SlideShare una empresa de Scribd logo
1 de 26
Mobile Cloning Technology
Submitted By :-
HEERA TAZEEN
(3KC12CS007)
In The Name Of ALLAH Most Beneficent Most Merciful
CONTENTS
• INTRODUCTION
• HISTORY
• GSM AND CDMA
• IMPORTANT TERMS
• HOW A CELL PHONE IS CLONED?
• HOW TO KNOW THAT THE CELL PHONE HAS BEEN CLONED?
• DETECTION OF A CLONED CELL PHONE IN A NETWORK
• HOW TO PREVENT CELL PHONE CLONING?
• ADVANTAGES AND DISADVANTAGES
• CONCLUSION
• REFERENCES
INTRODUCTION
CELL PHONE CLONING
• The result of that is a "cloned" phone.
• Taking the programmed information from
mobile phone and programming the identical
information into another mobile phone.
HISTORY
• In 1990s cell phone Cloning started with Motorola
“bag” phones.
• In mid 90’s they are commonly available by
Motorola Co such as the classic, the ultra classic, and
the model 8000.
GSM AND CDMA
 GSM
• A digital cellular phone technology based on TDMA.
• GSM phones use a SIM card that contains user
account information.
 CDMA
• Transmitting simultaneous signals over a shared
portion of the spectrum.
• There is no SIM card unlike in GSM.
IMPORTANT TERMS
IMEI (International Mobile Station Equipment
Identity)
• Helps to identify valid devices.
• Used for stopping a stolen phone from accessing the
network.
ESN (Electronic Serial Number)
• Used to uniquely identify a mobile phone
operating on CDMA network.
MIN (Mobile Identification Number)
• MIN is a number that is derived from the 10 -digit
directory telephone number assigned to a mobile
station.
HOW IS CELL CLONING DONE?
• Modifying or replacing the EPROM in the phone with
a new chip which allow to configure an ESN via
software.
• We have to change the MIN.
• Cloning require access to ESN and MIN pairs.
• ESN/MIN pairs can be discovered in several ways:
CONTD…
• Sniffing the cellular.
• Trashing cellular companies or cellular resellers.
• Hacking cellular companies or cellular resellers.
• Cellular thieves can capture ESN/MINs using
devices such as cell phone ESN reader or digital
data interpreters (DDI).
• After the ESN/MIN pair is captured, the cloner
reprograms the microchip of any wireless phone.
WHAT IS PATAGONIA?
• Used to clone CDMA phones.
• Using this software a cloner can modify the
ESN/MIN of any CDMA phone.
• After we have modified the EEPROM of our
device, it can be used as a cloned device.
• Now we can use our phone for making fraudulent
telephone calls but the bills for the calls will go to
the legitimate subscriber.
HOW TO KNOW THAT THE CELL
HAS BEEN CLONED?
• Frequent wrong number phone calls to your phone,
or busy.
• Difficulty in placing outgoing calls.
• Difficulty in retrieving voice mail messages.
• Incoming calls constantly receiving busy signals or
wrong numbers.
• Unusual calls appearing on your phone bills.
DETECTION OF A CLONED PHONE
IN A NETWORK
• Duplicate Detection
• Velocity Trap
• Usage Profiling
• Call Counting
DUPLICATE DETECTION
• The network sees the same phone in several places
at the same time.
• Reactions include shutting them all off so that the
real customer will contact the operator because he
lost the service he is paying for.
DUPLICATE DETECTION
VELOCITY TRAP
• It notices when the mobile phone seems to be
moving at impossible, or most unlikely speeds.
• So service will be terminated until the real user is
verified.
USAGE PROFILING
• Profiles of customers phone usage are kept,
and when discrepancies are noticed, the
customer is contacted.
CALL COUNTING
• Both the phone and the network keep track of
calls made with the phone, and should they
differ more than the usually allowed one call,
service is denied.
HOW TO PREVENT PHONE
CLONING?
• User verification using PIN(Personal
Identification Number)
• Blacklisting of stolen phones
• Traffic analysis
• Electrically checking the ESN/MIN
ADVANTAGES
• If your phone has been lost , you can use your
cloned cell phone.
• If your phone got damaged or if you forgot your
phone at home or any other place . Cloned phone
can be helpful.
DISADVANTAGES
• It can be used by the terrorists for criminal
activities.
• It can be used by the cloner for fraud calls.
• It can be used for illegal money transfer.
CONCLUSION
To avoid such abuse to telecommunication
system it is absolutely necessary to check
out the weakness and vulnerability of
existing telecom systems.
REFERENCES
 http://www.hackinthebox.org
 http://realhackerspoint.blogspoint.in
 http://www.google.com
 http://www.Wikipedia.org
Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical
Communications Networks (WOCN), 2010 Seventh International Conference in
Sept,2010.
 http://www.Slideshare.net
ANY QUERIES

