Experimenting with Legacy SIM Cloning (Amena 32k & Movistar 128k) using Huawei E153 - Need some guidance!
![]() |
Hi everyone, I'm a tech enthusiast passionate about hardware security and legacy telecommunications. I've recently started a project to explore SIM card internals and I'm trying to extract the Ki/IMSI from two old cards I found: Amena (auna) 32k (Likely COMP128v1). Movistar 128k. My Setup: OS: Kali Linux. Hardware: Huawei E153 USB Modem. Progress: I've managed to get Modem Manager GUI running, and for the Amena card, I'm getting a 64% signal level, but the operator and IMSI still show as "Unknown". What I've tried: Using mmcli and AT commands (AT+CIMI, AT+CSIM), but I often run into "Unauthorized" or timeout errors. I've tried disabling ModemManager to gain direct serial access via /dev/ttyUSB2. I'm doing this for educational purposes to understand how the COMP128v1 vulnerability works in practice. Has anyone here worked with these specific legacy cards? My specific questions: Is the Huawei E153 stable enough for a long Brute-force scan (using Woron or pySim)? Why would I get a signal lock (64%) but fail to read the EF_IMSI? Could it be a voltage mismatch (1.8V vs 5V)? Any specific AT command sequences to "wake up" these old Amena cards? Any tips, archives, or old-school documentation would be greatly appreciated! Thanks in advance! [link] [comments] |
from hacking: security in practice https://ift.tt/iSrpDbz

Comments
Post a Comment