theapache64 / sim-jacker

Source code for the new SIM card flaw which lets hijack any phone just by sending SMS - Source Code + Demo Video
https://simjacker.com/
Apache License 2.0
114 stars 19 forks source link

sim-jacker update #1

Open theapache64 opened 4 years ago

theapache64 commented 4 years ago

Website: https://simjacker.com :globe_with_meridians: News : https://thehackernews.com/2019/09/simjacker-mobile-hacking.html :newspaper: Reddit : https://www.reddit.com/r/simjacking

What do you have ?

trufa10008000 commented 6 months ago

It was working good 100% i used it since 2005 till 2019 2020 but after some numberin marcation update it stopped working first stopped working for telcel company, but i changed the smsc to at&t compani amd it worked again but then the numbering marcation changed for all main companys here and stopped working, i think it still work but it have to be send from a outside company smsc.

El mar., 2 de enero de 2024 1:36 p. m., alberto felizardo < @.***> escribió:

This way you only need the target phone number and the number to receive the sms wit the target info

El mar., 2 de enero de 2024 1:35 p. m., alberto felizardo < @.***> escribió:

Let me explain how the simjacker works the simcard internalli have something called toolkit application its like an internal browrer that execute commands from the sim carrier via OTA(over the air) you can send the simjacker command from the smsc carrier and it resend the sms to the victim and the victim phone send the info asked back as sms to the phone number you desire

El mar., 2 de enero de 2024 1:31 p. m., alberto felizardo < @.***> escribió:

Ita easy to get tatger ip he just need to use whatsap or any message app all apps need to connect p2p to transfer files or voipcalls it discloses target ip

El mar., 2 de enero de 2024 6:07 a. m., anyoneoruser < @.***> escribió:

To create a SIMJacker python program, you can try the pysimcard https://pypi.org/project/pysimcard/ librairy. To get the target IMSI number, it is possible to use an SS7 attack. I have found an IMSI catcher here https://github.com/orgs/SigPloit/repositories. SendIMSI.jar.zip https://github.com/theapache64/sim-jacker/files/13809345/SendIMSI.jar.zip To run it, download java here https://www.java.com/download/ie_manual.jsp if you don't have it and type the following command in your terminal:

java -jar SendIMSI.jar

Note that it will need 2 hard-to-get parameters (target IP address and your Global Title) to setup the IMSI catcher. But this is the value of the parameters that never change:

██████████@██████████ simsi % java -jar SendIMSI.jar


Frauding Target


[]Set Client PC: 1 []Set Peer PC: 2 []Set Client IP: []Set Client Port: 23481 []Set Peer IP: <your target public IP address(hard-to-get parameter)> []Set Peer Port: 4446 []Set Network Indicator [0] International [1] National: 0 []Set Target's MSISDN: <your target phone number(e.g +201150508833)> [*]Set your GT: <your Global Title(hard-to-get parameter)>

To get your Global Title, try to create a webpage that send you the content of the navigator global variable and connecting to mobile data an then opening this "phishing" page on your phone, maybe you will find your Global Title in the content that the webpage sent you. For the ICCID, i have some infos here https://www.imei.info/faq-what-is-ICCID/.

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1873947395, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3JAQGBXFXNC7CNMFQ3YMP2BVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGM4TINZTHE2Q . You are receiving this because you were mentioned.Message ID: @.***>

trufa10008000 commented 6 months ago

Thats what i need help, someone out from this country to send the sms tho a phone from country and see if the phone responds to the sms

El mar., 2 de enero de 2024 1:39 p. m., alberto felizardo < @.***> escribió:

It was working good 100% i used it since 2005 till 2019 2020 but after some numberin marcation update it stopped working first stopped working for telcel company, but i changed the smsc to at&t compani amd it worked again but then the numbering marcation changed for all main companys here and stopped working, i think it still work but it have to be send from a outside company smsc.

El mar., 2 de enero de 2024 1:36 p. m., alberto felizardo < @.***> escribió:

This way you only need the target phone number and the number to receive the sms wit the target info

El mar., 2 de enero de 2024 1:35 p. m., alberto felizardo < @.***> escribió:

Let me explain how the simjacker works the simcard internalli have something called toolkit application its like an internal browrer that execute commands from the sim carrier via OTA(over the air) you can send the simjacker command from the smsc carrier and it resend the sms to the victim and the victim phone send the info asked back as sms to the phone number you desire

El mar., 2 de enero de 2024 1:31 p. m., alberto felizardo < @.***> escribió:

Ita easy to get tatger ip he just need to use whatsap or any message app all apps need to connect p2p to transfer files or voipcalls it discloses target ip

El mar., 2 de enero de 2024 6:07 a. m., anyoneoruser < @.***> escribió:

To create a SIMJacker python program, you can try the pysimcard https://pypi.org/project/pysimcard/ librairy. To get the target IMSI number, it is possible to use an SS7 attack. I have found an IMSI catcher here https://github.com/orgs/SigPloit/repositories. SendIMSI.jar.zip https://github.com/theapache64/sim-jacker/files/13809345/SendIMSI.jar.zip To run it, download java here https://www.java.com/download/ie_manual.jsp if you don't have it and type the following command in your terminal:

java -jar SendIMSI.jar

Note that it will need 2 hard-to-get parameters (target IP address and your Global Title) to setup the IMSI catcher. But this is the value of the parameters that never change:

██████████@██████████ simsi % java -jar SendIMSI.jar


Frauding Target


[]Set Client PC: 1 []Set Peer PC: 2 []Set Client IP: []Set Client Port: 23481 []Set Peer IP: <your target public IP address(hard-to-get parameter)> []Set Peer Port: 4446 []Set Network Indicator [0] International [1] National: 0 []Set Target's MSISDN: <your target phone number(e.g +201150508833)> [*]Set your GT: <your Global Title(hard-to-get parameter)>

To get your Global Title, try to create a webpage that send you the content of the navigator global variable and connecting to mobile data an then opening this "phishing" page on your phone, maybe you will find your Global Title in the content that the webpage sent you. For the ICCID, i have some infos here https://www.imei.info/faq-what-is-ICCID/.

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1873947395, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3JAQGBXFXNC7CNMFQ3YMP2BVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGM4TINZTHE2Q . You are receiving this because you were mentioned.Message ID: @.***>

Ilori-Jaiyeola commented 6 months ago

Let's make an attempt from my country to see if it will work

On Tue, Jan 2, 2024, 20:43 trufa10008000 @.***> wrote:

Thats what i need help, someone out from this country to send the sms tho a phone from country and see if the phone responds to the sms

El mar., 2 de enero de 2024 1:39 p. m., alberto felizardo < @.***> escribió:

It was working good 100% i used it since 2005 till 2019 2020 but after some numberin marcation update it stopped working first stopped working for telcel company, but i changed the smsc to at&t compani amd it worked again but then the numbering marcation changed for all main companys here and stopped working, i think it still work but it have to be send from a outside company smsc.

El mar., 2 de enero de 2024 1:36 p. m., alberto felizardo < @.***> escribió:

This way you only need the target phone number and the number to receive the sms wit the target info

El mar., 2 de enero de 2024 1:35 p. m., alberto felizardo < @.***> escribió:

Let me explain how the simjacker works the simcard internalli have something called toolkit application its like an internal browrer that execute commands from the sim carrier via OTA(over the air) you can send the simjacker command from the smsc carrier and it resend the sms to the victim and the victim phone send the info asked back as sms to the phone number you desire

El mar., 2 de enero de 2024 1:31 p. m., alberto felizardo < @.***> escribió:

Ita easy to get tatger ip he just need to use whatsap or any message app all apps need to connect p2p to transfer files or voipcalls it discloses target ip

