SlideShare una empresa de Scribd logo
1 de 23
MOBILE & SIM CARD
CLONING
Warning.
MOBILE & SIM CLONING2
These slide is only for education purpose.
No SIM card or Mobile phone is cloned .
My purpose is to draw attention towards security
vulnerabilities in GSM and mobile communication.
MOBILE & SIM CLONING
Contents
1. Introduction
2. What is phone or SIM cloning?
3. What is the Purpose of cloning?
4. Requirements for cloning
5. How cell phone cloning is done?
6. Mobile station
7. Base Transceiver station
8. GSM authentication
9. COMP 128 and A5
10. Process of SIM cloning
11. Man in the middle attack
12. How to know your phone or SIM is cloned?
13. Preventive measures
14. What can be done by cloned SIM or phone?
15. References
3
1. INTRODUCTION
MOBILE & SIM CLONING
Nearly 1 billion telecom subscriber worldwide.
Estimated that worldwide mobile phone fraud will
reach $40 billion dollars soon.
US Law enforcement agents have found that 80%
of drug dealers arrested in US using cloned
mobile phones.
Pablo Escobar the top Columbian drug dealer
was tracked down by monitoring his mobile
phone activity.
4
2. What is cell phone or SIM
cloning?
MOBILE & SIM CLONING
Copying the identity of one phone or SIM to
another phone or SIM.
The bill for usage goes to legitimate subscriber.
5
3. What is the Purpose of
cloning?
MOBILE & SIM CLONING
Making fraudulent phone calls
Getting owner messages.
Using internet on owners bill
Using phone to commit a crime.
Getting personal information of owner.
Listening owner calls.
To tease anybody etc.
6
4. Requirements for phone cloning?
MOBILE & SIM CLONING
ESN ( Electronic Serial Number):
Unique number Loaded when phone is
manufactured.
Cannot be changed or tempered.
MIN ( Mobile Identification number)
Every subscriber provides a MIN to its user.
It is a unique number.
ESN/MIN pairs can be discovered in several
ways:
Sniffing the cellular phone ( need physical access to
phone)
Hacking cellular company database7
5. How cell cloning is done?
MOBILE & SIM CLONING
Cloning involves modifying or replacing the
EPROM in the phone with a new chip which
would allow you to configure an ESN ( Electronic
serial number) via a software (eg. PATAGONIA).
Then you would also have to change MIN (Mobile
identification number) by the same software.
When we had successfully changed the ESN/MIN
pair, your phone is an effective clone of other
phone.[2]
8
6. MOBILE STATION
MOBILE & SIM CLONING
Consist of Mobile Equipment and
SIM.
Mobile equipment has
IMEI – International Mobile
Equipment Identity
9
SIM(Subscriber Identity
module)
MOBILE & SIM CLONING
SIM provides details printed
on the surface :
Name of the Network Provider
Unique ID Number
Personal Identification Number
(PIN)
4 digit code set at point of
manufacture that can be changed
by the Subscriber.
Usually 3 attempts before SIM is
blocked
Pin Unblocking Key (PUK)
8 digit code set by manufacturer
Maximum 10 attempts before SIM
is permanently blocked
10
MOBILE & SIM CLONING
KI (Subscriber identification key)
Size is 128 bits (16 bytes)
loaded in SIM hardware can not be changed
(read only).
Goal
Authenticate subscriber to network
Create a session key
IMSI (International mobile subscriber
identity)
Unique for every subscriber. [3]
11
SIM Contd…
7. Base Transceiver Station (BTS)
MOBILE & SIM CLONING
The network element which
handles the radio interface to the
mobile station. The BTS is the radio
equipment (transceivers and
antennas) needed to service each
cell in the network.
12
8. GSM authentication
MOBILE & SIM CLONING13
GSM authentication
Contd…..
MOBILE & SIM CLONING
The base station sends a 16 byte random number say
