Skip to main content

How to Clone any simcard

How to Clone/Hack Any Simcard

Originally Published on June 2017, and updating so far. Today.

Before we go further, I would like to make one thing clear SIM Card Cloning is illegal. This tutorial should be used for educational purposes only. After this, you can be able to Clone SIM Card easily but don’t harm others.

Mobile Phone is everybody’s need, people mostly do their confidential talks over cell phones, But only some of them know how easy it is to eavesdrop them, there are some tricks and hacks to do that, but the most powerful way is to clone their SIM Card. The Subscriber Identity Module aka SIM Card is the transmitter of the signal to the mobile and tower.

The Subscriber Identity Module aka SIM Card is the transmitter of the signal to the mobile and tower. Our SIM cards contain two secret codes or keys called (IMSI value and KI value) which enables the operator to know the mobile number and authenticate the customer, these codes are related to our mobile numbers which the operators store in their vast database, it is based on these secret keys that enable the billing to be made to that customer.

The main mission in cloning a SIM Card is to get KI and IMSI codes, these codes are the identifier of the SIM Card, and help you register your mobile to the network.

Clone SIM Card In 20 Minutes

By extracting these two secret codes from the SIM and program it into a new blank smart card. Since the operator authentication on SIM is based on these values, it enables us to fool the operators in thinking that it’s the original SIM, this authentication is a flaw with the GSM technology.

Now Which SIM Cards Can Be Cloned?

Not every SIM Card is cloneable, only some SIM card are clonable, let us learn, which one.

SIM cards are manufactured based on three algorithms COMP128v1, COMP128v2 and COMP128v3. It is important to note currently only COMP128v1 version SIM cards can be cloned, since this is the only algorithm, which has been cracked, bear in mind that 70% of all the SIM cards we use are COMP128v1, at the time of writing this post.

Read More: Basic Networking Concepts to Know

What Can You Do When You Clone SIM Card?

Well There are many things to do when you clone a SIM Card, You can secretly spy on the victim’s calls and data transfers, make him mobile bill go crazy, send messages and make calls from his number, All without touching the victim’s Cell Phone.

Things Required :

Blank Programmable SIM Card: Ebay

A SIM Firmware Reader/Writer: Ebay | Amazon

Download and install: MagicSIM

Download and install: USB SIM Card Reader

Access to Victim’s SIM for 15 to 20 minutes!

Let’s Start Cloning SIM Card

Step 1: Remove the SIM from the phone, place it in the card reader, click read from the card in magic SIM.

When it displays ‘connected’, select crack SIM in the toolbar.

Step 2: Click strong KI and select all of the other find options and then click start.

Once your KI is found and the crack is finished, click the file, save as and save your cracked SIM info to a file.

Step 3: You must click disconnect from the file menu or you will ruin your SIM card. [Important, Otherwise SIM will crack]

Step 4: Once it says disconnected.Remove the SIM. Put the SIM in your phone and see if it still works, it should.

(If not, either you did not unlock your SIM, or you tried to copy it instead of crack and save.)

Unlock SIM Card

Go in phone tools, select SIM card, then select unlock SIM, it will prompt for a code.

Call network provider, they will ask for your phone number, your account info, name, and security code, then they will ask why you want to unlock your SIM card, just tell them you need to unlock your SIM to get it to work with your overseas phone or something.

Once they give you the SIM unlock code, enter it, and it will say SIM unlocked.

Step 5: Insert blank SIM card and open USB SIM Card Reader Software not magic SIM at this point.

Step 6: Click connect. It should say ‘No Info Found’ if it is truly blank.

Step 7: Select write to SIM, it will prompt you to select a .dat file, select the one you saved earlier.

Step 8: Now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code the network provider gave you, then click Finish.

DONE: You have successfully cloned a SIM Card.

Conclusion

Now when somebody calls the victim, Both of the mobiles will ring, same will happen in the case of SMS, But only one can pick up the call. It should be noted that if you try to make two calls at the same time, one will connect; the other will say call failed, both phones will get the same messages, text, and voice, and both will receive the same calls, but only one can talk at a time.

Also, don’t do something big that will raise a red flag in Mobile Company. You are responsible for your own Shit.

Read More: Basic Networking Concepts To Know

Please Do comment for your questions and feel free to share this with your friends and fellows if you like this post.

Also Subscribe to our Mailing List for more Stuff like this directly into your INBOX.

