Propellerads
WHAT'S NEW?
How to become a hacker
How to Get Reliance Jio Sim Without Lyf Phone
Reliance Jio is still not at the point of a commercial rollout, so it's too early to say what the actual user experience will be like on the network. Even the actual pricing has to be announced - as of now, not much is clear really about the network. But you can sign up for Jio and enjoy high-speed connectivity without paying a paisa, and free hai to acha hai, right? That's right, each Reliance Jio SIM comes with at least three months of free, unlimited data usage, voice calls, SMS, and access to Jio services like JioOnDemand.
The commercial rollout of Jio will no doubt affect speeds, network availability, and could lead to call drops as well - while other networks, which stand to lose customers in the process, might actually see some improvement in their services. That's all hypothetical though - but for now, we are really enjoying using our Jio account, and would recommend that you try and get one too.
There are a few different ways in which you can get a Reliance Jio SIM. The network works on 4G, and uses VoLTE for calls, but the latter is not available on old phones. There is an app called JioJoin that Reliance offers which works around this through VoIP calling, in case your phone doesn't support VoLTE, so it isn't a very big problem. The easiest way to get your hands a Reliance Jio SIM is to buy a Lyf phone by Reliance Retail.


Reliance Retail's Lyf range of phones hasn't been getting the most spectacular reviews, but it's the easiest way to get a new Reliance Jio SIM right now. Just walk into a Reliance Digital Store, ask for a new Lyf phone, and you're live on Reliance Jio. You can get a phone for as little as Rs. 3,000, and you'll get three months of free, unlimited Internet access and calling along with it.
lyf_water_7_800.jpg
We can inform you that buying a phone like this, turning on the Wi-Fi hotspot, and using 4G to power your entire home's Internet access, works just fine, and the speed and reliability (at the moment) is better than most broadband connections at home.
This gives you free, unlimited data, calling, and access to all of Reliance Jio's apps for three months, or until the commercial launch of Reliance Jio, whichever is later. But if you don't want to carry around an extra handset everywhere you go, or don't want to buy another phone just to get a Reliance Jio SIM there are other options.
If you have a 4G compatible phone, you can get started with Jio, here's what you need to do to get a Reliance Jio SIM:
1) Make friends with someone working for Reliance
The easiest way to get a Jio SIM is to know someone who works with Reliance. The company allows employees to refer a certain number of people to get Jio SIMs that can be used in your phone. Most Reliance employees are probably used to getting friend requests on Facebook from people that just want a SIM, so you might want to try one of the other methods instead.
2) The Reliance Jio SIM Preview offer
The partner offer is the easiest way of getting a Reliance Jio SIM if you have any of the eligible phones. As of writing this report, the Jio Preview offer has been extended to smartphones by Samsung, HTC, Micromax, Sony, Vivo, Intex, Lava, Gionee, Panasonic, Asus, Xolo, LG, Karbonn, Videocon, YU, Sansui, Alcatel, and TCL.
The complete list of smartphones is as follows:
Samsung phones
Grand Prime 4G, Galaxy J1, Galaxy J2, Galaxy J7, Galaxy J5, Galaxy S5 Plus, Galaxy A5, Galaxy A7, Galaxy Core Prime 4G, Galaxy S6, Galaxy J3 (2016), ON7, Galaxy A8, Galaxy S6 Edge, ON5, Galaxy Note 5, Galaxy Note 4, Galaxy Alpha, Galaxy S6 Edge Plus, Galaxy Note 4 Edge, Galaxy Note 5 Duos, Galaxy S5 Neo, S7, Galaxy A5 (2016), Galaxy A7 (2016), S7 Edge, A8 VE, J5 (2016), J7 (2016), ON5 Pro, ON7 Pro, Galaxy J2 (2016), J Max, Galaxy A9, Galaxy A9 Pro, Galaxy C5, Galaxy C7, Galaxy J2 Pro, Galaxy Note 7.
LG phones
K332 (K7 LTE), K520DY (Stylus 2), K520DY, H860 (LG G5), K500I (X Screen), K535D (Stylus 2 Plus), LGH630D (G4 Stylus 4G) & LGH 442 (LGC70 Spirit LTE)
Micromax phones
Bolt Selfie, Canvas 5, Canvas 5 Lite, Canvas 5 Lite Special Edition, Canvas 6, Canvas 6 Pro, Canvas Amaze 4G, Canvas Blaze 4G, Canvas Blaze 4G Plus, Canvas Evok, Canvas Fire 4G, Canvas Fire 4G plus, Canvas Fire 6, Canvas Juice 4G, Canvas Knight 2, Canvas Mega 2, Canvas Mega 4G, Canvas Nitro 4G, Canvas Pace 4G, Canvas Play 4G, Canvas Pulse 4G, Canvas Sliver 5, Canvas Tab, Canvas Unite 4, Canvas Xpress 4G, Unite 4 Plus, Unite 4 Pro
Yu phones
Yu Yureka, Yu Yutopia, YU Note, Yu Yuphoria, Yunicorn, Yunique, Yuphoria, Yureka Plus, Yureka S
Asus phones