RAND.
The SIM card get this RAND and uses the KI(secret
number) to feed to A3A8 (COMP-128) whose output is a
12 byte long number say OUTPUT.
OUTPUT is split into two parts , upper 4 bytes is called as
SRES(authentication key) and lower 8 byte as Kc
(encryption key).
SRES is send to Base Transceiver Station as
Authentication response. Where the operator uses the
same algorithm because he knows our KI and match the
SRES then we are authenticated.
The Kc is sent to Mobile which is used as encryption key
for A5 algorithm.[1]
14
9. COMP – 128 and A5 algorithms
MOBILE & SIM CLONING
COMP 128 algorithm is used to generate the Encryption
key (Kc) and Authentication key (SRES).
There are three versions of COMP algorithms
In V1 last and second last byte of Kc is 0x00.
In V2 last byte of Kc is 0x00.
In V3 bytes may be anything between 0x00 to 0xFF
which is the most secured one.
A5 algorithm is used to encrypt the voice over-the-air
communication.[1]
15
10. SIM Cloning Process
MOBILE & SIM CLONING
Things required : Blank SIM card ,SIM Card Reader and a software to
generate the content for blank SIM. (Can be bought from www.ebay.in
,www.alibaba.com etc.)
Step 1: Remove the SIM from your phone, place it in the SIM card reader.
Step 2 :Read the KI code and IMSI
Read SIM card for KI and IMSI using software
Once KI and IMSI is found ,save your cracked SIM information to a
.dat file.
16
SIM Cloning Process
contd……..
MOBILE & SIM CLONING
Disadvantage:
Need physical access to the SIM card for at least 30
minutes.
Step 3: Writing to blank card
Put the blank card in the reader.
Select write to SIM.
Select .dat file you saved before.
It will take about 10 minutes to write it.
your card is cloned.
If you try to make 2 calls at the same time, one will
go through, the other will say call failed, and both
phones will get the same messages, text and voice,
and both will receive the same calls, but only one can
talk at a time. [4]
17
11. MAN IN THE MIDDLE attack
MOBILE & SIM CLONING
In GSM only subscriber is authenticated with the network
but there is no way by which a network can be
authenticated. Anybody can not get whether the network
is reliable or not.
It is possible for the network to order the MS to switch on
and off encryption at times of high loading.
This signal can be spoofed using a man-in-the-middle
attack.
18
MOBILE & SIM CLONING
Operator BTSLegitimate Subscriber Man-in-the-
middle
1. Attempt toregister usingencryption
3. Authenticates
Spoofing BTS
Spoofing MS
2. Passesontheregistrationrequest
4. Passesonauthentication
5. Dialsanumber
6. RequestsMSswitchoff encryption 7. Encryptsthenpassesonthecall request
8. Call proceedswit MIMeavesdropping
19
12. How to know your phone or SIM
is cloned?
MOBILE & SIM CLONING
Frequent wrong number phone calls to your phone.
Difficulty in placing outgoing calls.
Difficulty in retrieving voice mail messages.
Incoming call constantly receiving busy signals.
Increased bill amount.
20
13. Preventive measures
MOBILE & SIM CLONING
Always set a PIN in the SIM card.
Always set up security code in the phone.
Switch to 3G SIM card which are more secured
then 2G.
21
15. References
MOBILE & SIM CLONING
Research papers
[1] Security in the GSM network Marcin
Olawski
[2] CDG Document 138 Version 0.34
CDMA Development Group, 575 Anton Boulevard, Suite
560 Costa Mesa, California 92626
[3] Design of a Routing Mechanism to Provide Multiple
Mobile Network Service on a Single SIM Card
Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh. A
Websites
[4] http://www.hackingprojects.net/2013/04/secrets-of-
sim.html
[5] http://www.wikipedia.com
22
MOBILE & SIM CLONING23

Más contenido relacionado

La actualidad más candente

GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.Student
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communicationHimanshu Singh
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8RUpaliLohar
 
Cryptography
CryptographyCryptography
CryptographyEmaSushan
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
 
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection SystemLuca Bongiorni
 
Gsm security
Gsm securityGsm security
Gsm securityAli Kamil
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture OverviewHossein Yavari
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer reportSameer Gupta
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 

La actualidad más candente (20)

Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8Gsm security algorithms A3 , A5 , A8
Gsm security algorithms A3 , A5 , A8
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cryptography
CryptographyCryptography
Cryptography
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Bluetooth Chat
Bluetooth ChatBluetooth Chat
Bluetooth Chat
 
Gsm
GsmGsm
Gsm
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 iParanoid: an IMSI Catcher - Stingray Intrusion Detection System iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
 
Gsm security
Gsm securityGsm security
Gsm security
 
LTE Architecture Overview
LTE Architecture OverviewLTE Architecture Overview
LTE Architecture Overview
 
cell phone jammer report
cell phone jammer reportcell phone jammer report
cell phone jammer report
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 

Similar a Mobile Phone and SIM card cloning

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 

Similar a Mobile Phone and SIM card cloning (20)

MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Clonning
ClonningClonning
Clonning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 

Más de Ankur Kumar

Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
Digital modulation
Digital modulationDigital modulation
Digital modulationAnkur Kumar
 
Quadric surfaces
Quadric surfacesQuadric surfaces
Quadric surfacesAnkur Kumar
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of ComputersAnkur Kumar
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
Termes - Termite inspired robots that can build for us.
Termes - Termite inspired robots that can build for us.Termes - Termite inspired robots that can build for us.
Termes - Termite inspired robots that can build for us.Ankur Kumar
 
Illumination model
Illumination modelIllumination model
Illumination modelAnkur Kumar
 
Hidden lines & surfaces
Hidden lines & surfacesHidden lines & surfaces
Hidden lines & surfacesAnkur Kumar
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobilesAnkur Kumar
 
Tracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkTracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkAnkur Kumar
 

Más de Ankur Kumar (16)

Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Be Creative
Be CreativeBe Creative
Be Creative
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Trade Mark
Trade MarkTrade Mark
Trade Mark
 
E commerce
E commerceE commerce
E commerce
 
Gsm network
Gsm networkGsm network
Gsm network
 
Digital modulation
Digital modulationDigital modulation
Digital modulation
 
Quadric surfaces
Quadric surfacesQuadric surfaces
Quadric surfaces
 
Fundamentals of Computers
Fundamentals of ComputersFundamentals of Computers
Fundamentals of Computers
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Termes - Termite inspired robots that can build for us.
Termes - Termite inspired robots that can build for us.Termes - Termite inspired robots that can build for us.
Termes - Termite inspired robots that can build for us.
 
Illumination model
Illumination modelIllumination model
Illumination model
 
Hidden lines & surfaces
Hidden lines & surfacesHidden lines & surfaces
Hidden lines & surfaces
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobiles
 
Tracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkTracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_network
 

Último

presentation about microsoft power point
presentation about microsoft power pointpresentation about microsoft power point
presentation about microsoft power pointchhavia330
 
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | DelhiFULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhisoniya singh
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...Suhani Kapoor
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointGetawu
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service ThanePooja Nehwal
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...Pooja Nehwal
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...ur8mqw8e
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...Pooja Nehwal
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Pooja Nehwal
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...Amil baba
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样qaffana
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...ranjana rawat
 
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Último (20)

presentation about microsoft power point
presentation about microsoft power pointpresentation about microsoft power point
presentation about microsoft power point
 
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | DelhiFULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
FULL ENJOY - 8264348440 Call Girls in Hauz Khas | Delhi
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power point
 
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311  Call Girls in Thane , Independent Escort Service ThanePallawi 9167673311  Call Girls in Thane , Independent Escort Service Thane
Pallawi 9167673311 Call Girls in Thane , Independent Escort Service Thane
 
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(ANIKA) Wanwadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Chakan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
 
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
《伯明翰城市大学毕业证成绩单购买》学历证书学位证书区别《复刻原版1:1伯明翰城市大学毕业证书|修改BCU成绩单PDF版》Q微信741003700《BCU学...
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
 
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
Call Girls In Andheri East Call 9892124323 Book Hot And Sexy Girls,
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
 
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
NO1 Verified Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi A...
 
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Sakshi Call 7001035870 Meet With Nagpur Escorts
 
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
 
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
 
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
 
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

Mobile Phone and SIM card cloning

  • 1. MOBILE & SIM CARD CLONING
  • 2. Warning. MOBILE & SIM CLONING2 These slide is only for education purpose. No SIM card or Mobile phone is cloned . My purpose is to draw attention towards security vulnerabilities in GSM and mobile communication.
  • 3. MOBILE & SIM CLONING Contents 1. Introduction 2. What is phone or SIM cloning? 3. What is the Purpose of cloning? 4. Requirements for cloning 5. How cell phone cloning is done? 6. Mobile station 7. Base Transceiver station 8. GSM authentication 9. COMP 128 and A5 10. Process of SIM cloning 11. Man in the middle attack 12. How to know your phone or SIM is cloned? 13. Preventive measures 14. What can be done by cloned SIM or phone? 15. References 3
  • 4. 1. INTRODUCTION MOBILE & SIM CLONING Nearly 1 billion telecom subscriber worldwide. Estimated that worldwide mobile phone fraud will reach $40 billion dollars soon. US Law enforcement agents have found that 80% of drug dealers arrested in US using cloned mobile phones. Pablo Escobar the top Columbian drug dealer was tracked down by monitoring his mobile phone activity. 4
  • 5. 2. What is cell phone or SIM cloning? MOBILE & SIM CLONING Copying the identity of one phone or SIM to another phone or SIM. The bill for usage goes to legitimate subscriber. 5
  • 6. 3. What is the Purpose of cloning? MOBILE & SIM CLONING Making fraudulent phone calls Getting owner messages. Using internet on owners bill Using phone to commit a crime. Getting personal information of owner. Listening owner calls. To tease anybody etc. 6
  • 7. 4. Requirements for phone cloning? MOBILE & SIM CLONING ESN ( Electronic Serial Number): Unique number Loaded when phone is manufactured. Cannot be changed or tempered. MIN ( Mobile Identification number) Every subscriber provides a MIN to its user. It is a unique number. ESN/MIN pairs can be discovered in several ways: Sniffing the cellular phone ( need physical access to phone) Hacking cellular company database7
  • 8. 5. How cell cloning is done? MOBILE & SIM CLONING Cloning involves modifying or replacing the EPROM in the phone with a new chip which would allow you to configure an ESN ( Electronic serial number) via a software (eg. PATAGONIA). Then you would also have to change MIN (Mobile identification number) by the same software. When we had successfully changed the ESN/MIN pair, your phone is an effective clone of other phone.[2] 8
  • 9. 6. MOBILE STATION MOBILE & SIM CLONING Consist of Mobile Equipment and SIM. Mobile equipment has IMEI – International Mobile Equipment Identity 9
  • 10. SIM(Subscriber Identity module) MOBILE & SIM CLONING SIM provides details printed on the surface : Name of the Network Provider Unique ID Number Personal Identification Number (PIN) 4 digit code set at point of manufacture that can be changed by the Subscriber. Usually 3 attempts before SIM is blocked Pin Unblocking Key (PUK) 8 digit code set by manufacturer Maximum 10 attempts before SIM is permanently blocked 10
  • 11. MOBILE & SIM CLONING KI (Subscriber identification key) Size is 128 bits (16 bytes) loaded in SIM hardware can not be changed (read only). Goal Authenticate subscriber to network Create a session key IMSI (International mobile subscriber identity) Unique for every subscriber. [3] 11 SIM Contd…
  • 12. 7. Base Transceiver Station (BTS) MOBILE & SIM CLONING The network element which handles the radio interface to the mobile station. The BTS is the radio equipment (transceivers and antennas) needed to service each cell in the network. 12