Más contenido relacionado

La actualidad más candente

Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi TechnologyAnandhuas
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jammingMahmoud Abdeen
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation8neutron8
 
The evolution and future of cellphone
The evolution and future of cellphoneThe evolution and future of cellphone
The evolution and future of cellphoneramya ramyasekar95
 
Introduction to 5g technology
Introduction to 5g technologyIntroduction to 5g technology
Introduction to 5g technologyShambhu Ram
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejackingAkshita Pillai
 
Evolution Of Mobile Phones
Evolution Of Mobile PhonesEvolution Of Mobile Phones
Evolution Of Mobile PhonesNeerav Bhatt
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)ADARSH KUMAR
 
History of the Telephone
History of the TelephoneHistory of the Telephone
History of the TelephoneNYanisse
 
The Evolution oF mobile phones - Sheik Nowheed
The Evolution oF mobile phones - Sheik NowheedThe Evolution oF mobile phones - Sheik Nowheed
The Evolution oF mobile phones - Sheik NowheedSheik Mohammed Nowheed
 
Deaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition SystemDeaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition SystemPraveena T
 
Presentation smart watch
Presentation smart watchPresentation smart watch
Presentation smart watchMeshal Malick
 

La actualidad más candente (20)

Advanced Wireless Technologies
Advanced Wireless TechnologiesAdvanced Wireless Technologies
Advanced Wireless Technologies
 
BSNL TRAINING PPT
BSNL TRAINING PPTBSNL TRAINING PPT
BSNL TRAINING PPT
 
E cash payment
E cash paymentE cash payment
E cash payment
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation
 
The evolution and future of cellphone
The evolution and future of cellphoneThe evolution and future of cellphone
The evolution and future of cellphone
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Introduction to 5g technology
Introduction to 5g technologyIntroduction to 5g technology
Introduction to 5g technology
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
Wireless charger
Wireless chargerWireless charger
Wireless charger
 
Cloud telephony
Cloud telephonyCloud telephony
Cloud telephony
 
Evolution Of Mobile Phones
Evolution Of Mobile PhonesEvolution Of Mobile Phones
Evolution Of Mobile Phones
 
NFC(Near Field Communication)
NFC(Near Field Communication)NFC(Near Field Communication)
NFC(Near Field Communication)
 
History of the Telephone
History of the TelephoneHistory of the Telephone
History of the Telephone
 
The Evolution oF mobile phones - Sheik Nowheed
The Evolution oF mobile phones - Sheik NowheedThe Evolution oF mobile phones - Sheik Nowheed
The Evolution oF mobile phones - Sheik Nowheed
 
Deaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition SystemDeaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition System
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
Presentation smart watch
Presentation smart watchPresentation smart watch
Presentation smart watch
 

Destacado (20)

Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile phone technology
Mobile phone technologyMobile phone technology
Mobile phone technology
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Wi DI
Wi DIWi DI
Wi DI
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
Mba mca+colleges+list
Mba mca+colleges+listMba mca+colleges+list
Mba mca+colleges+list
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Intel Centrino Mobile Technology
Intel Centrino Mobile TechnologyIntel Centrino Mobile Technology
Intel Centrino Mobile Technology
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 

Similar a Mobile Cloning Technology

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxRohithKumarKishtam
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxLingaSwamy10
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2Jihad Dib
 
sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptxDivyaDewkathe
 

Similar a Mobile Cloning Technology (20)

Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Fdp
FdpFdp
Fdp
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Clonning
ClonningClonning
Clonning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
mobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptxmobile jammer.ppt_082549-2(1).pptx
mobile jammer.ppt_082549-2(1).pptx
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
J-Telecom_V2
J-Telecom_V2J-Telecom_V2
J-Telecom_V2
 
Mobilejammer
MobilejammerMobilejammer
Mobilejammer
 
Mobile cloning paper
Mobile cloning paperMobile cloning paper
Mobile cloning paper
 
sniffer technology.pptx
sniffer technology.pptxsniffer technology.pptx
sniffer technology.pptx
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Mobile Cloning Technology

