falokeys.blogg.se

Prolific usb to serial comm port software reader card gsm
Prolific usb to serial comm port software reader card gsm







prolific usb to serial comm port software reader card gsm

You can select and read the records in this file using the following example APDU sequence:Ġ000: 00 00 01 44 8f 0c 04 00 00 f0 44 01 02 01 12. Records are numbered 0x02.0x11, one for each of the 16 identities that you can store on the SIM. ĮF.OPN is a record-oriented file with the File ID 8f 0c and a record-length of 0x12. It contains EF's with the user-modifiable IMSI, Ki and other values.

prolific usb to serial comm port software reader card gsm

DF.ADMIN ¶ĭF.ADMIN is a dedicated file (directory) with the File ID 7f 4d. The traces have been generated using "but any tool that allows you to send and receive APDUs will work. Please note, this information assumes that you are generally familiar with ISO 7816-4 smart cards, as well as the GSM 11.11 specification. Here is some information on how you can program them. We've spent some time reverse engineering those cards. Unfortunately those cards come without any documentation and only with a proprietary Windows-based tool for programming. The currently active identity from the Phone UI. They include a SIM toolkit (STK) application for switching They are intended for COMP128v1 based cloning,Īnd enable the user to aggregate up to 16 SIM card identities on one card. Various stores around the world seem to be selling cheap so-called 16-in-1 SIM cards. Therefore, we need some alternative solution: A SIM with a known A3/A8 algorithm, where we can program the actual Ki. When you want to use OpenBSC with actual cryptographic authentication, then the secret Ki of the SIM needs to be known.Įxtracting the Ki of regular SIM cards issued by GSM operators is typically not possible.









Prolific usb to serial comm port software reader card gsm