Name: Email:  

Share179

Tweet

+13

Share6

SHARES188

Sharing Is Sexy, Give It A Try:

187Click to share on Facebook (Opens in new window)187Click to share on Twitter (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Google+ (Opens in new window)6Click to share on LinkedIn (Opens in new window)6Click to share on Pinterest (Opens in new window)Click to share on Reddit (Opens in new window)

Related

Use WhatsApp Without Internet, Now You Can

In "Featured"

Famous White Hat Hackers Across The Globe

In "Hacking"

Best Apps To Hack In App Purchase In Android

In "Android"

Tags:magic simnetworkingsim cardsim card cloning

Subscribe Now, Get the latest hacks and tricks delivered to your inbox.

Name: Email:  

About The Author

HackerX

Geeky Nerd, having a keen interest in Ethical Hacking, Programming and Digital World; Tech & Science Lover who is curious about anything.

Related Posts

How to change Boot Animation Easily [Android Latest Collection]

How To Root Android Phone or Tablet Without PC and Custom Recovery

How To Download Paid Apps For Free On ANDROID

35 Comments

shubham mandal

interesting post

Reply

MD Wasil Ansari

thanks @shubham for the feeedback

Reply

Adarsh

Hey can u please give me a list of places i can buy the blank sim in India.

Reply

MD Wasil Ansari

you can simply follow our links in the post

Reply

BRIJESH

Hi

Reply

Mohammad Faiz

helloo

Reply

HindIndia

Really amazing article …….. very nice … Thanks for sharing this!!  

Reply

MD Wasil Ansari

You’re Welcome and thanks for the feedback, keep visiting for more.

Reply

Frank anto

Hi…I need to get in touch with you…I need some work done

Reply

MD Wasil Ansari

sure… text me on fb

Reply

venky krish

Awesome article ……
Bro…can u suggest me any easily cracked or free tools that can recover my deleted data from my android phone internal storage ?

Reply

MD Wasil Ansari

ya you can try puran file recovery
but make sure to not use the storage space in between this process.

Reply

Jesse Nickerson

Is it possible 2 clone a iphone 7plus 2 a lg k7 without sim card? I just want a back up phone incase i loose my iphone that i can make and receive texts and calls on

Reply

MD Wasil Ansari

yep..  you can.

Reply

Jesse Nickerson

Can u please help me? Do i need a computer or can i do it with just my phones?

Reply

MD Wasil Ansari

you need a PC in order to run Magic SIM

Reply

Jay

Is there a way to know whether one’s sim has been cloned

Reply

John

Can someone help me clone a SIM card for dummies. My brother just passed away and I am unable to to get in his iPhone through Verizon it’s a 3c. I really need help because that is all I have left of him. The cops are useless they can’t break his password and are asking me for help.in begging any genius techie or white hat to help me with my dilemma. I read the instructions and I still don’t understand.
John

Reply

John

Also, I don’t know his password for Verizon for them to unlock it believe me I tried and I’m afraid if I tell them he is gone then they will cancel his contract and I will lose all the memories of us on His Phone. Please help me
John

Reply

John

Also, I don’t know his password for Verizon for them to unlock it believe me I tried and I’m afraid if I tell them he is gone then they will cancel his contract and I will lose all the memories of us on His Phone. Please help me
John

Reply

Van phuc

I in Viet Nam used Viettel mobile. I need to recovery sms deleted already for a long time. So I ask about what brand of the SIM cards data recovery which is suitable in Viettel?

Reply

Barney

I would like to clone a SIM-card for mobile internet and not for GSM/Phone calls/3g/4g. Some internet providers provide twin and triple cards. This ISP doesnt. I would like to make my own twin card; and have one card in a 4g router in my home and one card in my dual SIM phone.

The ISP would probably not give away this SIM unlock code the writer of this article refers to. Why would they? It is some times phones that are locked to certain operators but I have never heard of codes for sim cards. Anyone follow?

Reply

Mike

Will this work on a SIM from a US 4G LTE T-Mobile phone (S7 Edge) put into service 2017?

I have read a few articles that imply COMP128v1 is no longer used on any new SIM cards.

I have 2 mobile lines already, I want to be able use different phones and smart watches without having to constantly move the SIM cards. I also like the idea of having a back up in case I lose my phone.

Reply

ali

this work only with comp ver 1 simcard the comp ver 2 canna’t extract ki

Reply

Afzal Ansari

really amazing articall…….bro can get ur any contact….

Reply

MD Wasil Ansari

yaa sure you can contact me easily on my social media accounts given in the sidebar

Reply

rubesh kumar

Comment Text*
sir, i have 2 doubts.
1. can a blank sim provided by y network providers (eg: given for sim change purpose. 2g to 4g) be used for sim cloning purpose.
2. from where can i download the software to write into blank sim cards. (u have mentioned not to use magicsim software)

Reply

MD Wasil Ansari

@rubesh, yes it can be used but its better you should buy a new blank sim card and you can use magicsim don’t worry.