ZenFone 2 Laser (ZE550KL), Zenfone 2 (ZE551ML), Zenfone Max (ZC550KL), Zenfone 2 Laser 5.0 (ZE500KL), Zenfone 2 (ZE550ML), Zenfone Selfie( ZD551KL), Zenfone 2 Laser (ZE601KL), Zenfone Zoom(ZX551ML), Zenfone Go 5.0 LTE (T500), Zenfone 3 ZE552KL, Zenfone 3 Laser( ZC551KL), Zenfone 3( ZE520KL), Zenfone 3( ZS570KL), Zenfone 3( ZU680KL)
Gionee phones
E8, F103 Pro, F103(1GB), F103(2GB), F103(3GB), M4, M5, M5 Lite, M5 Lite CDMA, M5 Plus, P5L, S Plus, S6, S6s, S7, V6L
Karbonn phones
Aura 1, Aura Power, Quattro L45 IPS, Quattro L50 HD, Quattro L51 HD, Quattro L52 VR, Quattro L55 HD
Lava phones
A71, A72, A76, A76 Plus, A88, A89, A97, Ivory s 4g, Lava V5 M, Pixel V2, V2s, X10, X11, X12, X17, X28, X38, X41, X41 Plus, X46, X50, X50 Plus, X81
Xolo phones
Black-1X M, era 1X, era 2X, era 4G, era 4K, era X
Panasonic phones
ELUGA L, ELUGA Switch, ELUGA Icon, T45, ELUGA I2 ( 1GB ), ELUGA L2, ELUGA Mark, ELUGA Turbo, ELUGA Arc, ELUGA I2 2GB, ELUGA I2 3GB, ELUGA I3, ELUGA Icon 2, ELUGA A2, ELUGA Note, P55 Novo 4G, ELUGA Arc 2, P77
TCL phones
FIT 5.5, Pride T500L, TCL 560, TCL 562
Alcatel phones
OneTouch X1, Pixi 4 -5, POP Star, POP3, POP4
Sony smartphones
Xperia X A, Xperia X A Ultra, Xperia X(F5122), Xperia Z5 Dual(E6883), Xperia Z5 Premium Dual
Videocon smartphones
Graphite1 V45ED, Krypton 3 V50JG, Q1, V50FA3, V50FG6
Sansui smartphones
S50 FD45S
HTC smartphone
Desire 626 dual SIM, Desire 628, Desire 630, Desire 728 Dual SIM, Desire 820, Desire 820Q, Desire 820S Dual SIM, Desire 825, Desire 826, Desire 826 DS, Desire 828 DS, Desire 830, Desire Eye, HTC 10, HTC 10 Life style, One A9, One E9 S dual SIM, One E9+ Dual SIM, One M8, One M8 Eye, One M9 Plus, One M9e, One ME Dual SIM, One X9
Vivo smartphones
vivo V3, vivo V3Max, vivo Y21L, vivo Y51L
Intex smartphones
Aqua 4G, Aqua 4G Star, Aqua 4G Strong, Aqua 4G+, Aqua Ace, Aqua Ace 2, Aqua Ace Mini, Aqua Craze, Aqua Eco 4G, Aqua GenX, Aqua Music, Aqua Power 4G, Aqua Raze, Aqua S7, Aqua Secure, Aqua Shine 4G, Aqua Strong 5.1, Aqua Super, Aqua Trend, Aqua Turbo 4G, Aqua View, Aqua Wing, Cloud 4G Smart, Cloud 4G Star, Cloud Crystal 2.5D, Cloud Fame 4G, Cloud Flash, Cloud Glory 4G, Cloud Jewel, Cloud String HD, Cloud String V2.0, Cloud Swift
Just follow these steps on a qualifying smartphone:
  1. Download & Open MyJio App from Play Store
  2. Tap on Get Jio SIM on the Banner
  3. Tap on Agree & Get Jio offer
  4. Select your location from the drop down
  5. Read through the steps and click on Next
  6. Offer Code can be viewed on the screen. Note down your offer code.
Once that's done, you will get a bar code that you need to take to a Reliance Digital where you have to show your phone and you'll get a SIM. Remember to carry a photograph for the form, and your photo ID, and the staff will do the rest. Quick tip: in our experience - and what many other people online are also telling us - the Reliance Digital Xpress Mini Stores are much more efficient about this process than the larger Reliance Digital stores.
Note that though only a few phones qualify for the Reliance Jio SIM under this offer, you can still use this SIM on other phones if you want.
3) Get a JioFi Portable Wi-Fi hotspot
Jio is also keen to go after users at home, taking on broadband providers and not just other phone networks. One of the easiest ways to get a Reliance Jio SIM is to get the JioFi router. Launched first for HP customers, anyone can now get the JioFi router, with three months of free 4G data, although you have to pay Rs. 2,899 for the wireless compact router. That still works out to less than Rs. 1,000 a month for free, unlimited, fast data, so it's a pretty good deal considering that unfair FUPs are the normon all other networks.
The JioFi is a small Mi-Fi device that can create a Wi-Fi zone that up to 31 devices can connect to SIMultaneously; great for taking your phone, laptop, and tablet online all at once. It takes three hours to charge, and can be used to broadcast a signal for six hours on battery, so you can use it at home or on the go. To buy the router, you just need to get it from a Reliance Digital store. You'll need the same documents you need for a SIM card, and you'll have to televerify in the same manner, but then you're up and running.
4) Ask nicely at your local Reliance Digital
Owners of any 4G smartphone can walk in to select Reliance Digital and Xpress Mini stores and get their hands on a Reliance Jio SIM, complete with the Jio Preview offer. The catch is that the offer is only available in select outlets, which can offer Jio SIM cards to customers at their discretion. You can try asking nicely at your local outlet... and if that doesn't work, try at a few other stores as well until someone feels bad and gives you the SIM.
All these methods can help you get a Jio connection right away, before the actual consumer launch in the "coming months". Have you got a Reliance Jio SIM? What's your experience been like? Tell us via the comments.

