A look at APDUs and Interacting with Cards
The basics of Smart Cards & their File System
Getting up close and personal with Smart Card / SIM Cards
Acronyms and cryptography – a look at Subscriber Identifiers in 5G
What do Unlock SIMs sold online actually do and how do they do it?
Using Mkcert to generate valid SSL certificates on your local machine for development
Quick look at cheap “Magic SIM Cards”, what they do, how they do it, and the amazing graphics they use.
Using Transport Layer Security (TLS) to protect SIP traffic from modification / manipulation and guarantee message authenticity.
How the P-CSCF address is assigned to a UE in Protocol Configuration Options (PCO) during bearer establishment.
Viewing the payload of an Encapsulated Security Payload in Wireshark.
Reverse Engineering the Samsung Sysdump app to unlock IMS Debug and TCPdump functions
Unlocking the built in IMS Debugging tool in Samsung’s Sysdump Utility
Feature Update on PyHSS the Python Home Subscriber Server
Using osmo-sim-auth to query USIM/SIM cards authentication mechanism.
Exploring the how and why of Authentication in LTE & NR networks.
Adventures in getting USIMs to use on private LTE networks.
Creating a Kamailio based SIP Honeypot
Using GeoIP2 module to trace source of traffic and use that for routing in Kamailio
The other day I got an SMS from my bank, one of the big 4 Australian Banks. BANKNAME Alert: Block placed on card ending in XXXX, for suspicious transaction at ‘THING NICK PURCHASED ONLINE’ for $29.00 at 13:56. If genuine, reply ‘Yes’. If Fraud, reply ‘No’. SMS from bank They’d detected possible fraud on my […]
We’ve talked a bit in the past few posts about keys, K and all it’s derivatives, such as Kenc, Kint, etc. Each of these is derived from our single secret key K, known only to the HSS and the USIM. To minimise the load on the HSS, the HSS transfers some of the key management […]