  • 13. 8. GSM authentication MOBILE & SIM CLONING13
  • 14. GSM authentication Contd….. MOBILE & SIM CLONING The base station sends a 16 byte random number say RAND. The SIM card get this RAND and uses the KI(secret number) to feed to A3A8 (COMP-128) whose output is a 12 byte long number say OUTPUT. OUTPUT is split into two parts , upper 4 bytes is called as SRES(authentication key) and lower 8 byte as Kc (encryption key). SRES is send to Base Transceiver Station as Authentication response. Where the operator uses the same algorithm because he knows our KI and match the SRES then we are authenticated. The Kc is sent to Mobile which is used as encryption key for A5 algorithm.[1] 14
  • 15. 9. COMP – 128 and A5 algorithms MOBILE & SIM CLONING COMP 128 algorithm is used to generate the Encryption key (Kc) and Authentication key (SRES). There are three versions of COMP algorithms In V1 last and second last byte of Kc is 0x00. In V2 last byte of Kc is 0x00. In V3 bytes may be anything between 0x00 to 0xFF which is the most secured one. A5 algorithm is used to encrypt the voice over-the-air communication.[1] 15
  • 16. 10. SIM Cloning Process MOBILE & SIM CLONING Things required : Blank SIM card ,SIM Card Reader and a software to generate the content for blank SIM. (Can be bought from www.ebay.in ,www.alibaba.com etc.) Step 1: Remove the SIM from your phone, place it in the SIM card reader. Step 2 :Read the KI code and IMSI Read SIM card for KI and IMSI using software Once KI and IMSI is found ,save your cracked SIM information to a .dat file. 16
  • 17. SIM Cloning Process contd…….. MOBILE & SIM CLONING Disadvantage: Need physical access to the SIM card for at least 30 minutes. Step 3: Writing to blank card Put the blank card in the reader. Select write to SIM. Select .dat file you saved before. It will take about 10 minutes to write it. your card is cloned. If you try to make 2 calls at the same time, one will go through, the other will say call failed, and both phones will get the same messages, text and voice, and both will receive the same calls, but only one can talk at a time. [4] 17
  • 18. 11. MAN IN THE MIDDLE attack MOBILE & SIM CLONING In GSM only subscriber is authenticated with the network but there is no way by which a network can be authenticated. Anybody can not get whether the network is reliable or not. It is possible for the network to order the MS to switch on and off encryption at times of high loading. This signal can be spoofed using a man-in-the-middle attack. 18
  • 19. MOBILE & SIM CLONING Operator BTSLegitimate Subscriber Man-in-the- middle 1. Attempt toregister usingencryption 3. Authenticates Spoofing BTS Spoofing MS 2. Passesontheregistrationrequest 4. Passesonauthentication 5. Dialsanumber 6. RequestsMSswitchoff encryption 7. Encryptsthenpassesonthecall request 8. Call proceedswit MIMeavesdropping 19
  • 20. 12. How to know your phone or SIM is cloned? MOBILE & SIM CLONING Frequent wrong number phone calls to your phone. Difficulty in placing outgoing calls. Difficulty in retrieving voice mail messages. Incoming call constantly receiving busy signals. Increased bill amount. 20
  • 21. 13. Preventive measures MOBILE & SIM CLONING Always set a PIN in the SIM card. Always set up security code in the phone. Switch to 3G SIM card which are more secured then 2G. 21
  • 22. 15. References MOBILE & SIM CLONING Research papers [1] Security in the GSM network Marcin Olawski [2] CDG Document 138 Version 0.34 CDMA Development Group, 575 Anton Boulevard, Suite 560 Costa Mesa, California 92626 [3] Design of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh. A Websites [4] http://www.hackingprojects.net/2013/04/secrets-of- sim.html [5] http://www.wikipedia.com 22
  • 23. MOBILE & SIM CLONING23