Professional Documents
Culture Documents
Ajay Upadhyaya
Outline
Introduction
Introduction
M-Cloning
is one of the burning issue of M-commerce. M-Cloning is copying the identity of one mobile telephone to another mobile telephone. Main thought behind the evolution of M-cloning is to create the clone phone which contains the same data and number as in your original phone. But now a days M-cloning is used for the purpose of making fraudulent telephone calls. The bills for the calls go to the phone subscriber.
GSM Cloning
To do the GSM Cloning handling with SIM card is
required. For GSM cloning we have to create copy of SIM card. Data from the original SIM card will fetch and insert the same data in new SIM card as in original card using different software are available in the market. Software :
SIM Manager Pro
ChipIt
SimScan Cardinal Sim Emu
5
USB) for the smart card reader A PC/SC compliant smart-card reader Smart card reader driver
M-cloning Procedure
Let see the procedure for M- cloning step by step:
Step 1: Few things which we need before we start. First we
will need to buy a SIM card reader, a card programmer, empty silver pic 2 card, and one 9 pin male to female extension cable. Step 2: We will also need some software for this trick. First we will need a SIM card editor. We can use software here cardinal and Sim Emu. Step 3: Plug SIM Reader into com port. Then run Cardinal and then click where it says "Click Here" and then click Settings.
rate. Then left click where it says "Click Here", go to smartcard, and click SIM editor. Step 5: The program will from there start up, and you will go to SIM, then SIM Info, and click the load button. After doing this you will see the IMSI code, take note of this code as you will need it. Step 6: Now close the SIM Info and go to Security/Find key KI. When this window opens just click Start and wait. It will take approximately 4 hours to find the key. Once it is found take note of this KI and exit. Now we have the IMSI and KI noted, if so lets continue with the next step.
9
file within you will find two files. SEE50s.hex and SEF50sEN.hex. Step 8: Now connect your programmer to a com port and go to the setup menu on your CardMaster program and choose the appropriate com port. You should then see a yellow rectangle at the bottom of the program that says that there is no card. Step 9: Now insert your smartcard into the programmer, and the rectangle should change to green and you will see "Card ready". Now go to where it says "Card type:" and select "Silvercard".
10
SEF50sEN.hex and SEE50s.hex. Step 11: Now go to Edit and click "Auto Program". Step 12: Now insert the newly sim card into the phone. If it asks for a pin just punch in 111. Then from the main menu open up "Sim-Emu". Step 13: Now from this menu go to Set Phone #(Insert phone information here), then GSM #1 (or any slot), then Configure, Edit #. edit GSM #X to any name, and then press ok. 11
which will be 1234. It will then ask you what position you want the card to be, choose Position 1. It will then ask you for the IMSI, which you will punch in the IMSI you got from Cardinal. It will then ask you for the KI, which again you punch in the KI you got from Cardinal. Step 15: Then it will then ask you to enter your PUK which can be anything up to 8 digits. Then it will ask you to enter your PIN which can be anything up to 4 digits.
12
Use the owner number and do the fraud call and huge
amount of call/messages.
13
14
15
16
CDMA Cloning
To do the CDMA cloning we have to change pair of
Software used for CDMA cloning Patagonia In CDMA instead of SIM card RUMI (Re-Usable Identification Module) card is used. Which provides the interchangeably facility in CDMA mobile.
17
Caller ID Spoofing
No of softwares are available in the market which allows
us Caller ID Spoofing. One of them is SpoofTel. It offers us the ability to spoof caller ID and SMS messages. We can change what someone sees on their call display when they receive a phone call to anything we like.
18
19
20
21
Remote locking
Mobile trackers
22
23
Conclusion
The most effective way to improve the privacy of mobile
phone users is to increase the awareness among mobile phone users with the various threats that can compromise their privacy. Existing cellular systems have a number of potential weaknesses that were considered. Finally, cell-phones have to go a long way in security before they can be used in critical applications like mcommerce. However, much more steps and efforts are needed from all people involved in this business including mobile phone operators, mobile phone users, federal and provincial governmental institutes, media, and academia. 24
References
http://mcom.cs.cmu.edu/ http://www.ussc.gov/publicat/cloning.pdf http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html http://www.wisegeek.com http://www.gsm-security.net/faq/imei-international-mobile-equipment-
25
26