Professional Documents
Culture Documents
BACKTRACK 5 TUTORIAL
METASPLOIT TUTORIALS
ADVERTISE HERE
PRIVACY POLICY
WRITE FOR US
CONTACT US
Search...
Building Trojan
Hardware at Home
Required Technical
Skills to be a Hacker
Sim Card
Pin Sim
Becoming a Hacker
Intangible Skills
Mobile Sim
Usim Sim
Diigo
Delicious
SIM or subscriber identity module is essential in mobile communication, SIM is a microchip or an electronic circuit
that stores IMSI and other authentication and identification code. The foremost objective of SIM is to give the
identification of its owner in the mobile communication network, it also carries the network signals that can hacked
to control a mobile phone. How to hack into a SIM card is not the primary objective of this article, however we will
study the structure of a SIM and exploitation process.
At DEFCON 21 talk, Karl Koscher and Eric Butler have presented their research and understanding regarding the
said topic. Following is the abstract of what's discussed there:
Abstract
SIM cards can do more than just authenticate your phone
with your carrier. Small apps can be installed and run
directly on the SIM separate from and without knowledge of
the phone OS. Although SIM Applications are common in
many parts of the world, they are mostly unknown in the U.S.
and the closed nature of the ecosystem makes it difficult for
hobbyists to find information and experiment.
This talk, based on our experience building SIM apps for the Toorcamp GSM network, explains what (U)SIM Toolkit
Applications are, how they work, and how to develop them. We will explain the various pieces of technology
involved, including the Java Card standard, which lets you write smart card applications using a subset of Java,
and the GlobalPlatform standard, which is used to load and manage applications on a card. We will also talk about
how these applications can be silently loaded, updated, and interacted with remotely over-the-air.
Presentation
converted by Web2PDFConvert.com
+1
+ 2,482
Share on
Share
Tweet
Related post
Defcon
Bluetooth is Watching: Detect the Surveillance Systems
Dropping Docs on Darknets: How People Got Caught
Unmasking or De-Anonymizing You
EH Tips
Required Technical Skills to be a Hacker
Bluetooth is Watching: Detect the Surveillance Systems
Becoming a Hacker - What, How and Why
Becoming a Hacker Intangible Skills
Archives
2015 (9)
2014 (117)
December (17)
November (25)
October (10)
September (11)
August (8)
Aug 30 (1)
The Secret Life of SIM Cards
Aug 27 (1)
Aug 25 (1)
Aug 24 (1)
Aug 22 (1)
Aug 17 (1)
Aug 11 (1)
converted by Web2PDFConvert.com
0 Comments
Login
Share Favorite
Sort by Best
Aug 04 (1)
July (8)
June (2)
May (4)
April (4)
March (5)
February (9)
January (14)
2013 (80)
2012 (78)
2011 (274)
2010 (25)
Labels
Hacking (217)
EH Security (156)
ALSO ON ETHICAL HACKING-YOUR WAY TO THE WORLD OF IT SECURITY
Tutorial (151)
Subscribe
Privacy
scipoT gnidnerT
EH Security EH Tools
Exploit
Facebook
Framework
Kali Linux Linux
Hacking
Malware
Linux
MAC
Vote
EH Tips (147)
EH Tools (125)
Pen-Testing (105)
Web Security (101)
Guest Post (94)
BackTrack (68)
Review (62)
Backtrack5 (53)
Backbox (31)
Metasploit (31)
SQL (31)
Cracking (19)
Challenge (5)
Services (2)
stnm
eoC tneceR
Linux (149)
Metasploit
News
Source
Testing
Tutorial
Ubuntu
Vulnerability
View Results
Polldaddy.com
Open
Pen-
Random
SQL
Powered by Disqus
converted by Web2PDFConvert.com