El mar., 2 de enero de 2024 6:07 a. m., anyoneoruser < @.***> escribió:

To create a SIMJacker python program, you can try the pysimcard https://pypi.org/project/pysimcard/ librairy. To get the target IMSI number, it is possible to use an SS7 attack. I have found an IMSI catcher here https://github.com/orgs/SigPloit/repositories. SendIMSI.jar.zip < https://github.com/theapache64/sim-jacker/files/13809345/SendIMSI.jar.zip>

To run it, download java here https://www.java.com/download/ie_manual.jsp if you don't have it and type the following command in your terminal:

java -jar SendIMSI.jar

Note that it will need 2 hard-to-get parameters (target IP address and your Global Title) to setup the IMSI catcher. But this is the value of the parameters that never change:

██████████@██████████ simsi % java -jar SendIMSI.jar


Frauding Target


[]Set Client PC: 1 []Set Peer PC: 2 []Set Client IP: []Set Client Port: 23481 []Set Peer IP: <your target public IP address(hard-to-get parameter)> []Set Peer Port: 4446 []Set Network Indicator [0] International [1] National: 0 []Set Target's MSISDN: <your target phone number(e.g +201150508833)> [*]Set your GT: <your Global Title(hard-to-get parameter)>

To get your Global Title, try to create a webpage that send you the content of the navigator global variable and connecting to mobile data an then opening this "phishing" page on your phone, maybe you will find your Global Title in the content that the webpage sent you. For the ICCID, i have some infos here https://www.imei.info/faq-what-is-ICCID/.

— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1873947395>,

or unsubscribe < https://github.com/notifications/unsubscribe-auth/BBTCG3JAQGBXFXNC7CNMFQ3YMP2BVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGM4TINZTHE2Q>

. You are receiving this because you were mentioned.Message ID: @.***>

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874467132, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKAEPK6ANPBVK237G6M3GL3YMRPNZAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ2DMNZRGMZA . You are receiving this because you were mentioned.Message ID: @.***>

trufa10008000 commented 6 months ago

sure one sec we have to adjust the parameters so it can be send from your country smsc we need the smsc number its easy to get usually its used to send the sms let me make a note explaining all teh needed stuff to make it work

http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail Virus-free.www.avg.com http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail <#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>

El mar, 2 ene 2024 a las 15:00, Ilori-Jaiyeola @.***>) escribió:

Let's make an attempt from my country to see if it will work

On Tue, Jan 2, 2024, 20:43 trufa10008000 @.***> wrote:

Thats what i need help, someone out from this country to send the sms tho a phone from country and see if the phone responds to the sms

El mar., 2 de enero de 2024 1:39 p. m., alberto felizardo < @.***> escribió:

It was working good 100% i used it since 2005 till 2019 2020 but after some numberin marcation update it stopped working first stopped working for telcel company, but i changed the smsc to at&t compani amd it worked again but then the numbering marcation changed for all main companys here and stopped working, i think it still work but it have to be send from a outside company smsc.

El mar., 2 de enero de 2024 1:36 p. m., alberto felizardo < @.***> escribió:

This way you only need the target phone number and the number to receive the sms wit the target info

El mar., 2 de enero de 2024 1:35 p. m., alberto felizardo < @.***> escribió:

Let me explain how the simjacker works the simcard internalli have something called toolkit application its like an internal browrer that execute commands from the sim carrier via OTA(over the air) you can send the simjacker command from the smsc carrier and it resend the sms to the victim and the victim phone send the info asked back as sms to the phone number you desire

El mar., 2 de enero de 2024 1:31 p. m., alberto felizardo < @.***> escribió:

Ita easy to get tatger ip he just need to use whatsap or any message app all apps need to connect p2p to transfer files or voipcalls it discloses target ip

El mar., 2 de enero de 2024 6:07 a. m., anyoneoruser < @.***> escribió:

