuvieron?

bbaranoff commented 2 years ago

Hello friends some news ? Screenshot_20220317-095311_YouTube At the top you have a sympathic payload i think https://www.slideshare.net/SergeyGordeychik/root-via-sms-4g-security-assessment https://www.youtube.com/watch?v=cxbdRR0bnCI https://conference.hitb.org/hitbsecconf2015ams/materials/D1T1%20-%20T.%20Yunusov%20K.%20Nesterov%20-%20Bootkit%20via%20SMS.pdf You have also Luca Bongiorni patent seems a good way to start 010007919 32350591211 0026 44 0c919 32390026xxxx 7ff6117042711404e113 0270 00000e0d 0021 0000b20000aabbccddee00 32350591211 - SMS center num 44 - SMS-DELIVER 32390026xxxx - Attacker's MSISDN 0270 - toolkit security header 0021 - security parameter indicator

Are you surprised of #SIMJacker attack?

Me not. Are almost 10 years that telco security folks are warning providers about SIMtoolkit related threats!

I used a similar attack in 2010 to get the MSISDN of a victim... https://t.co/6EJUDgrENp

ninbus16 commented 2 years ago

Well. Whenever you're looking for new info, i've found an interesting .apk file. This programm sands invisible messages to the phone number you write. Anyway, it's possible to recode this programm to sand other codes, lul. Here it is. (Fuck, i can't attache it) sec. Ahhhah, lul, "we don't support this type" Well, u can ask me for this .apk in telegram or gmail

hi bro! I am also Russian-speaking. How can you be found in a telegram?

Hi can you please give us your details to ask you?

jhonnybonny commented 1 year ago

Всем привет ) У кого то есть готовый скрипт для отправки этого бинарника ?

Hello friends some news ? Screenshot_20220317-095311_YouTube At the top you have a sympathic payload i think https://www.slideshare.net/SergeyGordeychik/root-via-sms-4g-security-assessment https://www.youtube.com/watch?v=cxbdRR0bnCI https://conference.hitb.org/hitbsecconf2015ams/materials/D1T1%20-%20T.%20Yunusov%20K.%20Nesterov%20-%20Bootkit%20via%20SMS.pdf You have also Luca Bongiorni patent seems a good way to start 010007919 32350591211 0026 44 0c919 32390026xxxx 7ff6117042711404e113 0270 00000e0d 0021 0000b20000aabbccddee00 32350591211 - SMS center num 44 - SMS-DELIVER 32390026xxxx - Attacker's MSISDN 0270 - toolkit security header 0021 - security parameter indicator

Are you surprised of #SIMJacker attack?

Me not. Are almost 10 years that telco security folks are warning providers about SIMtoolkit related threats!

I used a similar attack in 2010 to get the MSISDN of a victim... https://t.co/6EJUDgrENp

GLITCHhacking commented 1 year ago

مرحبا الرجال. أنا من روسيا. لقد انضممت إليك للتو ، ووجدت الكثير من المعلومات المهمة. حسنًا ، أنا أستخدم موضوع اختراق برنامج Telegram messenger من خلال جمع التحكم في sim. قبل ثلاثة أيام ، اكتشفت بعض المعلومات حول sim-jacker attac. لذا ، سأقوم بتحليل مشاركاتك هذه الليلة)) 0) في انتظار الأخبار ، يا شباب!

Can you send me a message on my e-mail I want to help him with some things and I have some things that may help you I will leave you the e-mail here it is (hackergroup366@gmail.com)

vovamaksimov581 commented 1 year ago

Этого не произойдет. Возможно, телефон Android, на котором какой-то придурок (никаких последствий) включил/отключил все мыслимые функции безопасности, был бы восприимчив.

Геолокация возможна только из текста в некоторых случаях при отправке на iPhone.

Из того, что я видел, хитрость здесь будет заключаться в том, чтобы найти поставщика HLR / VLR, который вернет пару ключей IMSI / MSISDN для SIM-карты *

  • Я ищу упомянутого SP, который обеспечивает поиск по VLR (регистр местоположений посетителей). Кажется, есть достаточное количество провайдеров, предлагающих это на первый взгляд, но до сих пор они возвращали только IMEI).

Если вы не знакомы с этими двумя терминами, приведенными выше, я добавил небольшую информацию в конце своего ответа (скопировано из ответа на запрос Google).

Интуиция подсказывает мне, что это должен быть довольно хитрый провайдер за пределами «вестернизированного мира», учитывая, насколько конфиденциальна эта информация. Если найдете, давайте обмениваться информацией офлайн, а не здесь!

