Does the SS7 Attack still work for 2fa?
by Makima - Thursday September 26, 2024 at 03:43 PM
#1
I thought that was dead 10 years ago

Any ideas?
Reply
#2
I ran on a guy who was using it like 1-2 years ago and it was still working.
Although to intercept 2fa , many people are using simswap because its easier to do and doesnt require a lot of money.
Reply
#3
what SS7 tools still working.. i only heard the service is bit expensive to hire.
Reply
#4
While many services are moving toward more secure 2FA methods, like authenticator apps or hardware tokens ,SMS-based 2FA is still pretty common.
Reply
#5
Mostly works. But I havent actually done it in a while. been almost 2 years since I last checked that attack for whatsapp and other 2fa applications. Curious now again Smile)
Reply
#6
(10-05-2024, 06:08 AM)nonameokie Wrote: Mostly works. But I havent actually done it in a while. been almost 2 years since I last checked that attack for whatsapp and other 2fa applications. Curious now again Smile)

Yo het whats up im interested in this too wanna combine expertise to use together?
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Iplogger
Reply
#7
SS7 is still a serious attack method because more than half of the world still uses old-type base stations. However, it's not as easy to exploit as it used to be. It's difficult to exploit without additional hardware, but I thought I'd give you some information in case you're interested in trying it. First, you'll need to purchase the RTL2832 device, which I've shared a picture of below. Then, you need to download a program that converts the frequencies captured by the RTL antenna into a language your computer can understand. What I'm trying to say is that you need to make the captured GSM signal compatible with GSMTAP so you can listen to the data via your computer. For that, you can use the Gr-GSM software. After that, you can listen to the GSMTAP data with the help of Wireshark. Once you've set that up, you can do the following on the target device:
  1. Listen to phone calls
  2. Read SMS and MMS messages
  3. Eavesdrop on surroundings
  4. Obtain location information
  5. Retrieve device information
  6. Get IMEI details
  7. Intercept a message before it reaches the target and modify its content

Note: None of the images I’ve shared belong to me

RTL2832
[Image: s-l1600.webp]

[Image: KaliLinuxAirprobeWiresharkRTLSDR.png]

[Image: The-graphical-interface-of-the-gqrx-prog...al-gnu.jpg]

[Image: Gr-gsm-Livemons-program-interface-writte...python.png]

[Image: Screenshot-with-the-Wireshark-captured-frames.png]

[Image: The-list-of-the-domestic-GSM900-channels...omania.png]
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Dishes out second hand retardation | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you wish to be unbanned in the future.
Reply
#8
(10-06-2024, 09:22 AM)reflex Wrote: SS7 is still a serious attack method because more than half of the world still uses old-type base stations. However, it's not as easy to exploit as it used to be. It's difficult to exploit without additional hardware, but I thought I'd give you some information in case you're interested in trying it. First, you'll need to purchase the RTL2832 device, which I've shared a picture of below. Then, you need to download a program that converts the frequencies captured by the RTL antenna into a language your computer can understand. What I'm trying to say is that you need to make the captured GSM signal compatible with GSMTAP so you can listen to the data via your computer. For that, you can use the Gr-GSM software. After that, you can listen to the GSMTAP data with the help of Wireshark. Once you've set that up, you can do the following on the target device:
  1. Listen to phone calls
  2. Read SMS and MMS messages
  3. Eavesdrop on surroundings
  4. Obtain location information
  5. Retrieve device information
  6. Get IMEI details
  7. Intercept a message before it reaches the target and modify its content

Note: None of the images I’ve shared belong to me

RTL2832
[Image: s-l1600.webp]

[Image: KaliLinuxAirprobeWiresharkRTLSDR.png]

[Image: The-graphical-interface-of-the-gqrx-prog...al-gnu.jpg]

[Image: Gr-gsm-Livemons-program-interface-writte...python.png]

[Image: Screenshot-with-the-Wireshark-captured-frames.png]

[Image: The-list-of-the-domestic-GSM900-channels...omania.png]

Great  post, could you give YT links please or go in more in depth thanks!
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Iplogger
Reply
#9
If MFA uses text messages, and you can use SS7 to intercept this, it would still work right?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  I am new, how does this work romeoo 8 362 9 hours ago
Last Post: 888
  list of morons who work for DOGE & Musk-RAT OriginalCrazyOldFart 4 941 03-16-2025, 02:52 PM
Last Post: DaddyIamGayy
  tribute.work | Looking for admin/mod bfwall 6 487 03-15-2025, 10:34 AM
Last Post: xz9
  SE work Playmaker10 2 316 02-25-2025, 11:58 PM
Last Post: Playmaker10
  Don't quite get how things work and don't want to get banned AlekGuatemala 3 297 02-24-2025, 01:35 AM
Last Post: marcaloca

Forum Jump:


 Users browsing this thread: 1 Guest(s)