To create a SIMJacker python program, you can try the pysimcard https://pypi.org/project/pysimcard/ librairy. To get the target IMSI number, it is possible to use an SS7 attack. I have found an IMSI catcher here https://github.com/orgs/SigPloit/repositories. SendIMSI.jar.zip <

https://github.com/theapache64/sim-jacker/files/13809345/SendIMSI.jar.zip>

To run it, download java here https://www.java.com/download/ie_manual.jsp if you don't have it and type the following command in your terminal:

java -jar SendIMSI.jar

Note that it will need 2 hard-to-get parameters (target IP address and your Global Title) to setup the IMSI catcher. But this is the value of the parameters that never change:

██████████@██████████ simsi % java -jar SendIMSI.jar


Frauding Target


[]Set Client PC: 1 []Set Peer PC: 2 []Set Client IP: []Set Client Port: 23481 []Set Peer IP: <your target public IP address(hard-to-get parameter)> []Set Peer Port: 4446 []Set Network Indicator [0] International [1] National: 0 []Set Target's MSISDN: <your target phone number(e.g +201150508833)> [*]Set your GT: <your Global Title(hard-to-get parameter)>

To get your Global Title, try to create a webpage that send you the content of the navigator global variable and connecting to mobile data an then opening this "phishing" page on your phone, maybe you will find your Global Title in the content that the webpage sent you. For the ICCID, i have some infos here https://www.imei.info/faq-what-is-ICCID/.

— Reply to this email directly, view it on GitHub <

https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1873947395>,

or unsubscribe <

https://github.com/notifications/unsubscribe-auth/BBTCG3JAQGBXFXNC7CNMFQ3YMP2BVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGM4TINZTHE2Q>

. You are receiving this because you were mentioned.Message ID: @.***>

— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874467132>,

or unsubscribe < https://github.com/notifications/unsubscribe-auth/AKAEPK6ANPBVK237G6M3GL3YMRPNZAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ2DMNZRGMZA>

. You are receiving this because you were mentioned.Message ID: @.***>

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874554179, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3JGKRDGB5P7XCMELT3YMRYNXAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ2TKNBRG44Q . You are receiving this because you were mentioned.Message ID: @.***>

anyoneoruser commented 6 months ago

I have found a fuzzer in on github in the SigPloit diameter module: fuzzer.py.zip This is an example of use(from a python script that need to be in the same folder):

# packages import
from fuzzer import Fuzzer
fuzzer=Fuzzer()# create a fuzzer
# class testing
"""
You can now use the following methods to get the object information:getSQPStrings, getXSSStrings, getLDAPInjectionStrings, getXPATHInjectionStrings, getXMLInjectionStrings and getPathTraversalStrings(limit=10).
You can also use the following methods to generate random things:getRandomHTMLStrings(min_tags=5, max_tags=20), getRandomString(regexp=None, minLen=5, maxLen=50) and getRandomStrings(regexp=None, minLen=5, maxLen=50, num = 50)
To finish, they have 2 methods that you can use to operate some tasks related to diameter networking:getAddress and getDiamIdentities(fqdn, proto = ["diameter", "radius","tacacs+","kerberos"], transport = ["tcp", "sctp", "udp", "icmp", "gre"])
"""

So if the attacking scripts stop working, you can try fuzzing.

Ilori-Jaiyeola commented 6 months ago

I am in Nigeria

On Wed, Jan 3, 2024, 05:49 anyoneoruser @.***> wrote:

