In this video, Limor and Philip from Citizen Engineer, demonstrate how to clone SIM cards and hack payphones to do interesting things. The SIM card section starts with a primer on how the authentication works in the GSM world – challenge / response where the SIM contains the encryption key which is used to encrypt the challenge sent by the base station. Now the problem seems to be that there is no way to retrieve the encryption key directly from the SIM cards and the only way (which also only works for older cards) is to use a chosen plain text attack. This attack is carried out by connecting the SIM to a computer and bombarding it with encryption requests for known plain texts. After enough samples go through, the encryption key can be cracked. Once the encryption key is known it is trivial to clone the card using a writer. The video demonstrates the whole hardware hack on how to build your own reader, however, if you do not have the patience or the necessary skills / equipment then you can purchase one from them directly. In the later part of the video, Limor demonstrates how to modify Western Electric payphones so that they can be used as a home telephone, for VoIP (Skype) and to make it accept quarters. The whole video is more of a “hardware hacking” session than much of software. Its very well made and is definitely a recommended watch.
Related Posts
Are Mac’s really safe?
Mac users for many years were proud to say they don’t need to use anti-virus because there is no virus […]
Things to do in 2012: Questions to Ask of Cloud Vendors
Very good post I found with key questions you need keep in mind when considering Cloud Computing. Enjoy it! Luciano […]
Security firm claims Mac security is “10 years behind” Microsoft
Interesting that couple of days after I have wrote about Mac anti-virus we are receiving this interesting news… By Chris […]