  • 1. Mobile Cloning Technology Submitted By :- HEERA TAZEEN (3KC12CS007) In The Name Of ALLAH Most Beneficent Most Merciful
  • 2. CONTENTS • INTRODUCTION • HISTORY • GSM AND CDMA • IMPORTANT TERMS • HOW A CELL PHONE IS CLONED? • HOW TO KNOW THAT THE CELL PHONE HAS BEEN CLONED? • DETECTION OF A CLONED CELL PHONE IN A NETWORK • HOW TO PREVENT CELL PHONE CLONING? • ADVANTAGES AND DISADVANTAGES • CONCLUSION • REFERENCES
  • 3. INTRODUCTION CELL PHONE CLONING • The result of that is a "cloned" phone. • Taking the programmed information from mobile phone and programming the identical information into another mobile phone.
  • 4. HISTORY • In 1990s cell phone Cloning started with Motorola “bag” phones. • In mid 90’s they are commonly available by Motorola Co such as the classic, the ultra classic, and the model 8000.
  • 5. GSM AND CDMA  GSM • A digital cellular phone technology based on TDMA. • GSM phones use a SIM card that contains user account information.  CDMA • Transmitting simultaneous signals over a shared portion of the spectrum. • There is no SIM card unlike in GSM.
  • 6. IMPORTANT TERMS IMEI (International Mobile Station Equipment Identity) • Helps to identify valid devices. • Used for stopping a stolen phone from accessing the network. ESN (Electronic Serial Number) • Used to uniquely identify a mobile phone operating on CDMA network.
  • 7. MIN (Mobile Identification Number) • MIN is a number that is derived from the 10 -digit directory telephone number assigned to a mobile station.
  • 8. HOW IS CELL CLONING DONE? • Modifying or replacing the EPROM in the phone with a new chip which allow to configure an ESN via software. • We have to change the MIN. • Cloning require access to ESN and MIN pairs. • ESN/MIN pairs can be discovered in several ways:
  • 9. CONTD… • Sniffing the cellular. • Trashing cellular companies or cellular resellers. • Hacking cellular companies or cellular resellers. • Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI). • After the ESN/MIN pair is captured, the cloner reprograms the microchip of any wireless phone.
  • 10.
  • 11. WHAT IS PATAGONIA? • Used to clone CDMA phones. • Using this software a cloner can modify the ESN/MIN of any CDMA phone.
  • 12.
  • 13. • After we have modified the EEPROM of our device, it can be used as a cloned device. • Now we can use our phone for making fraudulent telephone calls but the bills for the calls will go to the legitimate subscriber.
  • 14. HOW TO KNOW THAT THE CELL HAS BEEN CLONED? • Frequent wrong number phone calls to your phone, or busy. • Difficulty in placing outgoing calls. • Difficulty in retrieving voice mail messages. • Incoming calls constantly receiving busy signals or wrong numbers. • Unusual calls appearing on your phone bills.
  • 15. DETECTION OF A CLONED PHONE IN A NETWORK • Duplicate Detection • Velocity Trap • Usage Profiling • Call Counting
  • 16. DUPLICATE DETECTION • The network sees the same phone in several places at the same time. • Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for.
  • 18. VELOCITY TRAP • It notices when the mobile phone seems to be moving at impossible, or most unlikely speeds. • So service will be terminated until the real user is verified. USAGE PROFILING • Profiles of customers phone usage are kept, and when discrepancies are noticed, the customer is contacted.
  • 19. CALL COUNTING • Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.
  • 20. HOW TO PREVENT PHONE CLONING? • User verification using PIN(Personal Identification Number) • Blacklisting of stolen phones • Traffic analysis • Electrically checking the ESN/MIN
  • 21. ADVANTAGES • If your phone has been lost , you can use your cloned cell phone. • If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.
  • 22. DISADVANTAGES • It can be used by the terrorists for criminal activities. • It can be used by the cloner for fraud calls. • It can be used for illegal money transfer.
  • 23. CONCLUSION To avoid such abuse to telecommunication system it is absolutely necessary to check out the weakness and vulnerability of existing telecom systems.
  • 24. REFERENCES  http://www.hackinthebox.org  http://realhackerspoint.blogspoint.in  http://www.google.com  http://www.Wikipedia.org Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.  http://www.Slideshare.net
  • 25.

Notas del editor

  1. Cell phone cloning is copying the identity of o