I have found a fuzzer in on github in the SigPloit https://github.com/orgs/SigPloit/repositories diameter module: fuzzer.py.zip https://github.com/theapache64/sim-jacker/files/13815694/fuzzer.py.zip This is an example of use(from a python script that need to be in the same folder:

packages importfrom fuzzer import Fuzzerfuzzer=Fuzzer()# create a fuzzer# class testing"""You can now use the following methods to get the object information:getSQPStrings, getXSSStrings, getLDAPInjectionStrings, getXPATHInjectionStrings, getXMLInjectionStrings and getPathTraversalStrings(limit=10).You can also use the following methods to generate random things:getRandomHTMLStrings(min_tags=5, max_tags=20), getRandomString(regexp=None, minLen=5, maxLen=50) and getRandomStrings(regexp=None, minLen=5, maxLen=50, num = 50)To finish, they have 2 methods that you can use to operate some tasks related to diameter networking:getAddress and getDiamIdentities(fqdn, proto = ["diameter", "radius","tacacs+","kerberos"], transport = ["tcp", "sctp", "udp", "icmp", "gre"])"""

So if the attacking scripts stop working, you can try fuzzing.

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874845595, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKAEPKY6R66COZKXE2HUXKLYMTPODAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ4DINJVHE2Q . You are receiving this because you were mentioned.Message ID: @.***>

anyoneoruser commented 6 months ago

Thank you, @trufa10008000. I have done a mistake. I think that pysimcard is adapted for internet providers but not for SIMJacker. Pysim may be better.

Le mer. 3 janv. 2024 à 12:26, Ilori-Jaiyeola @.***> a écrit :

I am in Nigeria

On Wed, Jan 3, 2024, 05:49 anyoneoruser @.***> wrote:

I have found a fuzzer in on github in the SigPloit https://github.com/orgs/SigPloit/repositories diameter module: fuzzer.py.zip https://github.com/theapache64/sim-jacker/files/13815694/fuzzer.py.zip

This is an example of use(from a python script that need to be in the same folder:

packages importfrom fuzzer import Fuzzerfuzzer=Fuzzer()# create a

fuzzer# class testing"""You can now use the following methods to get the object information:getSQPStrings, getXSSStrings, getLDAPInjectionStrings, getXPATHInjectionStrings, getXMLInjectionStrings and getPathTraversalStrings(limit=10).You can also use the following methods to generate random things:getRandomHTMLStrings(min_tags=5, max_tags=20), getRandomString(regexp=None, minLen=5, maxLen=50) and getRandomStrings(regexp=None, minLen=5, maxLen=50, num = 50)To finish, they have 2 methods that you can use to operate some tasks related to diameter networking:getAddress and getDiamIdentities(fqdn, proto = ["diameter", "radius","tacacs+","kerberos"], transport = ["tcp", "sctp", "udp", "icmp", "gre"])"""

So if the attacking scripts stop working, you can try fuzzing.

— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874845595>,

or unsubscribe < https://github.com/notifications/unsubscribe-auth/AKAEPKY6R66COZKXE2HUXKLYMTPODAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ4DINJVHE2Q>

. You are receiving this because you were mentioned.Message ID: @.***>

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1875065604, or unsubscribe https://github.com/notifications/unsubscribe-auth/BALQDLT6EJTRLKINSNY3AYLYMUP27AVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGUYDMNJWGA2A . You are receiving this because you commented.Message ID: @.***>

trufa10008000 commented 6 months ago

Dont worry we can make both work, i about togo home then i can male the documento explaining the stuff

El mié., 3 de enero de 2024 6:29 a. m., anyoneoruser < @.***> escribió:

Thank you, @trufa10008000. I have done a mistake. I think that pysimcard is adapted for internet providers but not for SIMJacker. Pysim https://pypi.org/project/pysim/ may be better. Here https://doc.pysim.org/tutorial.html is the pysim docs.

