Experimenting with Legacy SIM Cloning (Amena 32k & Movistar 128k) using Huawei E153 - Need some guidance!

Experimenting with Legacy SIM Cloning (Amena 32k & Movistar 128k) using Huawei E153 - Need some guidance!

Hi everyone,

I'm a tech enthusiast passionate about hardware security and legacy telecommunications. I've recently started a project to explore SIM card internals and I'm trying to extract the Ki/IMSI from two old cards I found:

Amena (auna) 32k (Likely COMP128v1).

Movistar 128k.

My Setup:

OS: Kali Linux.

Hardware: Huawei E153 USB Modem.

Progress: I've managed to get Modem Manager GUI running, and for the Amena card, I'm getting a 64% signal level, but the operator and IMSI still show as "Unknown".

What I've tried:

Using mmcli and AT commands (AT+CIMI, AT+CSIM), but I often run into "Unauthorized" or timeout errors.

I've tried disabling ModemManager to gain direct serial access via /dev/ttyUSB2.

I'm doing this for educational purposes to understand how the COMP128v1 vulnerability works in practice. Has anyone here worked with these specific legacy cards?

My specific questions:

Is the Huawei E153 stable enough for a long Brute-force scan (using Woron or pySim)?

Why would I get a signal lock (64%) but fail to read the EF_IMSI? Could it be a voltage mismatch (1.8V vs 5V)?

Any specific AT command sequences to "wake up" these old Amena cards?

Any tips, archives, or old-school documentation would be greatly appreciated!

Thanks in advance!

submitted by /u/salimeki
[link] [comments]


from hacking: security in practice https://ift.tt/iSrpDbz

Comments