Posts

Showing posts from December, 2018

Sim card Cloning

Phone cloning is copying cellular identity from one to another Types of sim cloning         ->CDMA cloning         ->GSM cloning CDMA cloning: code division multiple access (CDMA) mobile telephone cloning involves gaining access to the device's embedded file system  /nvm/num directory via specialized software or placing a modified  EEPROM  into the target mobile telephone, allowing the electronic serial number  (ESN) and/or mobile equipment identifier  (MEID) of the mobile phone to be changed. To obtain the MEID of your phone, simply open your phone's dialer and type *#06# to get its MEID number.  The ESN or MEID is typically transmitted to the cellular company's mobile telephone switching office (MTSO) in order to authenticate a device onto the mobile network. Modifying these, as well as the phone's prefered roaming list (PRL) and the mobile identification number , or MIN can pave the way fo...

Wireless Network Security

Image
Wireless Networking Security � �those who would sacrifice freedom for security deserve neither� � Benjamin Franklin Why go wireless The popularity of wireless network is clearly on the increase. But what are the hidden costs of going wireless? Are we giving up our security? The main benefits of wireless networking are: cost convenience The main drawbacks are: speed security General Security Issues of Wireless Networks Network security issues, whether wired or wireless, fall into three main categories: availability, confidentiality and integrity: Confidentiality:  is the information being sent across the network transmitted in such a way that only the intended recipient(s) can read it. Integrity:  is the information reaching the recipient intact Availability:  is the network available to users whenever it is supposed to be Confidentiality The main way to ensure that data is not disclosed to unauthorised users is by encrypting it during...