Le mer. 3 janv. 2024 à 12:26, Ilori-Jaiyeola @.***> a écrit :

I am in Nigeria

On Wed, Jan 3, 2024, 05:49 anyoneoruser @.***> wrote:

I have found a fuzzer in on github in the SigPloit https://github.com/orgs/SigPloit/repositories diameter module: fuzzer.py.zip < https://github.com/theapache64/sim-jacker/files/13815694/fuzzer.py.zip>

This is an example of use(from a python script that need to be in the same folder:

packages importfrom fuzzer import Fuzzerfuzzer=Fuzzer()# create a

fuzzer# class testing"""You can now use the following methods to get the object information:getSQPStrings, getXSSStrings, getLDAPInjectionStrings, getXPATHInjectionStrings, getXMLInjectionStrings and getPathTraversalStrings(limit=10).You can also use the following methods to generate random things:getRandomHTMLStrings(min_tags=5, max_tags=20), getRandomString(regexp=None, minLen=5, maxLen=50) and getRandomStrings(regexp=None, minLen=5, maxLen=50, num = 50)To finish, they have 2 methods that you can use to operate some tasks related to diameter networking:getAddress and getDiamIdentities(fqdn, proto = ["diameter", "radius","tacacs+","kerberos"], transport = ["tcp", "sctp", "udp", "icmp", "gre"])"""

So if the attacking scripts stop working, you can try fuzzing.

— Reply to this email directly, view it on GitHub <

https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1874845595>,

or unsubscribe <

https://github.com/notifications/unsubscribe-auth/AKAEPKY6R66COZKXE2HUXKLYMTPODAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGQ4DINJVHE2Q>

. You are receiving this because you were mentioned.Message ID: @.***>

— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1875065604>,

or unsubscribe < https://github.com/notifications/unsubscribe-auth/BALQDLT6EJTRLKINSNY3AYLYMUP27AVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGUYDMNJWGA2A>

. You are receiving this because you commented.Message ID: @.***>

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1875297571, or unsubscribe https://github.com/notifications/unsubscribe-auth/BBTCG3I2OKRTJRK4VXUVNDTYMVFI7AVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGUZDSNZVG4YQ . You are receiving this because you were mentioned.Message ID: @.***>

usman79h commented 6 months ago

Made a video about loading an STK applet on sim with ShadySim https://youtu.be/F55eJr40CoQ

Video is unavailable can send me on my email please

usman79h commented 6 months ago

Video is unavailable can send me on my email please my email address yyy11155t@gmail.com

DragonAriyan commented 6 months ago

Video unavailable, send me here on @.***

On Sun, 28 Jan 2024, 3:43 pm usman79h, @.***> wrote:

Video is unavailable can send me on my email please my email address @.***

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1913551232, or unsubscribe https://github.com/notifications/unsubscribe-auth/BCE5HCH6N2Z7S5CIUWXYLZLYQYTWVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJRGM2TKMJSGMZA . You are receiving this because you commented.Message ID: @.***>

usman79h commented 6 months ago

Can you send me demo (video) please

On Sun, 28 Jan 2024, 3:53 pm DragonAriyan, @.***> wrote:

Video unavailable, send me here on @.***

On Sun, 28 Jan 2024, 3:43 pm usman79h, @.***> wrote:

Video is unavailable can send me on my email please my email address @.***

— Reply to this email directly, view it on GitHub < https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1913551232>,

or unsubscribe < https://github.com/notifications/unsubscribe-auth/BCE5HCH6N2Z7S5CIUWXYLZLYQYTWVAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJRGM2TKMJSGMZA>

. You are receiving this because you commented.Message ID: @.***>

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-1913553485, or unsubscribe https://github.com/notifications/unsubscribe-auth/BEXEPZNCEXOFC4EHUHTMQY3YQYU3JAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOJRGM2TKMZUHA2Q . You are receiving this because you commented.Message ID: @.***>

anyoneoruser commented 4 months ago

You can also use javacard with sim.toolkit, pythoncard or pysim(not the python pakage that is made for simulation).

smfai200 commented 4 months ago

Do Anyone have any working POC of this? like Source code/ App to send APDU Messages and a detailed guide on how to send it and how to find the binary to get location details in response?

periquillosarniento commented 3 months ago

im back guys sorry had to travel far, lets continue with the stuff please help fixing it

anyoneoruser commented 3 months ago

Look at what i wrote on github, there is links to what you are searching for.