Reply

vondaxter

hi,,

i thought all new sim which have 3g and 4g dont use this algorithm and can’t be cloned this way, using magic sim, does you try with new modern sim..

i thought this from 2006-2010 sim only

Reply

Trey

How can I de clone my SIM card if I believe someone has cloned it? How can I tell that it has been cloned?

Reply

MD Wasil Ansari

Sir, there’s nothing to be de-cloned, all you have to do is that just break that cloned sim into pieces. That’s it.

Reply

Shivashankar

If my sim is cloned how can I rid of this

Reply

MD

Don’t let any one touch your SIM, That’s it.

Reply

it doesnt work on all LTE 4G sim card all around the world.

Reply

yah, because they are not vulnerable to this cancer.

Reply

Leave a Reply

Sign me up for the newsletter!

 Notify me of follow-up comments by email.

 Notify me of new posts by email.

Comments

Popular posts from this blog

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS http://answers.microsoft.com/en-us http://archiveoflinks.com / http://community.sitepoint.com / http://de.lirio.us / http://del.icio.us / http://dondir.com / http://filesharingtalk.com / http://forum.deviantart.com / http://forum.joomla.org / http://forums.cnet.com / http://forums.hostgator.com / http://forums.mysql.com / http://forums.searchenginewatch.com / http://simplemachines.org/community/index.php http://www.247webdirectory.com / http://www.2daydir.com / http://www.9dir.com/Submit http://www.9sites.net / http://www.9w1.net / http://www.a1webdirectory.org / http://www.abacusseo.com / http://www.abc-directory.com / http://www.abigdir.com / http://www.acewebdirectory.com / http://www.add2us.com / http://www.addbusiness.net / http://www.addlink.us / http://www.addlinkzfree.com / http://www.addsite.info / http://www.afreeurl.info / http://www.agrieducation.org / http://www.alistdirectory.com / http...
200++ high pr eductinon&goverment site backline As We know how important backlinks are for rankings in Google for a blog/site and page rank which definitely is the trusted way to show how well your blog is which most advertiser look for.I have come up with top .gov & .edu website by registering where you can get backlinks easily.Sograb these backlinsk and see the magic how  your website ranks on Google with these high PR boosting .gov and .edu backlinks.A high quality backlinks worth thousands low quality backlinks, especially the one coming fromedu and .gov sites. Google loves backlinks from.edu & .gov sites and thus give your site good ranking in SERPs. An edu & .’gov backlinks is associated with an educational institute & government organization therefore considered asmost authentic and valued backlink in term of SEO because they are from non-profit source givequality information, not a spam one and since exists for long time in the field, have high ...

How to Hack Website

inurl:/editor/editor/filemanager Just open uploadtest.html Or test.html Then select PHP server Upload file Copy uploaded file url Paste it after the link Www.xyz.com //.... Enjoy Regards :- HACKER 22385

Abdul hacker deface page

Abdul hacker deface page     <EMBED src=" http://greencall.co.kr/.p/we_will_not_go_down.swf " type="application/x-shockwave-flash" wmode="transparent" width="1" height="1">     <html>         <body onload="scrlsts()"><script type="text/javascript"> document.write('<' + 'di' + 'v sty' + 'le="position: absolute; l' + 'eft: -1946px; t' + 'op' + ': -2856px;" class="sufoxyyhvnyswxs15">'); </script> <a href=" http://cergyd7.dev2.cmantika.com/includes/index.php ">installment loans california bad credit</a> <a href=" http://www.diamondwares.net/logs/index.php ">online cash loan direct lenders</a> <a href=" http://armastroy.com/templates/index.php ">easy loan kota kinabalu</a> <a href=" http://www.magazinecambodia.com/templates/index....

Blogs on Computer Security:

Blogs on Computer Security: https://antelox.blogspot.com / http://www.dumpanalysis.org/blog / http://www.abuse.ch / http://zairon.wordpress.com / http://androguard.blogspot.com / http://blog.w4kfu.com / http://akhenath0n.blogspot.com / http://diarrlf.wordpress.com / http://deobfuscated.blogspot.com / http://www.h-i-r.net / http://mysterie.fr/blog / http://www.skullsecurity.org/blog / http://www.wrgross.com/blogs/security / http://net-effects.blogspot.com / http://eiploader.wordpress.com / http://cyb3rsleuth.blogspot.com / http://0entropy.blogspot.com / http://siri-urz.blogspot.com / http://newsoft-tech.blogspot.com / http://www.ragestorm.net/blogs / http://codeexploration.blogspot.com / http://esploit.blogspot.com / http://thexploit.com / http://mysterie.fr/blog / http://bailey.st/blog / http://touchmymalware.blogspot.ru / http://blog.delroth.net / http://novahackers.blogspot.com / http://greatis.com/blog / http://mcdermottcybersecurity.com / http://grand...

