[ HQ ] ☣️⚡ ⎝⎝ SIM CARD HACKING METHODS PART1 ⎠⎠

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas : 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

mrdoxer ▄︻̷ ┻ ═━一

Well-known member
Feb 23, 2024
Threads
14
112
63
Credits
766
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD

Step 1: Remove the SIM from the phone, place it in the card reader, click read from the card in magic SIM.
When it displays ‘connected’, select crack SIM in the toolbar.

Step 2: Click strong KI and select all of the other find options and then click start.

Once your KI is found and the crack is finished, click the file, save as and save your cracked SIM info to a file.

Step 3: You must click disconnect from the file menu or you will ruin your SIM card. [Important, Otherwise SIM will crack]
Step 4: Once it says disconnected. Remove the SIM. Put the SIM in your phone and see if it still works, it should.

(If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)

Unlock SIM Card

Go to phone tools, select SIM card, then select unlock SIM, it will prompt for a code.

Call network provider, they will ask for your phone number, your account info, name, and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.

Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.
Step 5: Insert blank SIM card and open USB SIM Card Reader Software not magic SIM at this point.
Step 6: Click connect. It should say ‘No Info Found’ if it is truly blank.
Step 7: Select write to SIM, it will prompt you to select a .dat file, select the one you saved earlier.
Step 8: Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click Finish.


DONE: You have successfully cloned a SIM Card.

SIMCARD CLONING TOOLS:​

Please, Log in or Register to view URLs content!
(
Please, Log in or Register to view URLs content!
)

SIMCARD CLONING DEVICES:
IMG_20240309_131647.jpg

[align=start]
Please, Log in or Register to view URLs content!

$10
[align=start
[/QUOTE]
-10430108721072074122.jpg
-538411222489896955.jpg
-835558597262995049.jpg
Please, Log in or Register to view URLs content!
Please, Log in or Register to view URLs content!


]
Please, Log in or Register to view URLs content!


Please, Log in or Register to view URLs content!
(
Please, Log in or Register to view URLs content!
)

TRICKS

Here I am going to share a simple trick for block your enemy sim card,Blocking a sim card is too simple.
Dial the below code in the desired phone :- 04*3814*7529*68243#
Entering of above code will ask you to enter the PUK code.
To get PUK Code just call customer care and get your PUK code.

Note : Entering of invalid PUK will cause permanent blocking of your SIM!
For Educational Purpose Only!
Try At Your Own Risk!


ICCID explained
An ICCID (Integrated Circuit Card Identifier) is a globally unique classifier that can be used to identify SIM hardware (most prominently physical SIM cards). This 19 to 20 character-long number is stored digitally, but typically also physically engraved into the SIM card's body. The ICCID may sound similar to an IMEI, but both are used to identify entirely different components. Physical eSIMs have an eUICCID, which is a different classifier; however, they are typically also assigned an ICCID.

What is the difference between an ICCID, IMSI, and IMEI?
The ICCID was conceived to identify all SIM hardware. However, there are other identifiers that are used for mobile network equipment. The most prominent ones are IMSI and IMEI:
IMSI
The IMSI (International Mobile Subscriber Identity) number is what cellular networks used to identify a specific subscription that is included as part of your data plan. Every time a device wants to establish a connection to the network, the network will identify the device by the IMSI. While this may sound similar to ICCID, both of these identifiers were conceived to identify different entities. The ICCID is used to identify the SIM Hardware, while the IMSI is used to identify the type of connectivity service.

IMEI
The IMEI (International Mobile Equipment Identity) number is typically printed on the batter component of any device with networking capabilities. It is a unique identifier for each device and is checked against a worldwide IMEI database when connected.

eSIMs and eUICCIDs
With the emergence of eSIMs (embedded subscriber identity module) a new identification number, known as the eUICCID number, has been established. A company may want to manufacture physical eSIMs but also generate and sell eSIM profiles. In some cases, these carriers will collaborate with other providers in order to create eSIM profiles, which means multiple parties may be involved in the creation of an eSIM. To simplify this situation and avoid confusion, the networking industry has created the eUICCID to identify physical eSIMs separately. The eUICCID number is an entirely different and unique classifier, however, an ICCID is typically still created along with the eSIM profile.


ICCID/SIM Card Number Checker/Decoder
To help you to obtain detailed information from the ICCID (Integrated Circuit Card Identifier) number, or SIM (Subscriber Identity Module) card number, FYIcenter.com has designed this online tool. All you need to do is to enter an ICCID/SIM Card Number in the form below, and click the "Decode" button. Detailed information of the ICCID/SIM Card Number will be presented in the result area.

Please, Log in or Register to view URLs content!
(
Please, Log in or Register to view URLs content!
)
 
Last edited:
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



TRICKS



thank you bro
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



TRICKS



S
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



TRICKS



View
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



TRICKS



kduukykdkydkkdk
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



TRICKS



rwrarararrrrrrrrrafdd
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



TRICKS



thank you
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



TRICKS



thnk y
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



SIMCARD CLONING DEVICES:
View attachment 1159

[align=start]
Please, Log in or Register to view URLs content!

[align=start
[/QUOTE]



TRICKS


good informations
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



SIMCARD CLONING DEVICES:
View attachment 1159

[align=start]
Please, Log in or Register to view URLs content!

[align=start
[/QUOTE]



TRICKS


good
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



SIMCARD CLONING DEVICES:
View attachment 1159

[align=start]
Please, Log in or Register to view URLs content!

