Iranian UICCs hacke...
 
Notifications
Clear all

Iranian UICCs hacked

44 Posts
6 Users
0 Reactions
5,732 Views
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Which is the best UICC tool to dig as deep as possible into a 'SIM card (formally incorrect, I know)'?


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Which forensic toolset enables to fully analyze 'SIM-cards'? I am a cryptographer and not in law enforcement. Please help!


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Any other cryptographer already deep dive analyzed Helios OS on 'SIM cards'?


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Why does no SIM card expert relies to my answers?


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

Why does no SIM card expert relies to my answers?

Just a possibility, but maybe no SIM card expert read your answers (or questions?).
Or maybe no SIM card expert with the required knowledge exist.
Or maybe they exist but see no point in sharing their knowledge/experience with you.

jaclaz


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Can you help?


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

Can you help?

Unfortunately not ( , I know next to nothing about SIMs.

jaclaz


   
ReplyQuote
(@dalton-c)
Active Member
Joined: 7 years ago
Posts: 6
 

Can you help?

I'm expert of Simcard security but i couldn't understand what are you looking for? Simcard is a passive module in the network and the only way for hacking from remote area is OTA.

I have bit of information that may be useful for you.


   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

The MSI's subscribers were hacked through the 3G mobile network and their UICCs infected. I have one piece in-lab and proof of infection.


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

The MSI's subscribers were hacked through the 3G mobile network and their UICCs infected. I have one piece in-lab and proof of infection.

1. Was the hack created by attachment to an SMS?
2. Was it thru use of USSDs?
3. Do you have an identity (name) of the infection you have found?
4. Did the handset used by UICC import the infection from infected files?


   
ReplyQuote
Page 2 / 5
Share: