mobile cloning technology

26
Mobile Cloning Technology Submitted By :- In The Name Of ALLAH Most Beneficent Most Mercif

Upload: maham4569

Post on 14-Apr-2017

198 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Mobile Cloning Technology

Mobile Cloning Technology

Submitted By :- HEERA TAZEEN (3KC12CS007)

In The Name Of ALLAH Most Beneficent Most Merciful

Page 2: Mobile Cloning Technology

CONTENTS• INTRODUCTION• HISTORY• GSM AND CDMA• IMPORTANT TERMS• HOW A CELL PHONE IS CLONED?• HOW TO KNOW THAT THE CELL PHONE HAS BEEN CLONED?• DETECTION OF A CLONED CELL PHONE IN A NETWORK• HOW TO PREVENT CELL PHONE CLONING?• ADVANTAGES AND DISADVANTAGES• CONCLUSION• REFERENCES

Page 3: Mobile Cloning Technology

INTRODUCTION

CELL PHONE CLONING

• The result of that is a "cloned" phone.

• Taking the programmed information from mobile phone and programming the identical information into another mobile phone.

Page 4: Mobile Cloning Technology

HISTORY

• In 1990s cell phone Cloning started with Motorola “bag” phones.

• In mid 90’s they are commonly available by Motorola Co such as the classic, the ultra classic, and the model 8000.

Page 5: Mobile Cloning Technology

GSM AND CDMAGSM• A digital cellular phone technology based

on TDMA.• GSM phones use a SIM card that contains

user account information.

CDMA• Transmitting simultaneous signals over a

shared portion of the spectrum. • There is no SIM card unlike in GSM.

Page 6: Mobile Cloning Technology

IMPORTANT TERMS

IMEI (International Mobile Station Equipment Identity)

• Helps to identify valid devices.• Used for stopping a stolen phone from

accessing the network.

ESN (Electronic Serial Number)

• Used to uniquely identify a mobile phone operating on CDMA network.

Page 7: Mobile Cloning Technology

MIN (Mobile Identification Number)

• MIN is a number that is derived from the 10 -digit directory telephone number assigned to a mobile station.

Page 8: Mobile Cloning Technology

HOW IS CELL CLONING DONE?

• Modifying or replacing the EPROM in the phone with a new chip which allow to configure an ESN via software.

• We have to change the MIN. • Cloning require access to ESN and MIN

pairs.• ESN/MIN pairs can be discovered in several

ways:

Page 9: Mobile Cloning Technology

CONTD… • Sniffing the cellular.• Trashing cellular companies or cellular

resellers.• Hacking cellular companies or cellular

resellers.• Cellular thieves can capture ESN/MINs using devices such as cell phone ESN reader or digital data interpreters (DDI).

• After the ESN/MIN pair is captured, the cloner reprograms the microchip of any wireless phone.

Page 10: Mobile Cloning Technology
Page 11: Mobile Cloning Technology

WHAT IS PATAGONIA?

• Used to clone CDMA phones.• Using this software a cloner can

modify the ESN/MIN of any CDMA phone.

Page 12: Mobile Cloning Technology
Page 13: Mobile Cloning Technology

• After we have modified the EEPROM of our device, it can be used as a cloned device.

• Now we can use our phone for making fraudulent telephone calls but the bills for the calls will go to the legitimate subscriber.

Page 14: Mobile Cloning Technology

HOW TO KNOW THAT THE CELL HAS BEEN CLONED?

• Frequent wrong number phone calls to your phone, or busy.

• Difficulty in placing outgoing calls.• Difficulty in retrieving voice mail

messages.• Incoming calls constantly receiving busy

signals or wrong numbers. • Unusual calls appearing on your phone

bills.

Page 15: Mobile Cloning Technology

DETECTION OF A CLONED PHONE IN A NETWORK

• Duplicate Detection• Velocity Trap• Usage Profiling• Call Counting

Page 16: Mobile Cloning Technology

DUPLICATE DETECTION

• The network sees the same phone in several places at the same time.

• Reactions include shutting them all off so that the real customer will contact the operator because he lost the service he is paying for.

Page 17: Mobile Cloning Technology

DUPLICATE DETECTION

Page 18: Mobile Cloning Technology

VELOCITY TRAP• It notices when the mobile phone seems

to be moving at impossible, or most unlikely speeds.

• So service will be terminated until the real user is verified.USAGE PROFILING

• Profiles of customers phone usage are kept, and when discrepancies are noticed, the customer is contacted.

Page 19: Mobile Cloning Technology

CALL COUNTING

• Both the phone and the network keep track of calls made with the phone, and should they differ more than the usually allowed one call, service is denied.

Page 20: Mobile Cloning Technology

HOW TO PREVENT PHONE CLONING?

• User verification using PIN(Personal Identification Number)

• Blacklisting of stolen phones

• Traffic analysis

• Electrically checking the ESN/MIN

Page 21: Mobile Cloning Technology

ADVANTAGES

• If your phone has been lost , you can use your cloned cell phone.

• If your phone got damaged or if you forgot your phone at home or any other place . Cloned phone can be helpful.

Page 22: Mobile Cloning Technology

DISADVANTAGES

• It can be used by the terrorists for criminal activities.

• It can be used by the cloner for fraud calls.

• It can be used for illegal money transfer.

Page 23: Mobile Cloning Technology

CONCLUSION

To avoid such abuse to telecommunication system it is absolutely necessary to check out the weakness and vulnerability of existing telecom systems.

Page 24: Mobile Cloning Technology

REFERENCES

http://www.hackinthebox.org

http://realhackerspoint.blogspoint.in

http://www.google.com

http://www.Wikipedia.org

 Sankaranarayanan ,“Mobile phone cloning”, Wireless And Optical Communications Networks (WOCN), 2010 Seventh International Conference in Sept,2010.

http://www.Slideshare.net

Page 25: Mobile Cloning Technology
Page 26: Mobile Cloning Technology

ANY QUERIES