You are on page 1of 3

WORDPRESS SERVICES

BACKTRACK 5 TUTORIAL

METASPLOIT TUTORIALS

ADVERTISE HERE

PRIVACY POLICY

WRITE FOR US

CONTACT US

Search...

Prominse Network Security


CloudBric promise Network Security CloudBric- Tighten Network Security

Building Trojan
Hardware at Home

Required Technical
Skills to be a Hacker

Sim Card

Pin Sim

Becoming a Hacker
Intangible Skills

Mobile Sim

The Secret Life of


SIM Cards

Usim Sim

The Secret Life of SIM Cards


BY ETHICAL HACKING
POSTED IN: DEFCON, EH TIPS, MOBILE
StumbleUpon

Diigo

Delicious

CEH Boot Camp


Award-Winning Official
CEH Training With Exam $2500

SIM or subscriber identity module is essential in mobile communication, SIM is a microchip or an electronic circuit
that stores IMSI and other authentication and identification code. The foremost objective of SIM is to give the
identification of its owner in the mobile communication network, it also carries the network signals that can hacked
to control a mobile phone. How to hack into a SIM card is not the primary objective of this article, however we will
study the structure of a SIM and exploitation process.
At DEFCON 21 talk, Karl Koscher and Eric Butler have presented their research and understanding regarding the
said topic. Following is the abstract of what's discussed there:

Abstract
SIM cards can do more than just authenticate your phone
with your carrier. Small apps can be installed and run
directly on the SIM separate from and without knowledge of
the phone OS. Although SIM Applications are common in
many parts of the world, they are mostly unknown in the U.S.
and the closed nature of the ecosystem makes it difficult for
hobbyists to find information and experiment.

This talk, based on our experience building SIM apps for the Toorcamp GSM network, explains what (U)SIM Toolkit
Applications are, how they work, and how to develop them. We will explain the various pieces of technology
involved, including the Java Card standard, which lets you write smart card applications using a subset of Java,
and the GlobalPlatform standard, which is used to load and manage applications on a card. We will also talk about
how these applications can be silently loaded, updated, and interacted with remotely over-the-air.

Presentation

converted by Web2PDFConvert.com

Ehacking (Ethical Hacking)


google.com/+EhackingNet
Follow

+1

+ 2,482

Join Ethical Hacking


RSS

Facebook

Twitter

Stay Updated via Email Newsletter


JOIN

Enter your email...

Share on
Share

Tweet

All Time Popular

Reaver-wps WPA/WPA2 Cracking Tutorial


How Important is to Secure Your Router
Password
Metasploit Remote Desktop ExploitBacktrack 5
Fern wifi Cracker- A Wireless Penetration
Testing Tool
5 Top Firefox Addons For Anonymous
Surfing
Source, defcon 21

Related post
Defcon
Bluetooth is Watching: Detect the Surveillance Systems
Dropping Docs on Darknets: How People Got Caught
Unmasking or De-Anonymizing You
EH Tips
Required Technical Skills to be a Hacker
Bluetooth is Watching: Detect the Surveillance Systems
Becoming a Hacker - What, How and Why
Becoming a Hacker Intangible Skills

How To Install Backtrack 5 Dual BootTutorial


Social Engineering toolkit TutorialBacktrack 5
How to Install Software's in Kali Linux
Fast Track Hacking-Backtrack5 Tutorial
How to Find An Email Address of Facebook
Friend

Archives

2015 (9)
2014 (117)
December (17)
November (25)
October (10)
September (11)
August (8)
Aug 30 (1)
The Secret Life of SIM Cards
Aug 27 (1)
Aug 25 (1)
Aug 24 (1)
Aug 22 (1)
Aug 17 (1)
Aug 11 (1)

converted by Web2PDFConvert.com

0 Comments

Login

Ethical Hacking-Your Way To The World OF IT Security

Share Favorite

Sort by Best

Start the discussion

Aug 04 (1)
July (8)
June (2)
May (4)
April (4)
March (5)
February (9)
January (14)
2013 (80)
2012 (78)
2011 (274)
2010 (25)

Labels

Hacking (217)
EH Security (156)
ALSO ON ETHICAL HACKING-YOUR WAY TO THE WORLD OF IT SECURITY

Tutorial (151)

NSA Spied on Companies and Groups including


U.S Allies | Ethical Hacking-Your

Ethical Hacking-Your Way To The World Of IT


Security: How to evade getting hacked

1 comment a month ago

1 comment a month ago

Dave Howe It can be argued that the NSA's


actions are completely consistent with one of its
responsibilities - after all, it is its job to spy on

VirtualDomain Hi! I really enjoy your articles, but


could you change the word "hacker" when you use it
in a bad situation, to cracker or

Wireless Network Monitor & Analyzer | Ethical


Hacking-Your Way To The World Of IT Security

FS-NyarL Pentesting & Forensics Framework |


Ethical Hacking-Your Way To The World Of

1 comment 10 months ago

1 comment 8 months ago

John Carter wonderful system. Facebook

Subscribe

Add Disqus to your site

priyanshu same tool will work on computers and


wbsite ... like fasttrack or armitage

Privacy

scipoT gnidnerT

EH Security EH Tools
Exploit

Facebook
Framework
Kali Linux Linux

Hacking
Malware

Linux
MAC
Vote

EH Tips (147)
EH Tools (125)
Pen-Testing (105)
Web Security (101)
Guest Post (94)
BackTrack (68)
Review (62)
Backtrack5 (53)
Backbox (31)
Metasploit (31)
SQL (31)
Cracking (19)
Challenge (5)
Services (2)

stnm
eoC tneceR

Which operating system do you


AntiVirus BackTrack Backtrack5
like most ?
Windows

Linux (149)

Metasploit

News

Source
Testing

Tutorial

Ubuntu
Vulnerability

View Results
Polldaddy.com

Ethical Hacking-Your Way To The World Of IT Security. All Rights Reserved.

VoIP Hacking & Penetration Testing |


Ethical Hacking-Your Way To The World
Of IT Security 31 minutes ago

This blog by Ehacking is licensed


under a Creative Commons
Attribution-NonCommercialShareAlike 3.0 Unported License.

Open
Pen-

Random

Ethical Hacking Yes you can


still sign up, but be quick.

SQL

Daniel Francisco Tapia


Rybertt can you sign up still?
VoIP Hacking & Penetration Testing |
Ethical Hacking-Your Way To The World
Of IT Security 20 hours ago

Powered by Disqus

Designed by Arras Theme. Converted to Blogger Templates by Wordpress Blogger.

converted by Web2PDFConvert.com

You might also like