ЭТАП 1

Итак, время решения: вам нужно будет использовать что-то вроде фемтосоты, которая будет действовать так же, как усилитель сигнала, но представляет себя так же, как вышка сотовой связи. Смотри ниже

https://threatpost.com/verizon-femtocell-hack-intercepts-calls-data-transmissions/101309/

Вы должны быть в разумной близости от цели. Вы можете получить фемтосотовое устройство с радиусом действия в несколько сотен метров за 200 фунтов стерлингов.

Любое мобильное телефонное устройство, которое вы настроили (в основном на основе диапазона сети (2G) и сети (Voda, O2 и т. д.)) немедленно подключится к вашей «сети», которая просто действует как усилитель сигналов и ретранслирует на ближайшую реальную соту. башня.

Теперь, когда устройство (мобильное) передает через вас, вы можете легко получить всю информацию о SIM-карте, необходимую для перехода к этапу 2 (и можете ли вы также перехватывать сообщения на этом этапе, но, очевидно, ограничены местоположением)

ЭТАП 2

Приобретите устройство для чтения SIM-карт и чистую SIM-карту от Amazon менее чем за 30 фунтов стерлингов.

Зарегистрируйтесь у поставщика HLR (быстрый Google будет стоить того, если вы не знакомы с этим)

HLR номер для подключения к сети**

Используйте свой SIM-ридер / пустую SIM-карту и информацию о SIM-карте, которую вы получили из своего фемтосотового MITM, и вы готовы

НЕ РЕГИСТРИРУЙТЕ SIM-карту В той же сети, что и цель. И ВЫ НЕ ХОТИТЕ НАХОДИТЬСЯ НА ОДНОЙ ВЫШКЕ СОТОВОЙ СВЯЗИ / ЦЕНТРЕ *

Он мгновенно будет отмечен как дубликат, и ваша SIM-карта и ЕС будут заблокированы.

Есть законные причины иметь DUAL SIM-карты, но по очевидным причинам вы можете не захотеть транслировать свои усилия.

Роуминг означает, что пользователь теоретически может перемещать башню/сеть, но вы можете уменьшить это до практически невозможного

*** См. локатор вышек сотовой связи в Play Store. Это дает вам идентификатор вышек сотовой связи, который вы используете в режиме реального времени. Вы получите это на этапе 1.

Вставьте SIM-карту в мобильный телефон, включите питание, и любые текстовые сообщения или телефонные звонки до тех пор, пока ЕС не выключит и не выключит свой мобильный телефон, или не произойдет принудительное переподключение к сети (режим полета вкл / выкл), не поступят к вам по-настоящему.

А теперь представьте себе: в момент, когда вы принимаете регистрацию (уведомлений ЕС о том, что это произошло, нет), вы вводите их номер в WhatsApp****, подтверждаете его и говорите, что еще не получили SMS 2FA SMS😱) и «Роберт - брат вашей матери», теперь вы полностью командуете и имеете полный доступ к целевой учетной записи WhatsApp в истории.

**** При этом есть уведомление, поэтому будет применено разумное время.

IMEI против IMSI

IMEI означает международный идентификатор мобильного оборудования и представляет собой уникальный номер, присваиваемый каждому мобильному устройству, включая мобильные телефоны, ключи, карты данных и т. д. IMSI означает международный идентификатор мобильного абонента и представляет собой уникальный номер, присваиваемый SIM-карте, используемой мобильным устройством.

Если вы нашли это полезным, пожалуйста, как. Если вам нужна дополнительная информация об удаленной геолокации, просто прокомментируйте и спросите.

ОТКАЗ ОТ ОТВЕТСТВЕННОСТИ

Вся эта информация предназначена только для образовательных целей.

В соответствии с Законом о связи 2003 г. и Законом о неправомерном использовании компьютеров 1990 г. клонирование SIM-карты и/или перехват сообщений, явно не предназначенных для вас, без полного и явного согласия конечного пользователя является правонарушением.

Нарушение любого акта может привести к серьезным приговорам к лишению свободы.

Учитывая преднамеренность и (некоторые) прилагаемые усилия, весьма вероятно, даже если вы совершили преступление впервые, вы проведете некоторое время в удовольствии Ее Величества, если вас поймают.

Некоторые метатеги сейчас

Femtocell, Клон мобильного телефона, клонирование, перехват СМС, перехват мобильного телефона, MITM, Человек посередине, whatsapp, взлом, удаленный

Greetings, I live in Ukraine, and I would like to know the complete shopping list, in this article, for a complete interception of access to a mobile device. Also, if possible, provide a link where I can buy all the equipment, and how to set it up correctly. I would be very grateful for your reply to my post.

bbaranoff commented 1 year ago

Hello friends got something new ! https://securitygrind.com/dissecting-sim-jacker-part-3-of-4-sim-tester/

trufa10008000 commented 11 months ago

i have the simjacker source code but it stopped working after some phone update(nothing related to the simjacker) can someone help me fixing it?

bbaranoff commented 11 months ago

Yes share the code lolSent from Android deviceLe 29 juil. 2023 19:23, trufa10008000 @.***> a écrit : i have the simjacker source code but it stopped working after some phone update(nothing related to the simjacker) can someone help me fixing it?

—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you were mentioned.Message ID: @.***>

trufa10008000 commented 11 months ago

sure any email to send it?

bbaranoff commented 11 months ago

Was a joke at begin 🤪 but yeah am interested @.***

Le sam. 29 juil. 2023, 21:51, trufa10008000 @.***> a écrit :

sure any email to send it?

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1656858151, or unsubscribe https://github.com/notifications/unsubscribe-auth/AI5HHZ7OGNZITKOVQUQIF23XSVSUVANCNFSM4IWJJVGA . You are receiving this because you were mentioned.Message ID: @.***>

trufa10008000 commented 11 months ago

i think we cant share emails here

http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail Libre de virus.www.avg.com http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>

El sáb, 29 jul 2023 a las 14:24, bastien baranoff @.***>) escribió:

Was a joke at begin 🤪 but yeah am interested @.***

Le sam. 29 juil. 2023, 21:51, trufa10008000 @.***> a écrit :

sure any email to send it?

— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1656858151>,

or unsubscribe < https://github.com/notifications/unsubscribe-auth/AI5HHZ7OGNZITKOVQUQIF23XSVSUVANCNFSM4IWJJVGA>

. You are receiving this because you were mentioned.Message ID: @.***>

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1656873174, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3KLWNH54FAFMNTUZO3XSVWO5ANCNFSM4IWJJVGA . You are receiving this because you commented.Message ID: @.***>

trufa10008000 commented 11 months ago

i think we cant share emails here http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail Libre de virus.www.avg.com http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2> El sáb, 29 jul 2023 a las 14:24, bastien baranoff @.>) escribió: Was a joke at begin 🤪 but yeah am interested @. Le sam. 29 juil. 2023, 21:51, trufa10008000 @.> a écrit : > sure any email to send it? > > — > Reply to this email directly, view it on GitHub > < #1 (comment)>, > or unsubscribe > < https://github.com/notifications/unsubscribe-auth/AI5HHZ7OGNZITKOVQUQIF23XSVSUVANCNFSM4IWJJVGA> > . > You are receiving this because you were mentioned.Message ID: > @.> > — Reply to this email directly, view it on GitHub <#1 (comment)>, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3KLWNH54FAFMNTUZO3XSVWO5ANCNFSM4IWJJVGA . You are receiving this because you commented.Message ID: @.***>

ok this mine trufitadog @ g --- com

smfai200 commented 10 months ago

Feel free to create a PR 😉 On 5/27/20, periquillosarniento @.***> wrote: i have the source code, it used to work but the last part isnt working because some numbering plan update its fixable, im looking to repair it somehow. -- You are receiving this because you were mentioned. Reply to this email directly or view it on GitHub: #1 (comment)

apache are you still there? ive start trying to fix the source code for simjacker theres many versions of it (send sms with location info, do phone call, open browser) i got the first two ones as i wrote on the post, they stopped working after some numbering call update, i got simtrace and wireshark im gonna start fixing it can you help? or someone can?

Hi, Can anyone share this code refered above?

trufa10008000 commented 10 months ago

Feel free to create a PR 😉 On 5/27/20, periquillosarniento @.***> wrote: i have the source code, it used to work but the last part isnt working because some numbering plan update its fixable, im looking to repair it somehow. -- You are receiving this because you were mentioned. Reply to this email directly or view it on GitHub: #1 (comment)

apache are you still there? ive start trying to fix the source code for simjacker theres many versions of it (send sms with location info, do phone call, open browser) i got the first two ones as i wrote on the post, they stopped working after some numbering call update, i got simtrace and wireshark im gonna start fixing it can you help? or someone can?

Hi, Can anyone share this code refered above?

Wanna help repairing? Send mail to trufitadog@ g m a i l. Com

DragonAriyan commented 9 months ago

Hi im looking for somthing like sim swap That fetches otp on victims phone

anyoneoruser commented 6 months ago

If you want to intercept the One Time Passwords of your victim, you can use the SS7 attack. To do it, you can use SigPloit. It contains some scripts that make you able to hack take over all the protocols used for provider interconnections(SS7, GTP, Diameter,LTE, SIP-T, etc...). The SigPloit scripts for SS7 hacking is wrote in JAVA and the others is wrote in Python.

⚠️Warning:it is not easy to find all the parameters that you give to the SigPloit SS7 hacking scripts⚠️

anyoneoruser commented 6 months ago

I am trying to create an all-in-one python package for using SigPloit easily. I want to do he have those advantages:

anyoneoruser commented 6 months ago

For the SIMJacker attack, i found this:

Capture d’écran 2023-12-10 à 17 40 20