Hacking Book | Free Online Hacking Learning

Home

how is the base station of china mobile counterfeit? how does the pseudo base station that sends fraudulent advertising messages work?

Posted by herskovits at 2020-03-07
all

I've been contacting this recently. Let's try to explain that 1 pseudo base station is only effective when the mobile phone is not in a call state. When a mobile phone moves from one base station to another without a call, it is called reselection. The option is the mobile phone, which can be understood as the base station where the signal strength of the mobile phone depends. In the case of mobile phone, the same process is switching. The switching is not determined by the mobile phone, but by the network settings, that is, the mobile phone is instructed by the network to choose which base station to stay in. The pseudo base station only takes effect when the mobile phone is not idle. Because the mobile phone is not controlled at this time, it will be cheated by the pseudo base station. 2 the pseudo base station can pretend to be a base station because it is set to the same frequency as the existing base station, which is where it is fake. When the mobile phone is idle, it is always measuring the signals of six base stations. If the pseudo base station has one set and the transmitting power is stronger than other base stations, the mobile phone will choose it without hesitation, and the first step of being cheated begins. 3 from the moment when the mobile phone selects the pseudo base station, the mobile phone has nothing to do with the original network, that is, the user has entered another world, this world is called "location area", and its logo is lac. When the mobile phone reaches the new location area, it must report the lac number. At this time, the mobile phone will report its IMSI identity to the pseudo base station. Please note that these processes are consistent with the standard communication process, that is, the process of hardware and software simulation in other answers. 4 the pseudo base station is also very smart. It accepts the mobile phone and rejects it. Interestingly, the pseudo base station sends a message to the user according to the IMSI reported by the mobile phone, and then the pseudo base station will change its lac to let the mobile phone report IMSI again. His goal is to identify the phone again. If he sends a text message once, he will not send it a second time. Don't think he's so kind as not to harass you for the second time, but to save his resources, send SMS to other users. 5 pseudo base station will no longer accept mobile phones. Step 4: the mobile phone is rejected, unable to enter the network of the pseudo base station, and unable to return to the original normal mobile Unicom Network. Therefore, the user cannot return to the normal state after receiving an inexplicable SMS, so he cannot make a phone call or send a SMS to go online. 6 about authentication. The use of SIM card only refers to the support of network authentication of mobile phone, that is, the illegal network of mobile phone will not be accepted to prevent the access of illegal users. But it does not support mobile phone to identify the network, that is, the illegal mobile phone can not distinguish. Mobile phone authentication is the first mock exam for USIM, which means 4G supports this mode. 7 when a mobile phone leaves the pseudo base station, as long as the signal of the pseudo base station is not strong enough, the mobile phone will eventually return to the normal network, so many people actually only find that they have received a short message and no signal. As long as the mobile phone leaves the pseudo base station for a certain distance, it will still return to normal. The worst thing is that the people who live next to the pseudo base station may suffer from interference and be unable to make a phone call. Finally, go back to the first point. When you are on a call, you will not be cheated by passing the pseudo base station, because the handover is controlled by the network, and you will not be cheated by the pseudo base station. For ordinary users, the easiest way to find a pseudo base station is to report it to customer service. However, most of the pseudo base stations are mobile, so it is difficult to capture them.

I've been contacting this recently. Let's try to explain that 1 pseudo base station is only effective when the mobile phone is not in a call state. When a mobile phone moves from one base station to another without a call, it is called reselection. The option is the mobile phone, which can be understood as the base station where the signal strength of the mobile phone depends. In the case of mobile phone, the same process is switching. The switching is not determined by the mobile phone, but by the network settings, that is, the mobile phone is instructed by the network to choose which base station to stay in. The pseudo base station only takes effect when the mobile phone is not idle. Because the mobile phone is not controlled at this time, it will be cheated by the pseudo base station.

2 the pseudo base station can pretend to be a base station because it is set to the same frequency as the existing base station, which is where it is fake. When the mobile phone is idle, it is always measuring the signals of six base stations. If the pseudo base station has one set and the transmitting power is stronger than other base stations, the mobile phone will choose it without hesitation, and the first step of being cheated begins.

3 from the moment when the mobile phone selects the pseudo base station, the mobile phone has nothing to do with the original network, that is, the user has entered another world, this world is called "location area", and its logo is lac. When the mobile phone reaches the new location area, it must report the lac number. At this time, the mobile phone will report its IMSI identity to the pseudo base station. Please note that these processes are consistent with the standard communication process, that is, the process of hardware and software simulation in other answers.

4 the pseudo base station is also very smart. It accepts the mobile phone and rejects it. Interestingly, the pseudo base station sends a message to the user according to the IMSI reported by the mobile phone, and then the pseudo base station will change its lac to let the mobile phone report IMSI again. His goal is to identify the phone again. If he sends a text message once, he will not send it a second time. Don't think he's so kind as not to harass you for the second time, but to save his resources, send SMS to other users.

5 pseudo base station will no longer accept mobile phones. Step 4: the mobile phone is rejected, unable to enter the network of the pseudo base station, and unable to return to the original normal mobile Unicom Network. Therefore, the user cannot return to the normal state after receiving an inexplicable SMS, so he cannot make a phone call or send a SMS to go online.

6 about authentication. The use of SIM card only refers to the support of network authentication of mobile phone, that is, the illegal network of mobile phone will not be accepted to prevent the access of illegal users. But it does not support mobile phone to identify the network, that is, the illegal mobile phone can not distinguish. Mobile phone authentication is the first mock exam for USIM, which means 4G supports this mode.

7 when a mobile phone leaves the pseudo base station, as long as the signal of the pseudo base station is not strong enough, the mobile phone will eventually return to the normal network, so many people actually only find that they have received a short message and no signal. As long as the mobile phone leaves the pseudo base station for a certain distance, it will still return to normal. The worst thing is that the people who live next to the pseudo base station may suffer from interference and be unable to make a phone call.

Finally, go back to the first point. When you are on a call, you will not be cheated by passing the pseudo base station, because the handover is controlled by the network, and you will not be cheated by the pseudo base station.

For ordinary users, the easiest way to find a pseudo base station is to report it to customer service. However, most of the pseudo base stations are mobile, so it is difficult to capture them.