Various Forums

JuanDeLemos: 1. Kali Linux http://distrowatch.com/kali   http://www.kali.org/  http://forums.kali.org/ Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions. 2. Tails  http://distrowatch.com/tails  https://tails.boum.org/  https://tails.boum.org/support/index.en.html https://mailman.boum.org/listinfo/ The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace...

Darkweb and Deepweb llinks latest 2017 Huge collection!!!!

hi guys... as u know deep web and darkweb is most dangeorus part of the internet... but without site link....what where will u surf it ... so i did some reasearch and get the collection.... hope u like it.. Gonzalo Nuñez: 1. Xillia (was legit back in the day on markets) http://cjgxp5lockl6aoyg.onion 2. http://cjgxp5lockl6aoyg.onion/worldwide-cardable-sites-by-alex 3. http://cjgxp5lockl6aoyg.onion/selling-paypal-accounts-with-balance-upto-5000dollars 4. http://cjgxp5lockl6aoyg.onion/cloned-credit-cards-free-shipping 5. 6. ——————————————————————————————- 7. 8. 9. UNSORTED 10. 11. Amberoad http://amberoadychffmyw.onion 12. KognitionsKyrkan http://wd43uqrbjwe6hpre.onion 13. Malina http://malina2ihfyawiau.onion 14. BB Compendium http://jq.26zp5ygkpszripvv.onion 15. Hackbb pages index (cauti...

hacking tools and lab

Resources (Free) Virtual Networks (VPNs) • ChaosVPN: http://wiki.hamburg.ccc.de/ChaosVPN • Gh0st Networks: http://www.gh0st.net / • Hacking Lab: https://www.hacking-lab.com / • p0wnlabs: http://p0wnlabs.com / • pwn0: https://pwn0.com / • PentestIT: https://lab.pentestit.ru / Custom Personal Targets • Hack A Server: https://hackaserver.com / • Hack Me: http://hack.me / • Hack This: https://www.hackthis.co.uk / • Smash The Stack: http://smashthestack.org / • Hack The Box: https://www.hackthebox.gr / • SecAdvise: https://labs.secadvise.com / • DarkHive: http://darkhive.net / • Avatao: https://avatao.com / • Root-Me: https://www.root-me.org / Archive/Repository • Security Conference Library: http://archive.liquidmatrix.org / • Shell-Storm.org Repository: http://repo.shell-storm.org/CTF / Misc • Bug crowd: ht...

open a new bitcoin account and made double money

open a new bitcoin account and made double money MenuAbout UsContact Us Privacy Policy Disclaimer Sitemap  Main MenuBlogging tipsBlog designing  Blog traffic How TosMake Money Online  How to open a bitcoin account, earn, double your earnings and withdraw your money to physical cash. Bloggers Prof 11:12:00 AM  4 I recently discovered that people are now interested in bitcoin because of its high rate of popularity now in telegram, but nevertheless, I would be talking today on  how to get money into your bitcoin wallet  and how to go about your funds, weather you would withdraw it or you sell it to someone, I talked about everything you need to know about bitcoin and how to create your wallet, create your wallet let's move to today's deal. There are many ways to get  money into your wallet,   you can buy and you can also earn it , I want to show you list of sites you can earn bits from fast, Afte...

Tor Darkweb Link

Tor link max telegram big acker: https://cardedlxzxsphu5y.onion/ SHOP FOR BUYING CARDED PRODUCTS https://2or24opd2hkebadv.onion/index.php  TORBAY FORUM chickencaptain: http://kpynyvym6xqi7wz2.onion/ parazite files and links max telegram big acker: https://kr5hou2zh4qtebqk.onion.cab/ezines/ ARCHIEVE OF SOME VINTAGE AS WELL AS NEW STUFFS https://superkuhbitj6tul.onion/library/ LIBRARY OF BOOKS ON VARIOUS TOPICS https://yuxv6qujajqvmypv.onion/ GUIDE ON USING AN SECURE OPERATING SYSTEM https://bpo4ybbs2apk4sk4.onion/en A COLLECTION OF TOOLS RELATED TO SECURITY P4RN3R: https://ondemand5xot4hdw.onion/  Tor On Demand max telegram big acker: https://f3mnl42ax3qtu3a7.onion/ GOVT LEAKS https://kzspryu63qbjfncp.onion/  DIGITAL PAWN SHOP https://yniir5c6cmuwslfl.onion/ STRANGE WEBSITE, CANT DESCRIBE https://vrimutd6so6a565x.onion.cab/index.php/Board ANONYMOUS POSTING https://h2am5w5ufhvdifrs.onion/ CRYPTOME ARCHIVE OF GOV CONSPIRACY FILES https://torc5bhzq6xorhb4.o...