[align=start
[/QUOTE]



TRICKS


goood
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



SIMCARD CLONING DEVICES:
View attachment 1159

[align=start]
Please, Log in or Register to view URLs content!

$10
[align=start
[/QUOTE]
View attachment 1160
View attachment 1161
View attachment 1162
Please, Log in or Register to view URLs content!
Please, Log in or Register to view URLs content!




TRICKS


trickyyyy
 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



SIMCARD CLONING DEVICES:
View attachment 1159

[align=start]
Please, Log in or Register to view URLs content!

$10
[align=start
[/QUOTE]
View attachment 1160
View attachment 1161
View attachment 1162
Please, Log in or Register to view URLs content!
Please, Log in or Register to view URLs content!




TRICKS


 
1 : SIMJacker Attack
Due to your increasing personal and financial information tied to your online identity, attacks and hackings of phone numbers are more likely to occur. According to AdaptiveMobile Security, which is a company specialized in mobile phone security, the attack takes place through a defect and a gap in the SIM cards called (SIMJaker). This is capable of opening a back door for the hackers to attack the SIM card, and short SMS is enough to do the mission.

How Does It Happen?

SIMJacker attack starts with an attacker sending an SMS to your smartphone. This SMS contains a link to a browser or a specific code commanding the SIM to disclose some data or to help control the device using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. It is worth mentioning that such a process happens silently, not noticeable to you. Also, the SIMJacker hack is not limited to a specific operating system, and all types of phones are at risk, including smartphones that run on Android and iPhone.

The information pulled out from your SIM card contains your cell-ID which can determine your location and some specific device information like the IMEI from the handset. After that, the attack sends the data to a device other than the one from which the attacker sends the SMS in the hacking process. Then the attacker will be able to spy on your phone calls, steal your credits or hijack your bank accounts when linking your email to your phone number.

2 : SIM Swap Attacks

Hackers did compromise the personal account of Jack Dorsey, CEO and co-founder of Twitter. The penetration of Jack’s phone number linked to the account allowed the hackers to post a hail of offensive tweets for 15 minutes.

How Did the Hack Happen?

This hack is called “SIM Splitting or SIM Swap” in which the hackers take over your phone number and, as a result, all of your linked accounts. That is,
The attacker deceives your service provider and impersonates you in order to ask for their technical support to issue a new and alternative SIM card.
They can steal your phone number and link it to their own devices.
Once the process is completed, the provider will cancel and suspend your real SIM card.
The hacker will be able to access your phone calls and messages, bank accounts, e-mail and much more.
Let’s rethink the vast amount of sensitive information associated with your Google account:
Address, birthdate and other personal information.
The photos that may harm you personally.
Calendar and upcoming travel dates.
Emails, documents and search history.
Personal contacts and their private information.
All other online services that have used your primary email address as a source of authentication.

3 : SIM Cloning

It is worth noting that each SIM card is equipped with three basic codes:

The International Mobile Subscriber Identity Code (IMSI) identifies the SIM data in international networks. This code consists of the country code or the network ID that you use.
The (ICCID) code is the serial number of the SIM you are using. It is not the serial number of the mobile phone but the chip. Each chip has its own serial number.
(Ki) code is the main code that the hacker needs. It identifies the card in the network and also protects it. If the hacker decodes the (Ki) code, he will be able to tweak your chip and own it.


By obtaining this data, cloning will be possible. As for the IMSI and ICCID codes, a SIM card reader can identify them, while it cannot read the other code (Ki) in the same way. However, hackers can use other clever methods to scan the (Ki). Consequently, the chip is copied to a writable, programmable card that telecom companies don’t supply, but hackers sell it online. There are several online programs and applications that attackers can download to decode these codes and copy your SIM data after reading it and work to write it on a new chip that can be written and programmed.
Victims may feel that something is suspicious. As a result, they may inform the telecom company to locate the geographical penetrator of the attacker. However, you should take care not to leave your SIM out of your sight because the cloning process requires the hacker to obtain your tangible SIM card or can use other ticks.

4.) WIB ATTACK
As an alternative to static SIM toolkit applications with a fixed pre-installed menu, some operators opt for dynamic SIM toolkit, where the menus and user dialogs are generated on the fly based on information provided by a central server. SIM applications that provide this functionality are generally referred to as SIM-browsers or µ-browsers.
Two browsers are currently available, the Wireless Internet Browser (WIB) which was the first successful browser released and promoted on the market by SmartTrust.
The Wireless Internet Browser (WIB) is specified by SmartTrust and is the market leading solution for SIM toolkit based browsing. The WIB-enabled SIM has a menu stored on the SIM. This menu can be managed and updated using Over The Air (OTA) services.

[ HOW HACKER PERFORM ALL THESE ATTACKS ]​

CLONING A SIM CARD



SIMCARD CLONING TOOLS:​



SIMCARD CLONING DEVICES:
View attachment 1159

[align=start]
Please, Log in or Register to view URLs content!

$10
[align=start
[/QUOTE]
View attachment 1160
View attachment 1161
View attachment 1162
Please, Log in or Register to view URLs content!
Please, Log in or Register to view URLs content!




TRICKS


tx
 

Forum statistics

Threads
1,774
Messages
35,461
Members
8,031
Latest member
zepol009
Member time online
632d 18h 19m
Reputation(s)
26