Le mardi 2 avril 2024, periquillosarniento @.***> a écrit :

im back guys sorry had to travel far, lets continue with the stuff please help fixing it

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-2032611399, or unsubscribe https://github.com/notifications/unsubscribe-auth/BALQDLRS45WVB3ZJSDGHVQTY3LRTTAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TEMBTGI3DCMJTHE4Q . You are receiving this because you commented.Message ID: @.***>

DragonAriyan commented 3 months ago

So Y'all can tell me from what to what our chat became? have we finally got sim jacking?

trufa10008000 commented 3 months ago

i have the code but stopped working from my country(if send from telco local), still working from diferent countrys. help fixing?

DragonAriyan commented 3 months ago

What Youre using? twillio?

smfai200 commented 3 months ago

Finally, I've been able to send Binary PDU Messages and i have identified a network over which they aren't blocked yet. So Now comming over to the question, How to exploit it further? Currently I sended a binary message:

0041000B912143658709F07FF63802700000330D0000000050534800000000000042230121020744382E3130353105160604313035312D0C1003830607912143658709F02B00

2143658709F0 means the phone number is (123) 45678900

It flashed on the target phone with Invalide Incomming Message! How to further exploit it ?

trufa10008000 commented 3 months ago

ok wanna get in contact to change the code to get further stuff? any email? or private chat? i got the codes and know how to change them

smfai200 commented 3 months ago

ok wanna get in contact to change the code to get further stuff? any email? or private chat? i got the codes and know how to change them

Sure. I've emailed you on this for further collaboration. I'm lacking simtrace actually which is restricting me from further testing.

smfai200 commented 3 months ago

ok wanna get in contact to change the code to get further stuff? any email? or private chat? i got the codes and know how to change them

I have created a community on Discord for this. Everyone can join in so that a compiled form of efforts results in benefit to everyone on the open source community!

https://discord.gg/XS2s4NUW

everydaze commented 1 month ago

Hi Everyone! I find simjacker to be fascinating. This is a great project. I was hoping to join you on both here and on discord if invites are still possible.

Thank you!

Ilori-Jaiyeola commented 1 month ago

Of course you can join us on discord

On Fri, Jun 7, 2024, 06:14 everydaze @.***> wrote:

Hi Everyone! I find simjacker to be fascinating. This is a great project. I was hoping to join you on both here and on discord if invites are still possible.

Thank you!

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-2154039343, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKAEPK7CP4HBXVVRKBXCMILZGE6UNAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TEMJVGQYDGOJTGQZQ . You are receiving this because you were mentioned.Message ID: @.***>

everydaze commented 1 month ago

Thank you so much! May I have a new invite for discord please?

The one listed has expired.

Thank you!

Sent from Proton Mail for iOS

On Fri, Jun 7, 2024 at 4:56 AM, Ilori-Jaiyeola @.***(mailto:On Fri, Jun 7, 2024 at 4:56 AM, Ilori-Jaiyeola < wrote:

Of course you can join us on discord

On Fri, Jun 7, 2024, 06:14 everydaze @.***> wrote:

Hi Everyone! I find simjacker to be fascinating. This is a great project. I was hoping to join you on both here and on discord if invites are still possible.

Thank you!

— Reply to this email directly, view it on GitHub https://github.com/theapache64/sim-jacker/issues/1#issuecomment-2154039343, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKAEPK7CP4HBXVVRKBXCMILZGE6UNAVCNFSM4IWJJVGKU5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TEMJVGQYDGOJTGQZQ . You are receiving this because you were mentioned.Message ID: @.***>

— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you commented.Message ID: @.***>

everydaze commented 1 week ago

Any chance someone can send me a current discord invite please? I'd like to join the group and share whatever I can contribute. Thank you

DragonAriyan commented 1 day ago

Is this still active? OR where the regular discussion is going on?