WORDPRESS SERVICES
BACKTRACK 5 TUTORIAL
METASPLOIT TUTORIALS
ADVERTISE HERE
PRIVACY POLICY
WRITE FOR US
CONTACT US
Search...
Prominse Network Security
CloudBric promise Network Security CloudBric- Tighten Network Security
Building Trojan
Hardware at Home
Required Technical
Skills to be a Hacker
Sim Card
Pin Sim
Becoming a Hacker
Intangible Skills
Mobile Sim
The Secret Life of
SIM Cards
Usim Sim
The Secret Life of SIM Cards
BY ETHICAL HACKING
POSTED IN: DEFCON, EH TIPS, MOBILE
StumbleUpon
Diigo
Delicious
CEH Boot Camp
Award-Winning Official
CEH Training With Exam $2500
SIM or subscriber identity module is essential in mobile communication, SIM is a microchip or an electronic circuit
that stores IMSI and other authentication and identification code. The foremost objective of SIM is to give the
identification of its owner in the mobile communication network, it also carries the network signals that can hacked
to control a mobile phone. How to hack into a SIM card is not the primary objective of this article, however we will
study the structure of a SIM and exploitation process.
At DEFCON 21 talk, Karl Koscher and Eric Butler have presented their research and understanding regarding the
said topic. Following is the abstract of what's discussed there:
Abstract
SIM cards can do more than just authenticate your phone
with your carrier. Small apps can be installed and run
directly on the SIM separate from and without knowledge of
the phone OS. Although SIM Applications are common in
many parts of the world, they are mostly unknown in the U.S.
and the closed nature of the ecosystem makes it difficult for
hobbyists to find information and experiment.
This talk, based on our experience building SIM apps for the Toorcamp GSM network, explains what (U)SIM Toolkit
Applications are, how they work, and how to develop them. We will explain the various pieces of technology
involved, including the Java Card standard, which lets you write smart card applications using a subset of Java,
and the GlobalPlatform standard, which is used to load and manage applications on a card. We will also talk about
how these applications can be silently loaded, updated, and interacted with remotely over-the-air.
Presentation
converted by Web2PDFConvert.com
Ehacking (Ethical Hacking)
google.com/+EhackingNet
Follow
+1
+ 2,482
Join Ethical Hacking
RSS
Facebook
Twitter
Stay Updated via Email Newsletter
JOIN
Enter your email...
Share on
Share
Tweet
All Time Popular
Reaver-wps WPA/WPA2 Cracking Tutorial
How Important is to Secure Your Router
Password
Metasploit Remote Desktop ExploitBacktrack 5
Fern wifi Cracker- A Wireless Penetration
Testing Tool
5 Top Firefox Addons For Anonymous
Surfing
Source, defcon 21
Related post
Defcon
Bluetooth is Watching: Detect the Surveillance Systems
Dropping Docs on Darknets: How People Got Caught
Unmasking or De-Anonymizing You
EH Tips
Required Technical Skills to be a Hacker
Bluetooth is Watching: Detect the Surveillance Systems
Becoming a Hacker - What, How and Why
Becoming a Hacker Intangible Skills
How To Install Backtrack 5 Dual BootTutorial
Social Engineering toolkit TutorialBacktrack 5
How to Install Software's in Kali Linux
Fast Track Hacking-Backtrack5 Tutorial
How to Find An Email Address of Facebook
Friend
Archives
2015 (9)
2014 (117)
December (17)
November (25)
October (10)
September (11)
August (8)
Aug 30 (1)
The Secret Life of SIM Cards
Aug 27 (1)
Aug 25 (1)
Aug 24 (1)
Aug 22 (1)
Aug 17 (1)
Aug 11 (1)
converted by Web2PDFConvert.com
0 Comments
Login
Ethical Hacking-Your Way To The World OF IT Security
Share Favorite
Sort by Best
Start the discussion
Aug 04 (1)
July (8)
June (2)
May (4)
April (4)
March (5)
February (9)
January (14)
2013 (80)
2012 (78)
2011 (274)
2010 (25)
Labels
Hacking (217)
EH Security (156)
ALSO ON ETHICAL HACKING-YOUR WAY TO THE WORLD OF IT SECURITY
Tutorial (151)
NSA Spied on Companies and Groups including
U.S Allies | Ethical Hacking-Your
Ethical Hacking-Your Way To The World Of IT
Security: How to evade getting hacked
1 comment a month ago
1 comment a month ago
Dave Howe It can be argued that the NSA's
actions are completely consistent with one of its
responsibilities - after all, it is its job to spy on
VirtualDomain Hi! I really enjoy your articles, but
could you change the word "hacker" when you use it
in a bad situation, to cracker or
Wireless Network Monitor & Analyzer | Ethical
Hacking-Your Way To The World Of IT Security
FS-NyarL Pentesting & Forensics Framework |
Ethical Hacking-Your Way To The World Of
1 comment 10 months ago
1 comment 8 months ago
John Carter wonderful system. Facebook
Subscribe
Add Disqus to your site
priyanshu same tool will work on computers and
wbsite ... like fasttrack or armitage
Privacy
scipoT gnidnerT
EH Security EH Tools
Exploit
Facebook
Framework
Kali Linux Linux
Hacking
Malware
Linux
MAC
Vote
EH Tips (147)
EH Tools (125)
Pen-Testing (105)
Web Security (101)
Guest Post (94)
BackTrack (68)
Review (62)
Backtrack5 (53)
Backbox (31)
Metasploit (31)
SQL (31)
Cracking (19)
Challenge (5)
Services (2)
stnm
eoC tneceR
Which operating system do you
AntiVirus BackTrack Backtrack5
like most ?
Windows
Linux (149)
Metasploit
News
Source
Testing
Tutorial
Ubuntu
Vulnerability
View Results
Polldaddy.com
Ethical Hacking-Your Way To The World Of IT Security. All Rights Reserved.
VoIP Hacking & Penetration Testing |
Ethical Hacking-Your Way To The World
Of IT Security 31 minutes ago
This blog by Ehacking is licensed
under a Creative Commons
Attribution-NonCommercialShareAlike 3.0 Unported License.
Open
Pen-
Random
Ethical Hacking Yes you can
still sign up, but be quick.
SQL
Daniel Francisco Tapia
Rybertt can you sign up still?
VoIP Hacking & Penetration Testing |
Ethical Hacking-Your Way To The World
Of IT Security 20 hours ago
Powered by Disqus
Designed by Arras Theme. Converted to Blogger Templates by Wordpress Blogger.
converted by Web2PDFConvert.com