source regards:- NDTV gadgets 




Check Page Rank of your Web site pages instantly:
This page rank checking tool is powered by PRChecker.info service

Functioning of a Web Server

Internet has become a part and parcel of our daily lives. Surfing the net is facilitated by complex mechanisms at the room of which lies the entering of web address of the desired site. Entering domain name in the URL ( Universal Resource Locator) will cause the URL to be separated in three parts, namely the protocol , server name and the field name . Suppose , we have chosen the URL http://www.ebay.in/web-server.htm; here http is the protocol , www.ebay.in is the name of the server , and web-server.htm is the file name.
The chosen browser (Internet Explorer, Firefox ,Chrome etc.) communication with the name of server for translating the entered server name ‘www.ebay.in into an IP address. This ip address is used for connecting the server in which information of the chosen site is stored. Port 80 is used as bridge for allowing the browser to establish a connection to the server at the generated IP address.
The http protocol acts as a cynosure following which the browser transmits a ‘get’ request to the desired server, demanding information pertaining to the file http://www.ebay.in/web-server.htm. In response to this , the server transmits the HTML text for the desired web page to the browser. The browser is capable of deciphering the HTML tags and formats the page intuitively to suit your computer’s screen.

Loopholes of Web Server /Web Application

The web server is vulnerable to a host of potential attack modes which tend to compromise the performance and security. The loopholes in the web server can be exposed and exploited by
  • Injection Attacks
  • PHP Remote File Includes
  • Cross Site Scripting (XSS)
  • Cross Site Request Forgeries (CSRF)
  • Insecure Communications

Some web server that rank higher on the popularity scale are:

  • Apache Server
  • Microsoft IIS Server
  • IBM Lotus
  • Lighttpd

Vulnerability of the Apache Server

  • CVE-2013-2249 – mod_session_dbd.c in the mod_session_dbd module in the apache HTTP Server before 2.4.5 moves forward with save operations for a given session without factoring in the dirty flag and the need for a new session ID , which is rife with unspecified actions and remote attack vectors.
  • CVE-2013-1896 – mod_dav.c in the Apache HTTP Server before 2.2.25 fails to ascertain properly the enabled status of the DAV for a given URL. This Facilitates launching of a  denial of service (segmentation fault ) assault by remote attackers through a ‘Merge’ request. IN this request , the URI has been setup to be handled by the mod_dav-svn module, however a given href attribute points to a non-DAV URI.
  • CVE-2013-1862 – mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 . Here the data’s written in a log file without the sensitization of the non printable characters. This leaves scope for execution of arbitrary commands by the remote attackers through an HTTP request that contains an escape sequence for a terminal emulator.
  • CVE-2012-4558 – Multiple cross site scripting (XSS) vulnerabilities in the balancer_handler function in the manage interface in mod_proxy_balancer.c in the mod_proxy_balancer  module in the Apache HTTP Server 2.2.x before 2.4.x .This permits injection of arbitrary web  script of HTML by remote attackers through a crafted string.
  • CVE-2012-4557 – The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 . It puts in a worker node into a error condition when it detects a log request processing time. this facilities causing of a denial service (worker consumption ) by remote attackers through an expensive request.
  • CVE-2012-3502 : The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 . Proper assessment of the situation that demands for closing a back end connection is not done. This makes it easy for remote attackers to gain access to critical information in opportunistic situation by deciphering a response , which was meant for a different client.

Ways to Launch Assault against IIS Server

  • Path Traversal
  • Known Worms
  • Remote Command Execution
  • Probes
  • Denial of Service Attacks
  • Compromised Servers

IIS Server Components

Efficient configuration of an IIS server requires proper understanding of the critical IIS components at first. The IIS server components have a wide range, but the prominent IIS components have been enumerated below for ready reference.
  1. HTTP protocol stack (http.sys)
  2. WorkerProcess
  3. WWW Service Administration and Monitoring
  4. HTTP Protocol Stack (HTTP.sys) – During the creation and hosting new website, IIS carry out the registration of the site through http.sys . IT responds to the entire array of hyper text transfer protocols for the website.
  5. http.sys is a driver used by IIS. In IIS , fast processing of requests and non-interruption of service in the event  of the failure of a worker process is ensured . The following services in IIS 6.0 are provided by Http protocol stack:
  6. Routing HTTP services to the proper request queue.
  7. Caching of requests in kernel mode and the last one is carrying out text based logging for WWW service.
  8. Worker processes – The requests such as returning a static page or running a CGI handler are processed. The IIS can be configured for running multiple worker processes.
  9. WWW Service Administration and Monitoring – Like http.sys and worker process this component is built in with core IIS functionality that never loads external code. it is responsible for the management of the worker processed . It includes starting the worker process and maintaining the information about running worker process
IIS Director Traversal
Microsoft Internet Information Server (IIS) offers to ability to a remote to gain insights of the directory listing on the Web server . This is due to loophole in Web Distributed Authoring and Versioning (WebDAV) search function. This vulnerability can be exploited by a remote attacker to search for and view certain files on the system such as .inc files which may carry critical authentication information pertaining to usernames and passwords .
These issues can be resolved by employing the below mentioned efforts:
The ” index this resource ” option should be necessarily disable for directories containing critical information.
In the event that the index server is not required in active use, the same should be disabled or uninstalled

Unicode and Unicode Directory Traversal Vulnerability

The Unicode vulnerability of the IIS server has been exploited by Red Worm, and Red Worm II, and Nimda worm for achieving their ulterior objectives. There are two major vulnerabilities . The first vulnerability pertains to is IIS/PWS Extended Unicode Directory Traversal Vulnerability whereas the second vulnerability is related to IIS/PWS Escaped Character Decoding Command Execution Vulnerability .

Hacking Tool:

There are some hacking tools available on the web , which may be exploited by even inexperienced hackers to break into the security of IIS servers. The most important of the are listed below.

IISxploit.exe



IISxplit
                                    IISxploit


execiis-win32.exe: Another hacking tool which exploits the IIS directory traversal and accepts command from a cmd prompt for execution of the exploit on the IIS server.



execiis-win32
                         execiis-win32

RPC DCOM Vulnerability

The RPC DCOM vulnerability is present in the windows component object model subsystem , which is a critical service put in active use by a majority of windows applications . it has been detected in 2003s july . The DCOM service is activated by default in Windows NT , 2000, XP , and 2003 . The RPC protocol makes way for a program to execute run code on a remote machine . This allows the attackers to search for the vulnerability in COM via any of the given ports:
Port 135 – Remote Procedure Call
Port 139 – NetBios session service runs on this port and all the file and printer sharing on a windows machine runs over this port
Port 445 – TCP port 445 is used for direct TCP/IP MS Networking access without requiring the intervention of a NetBIOS layer.
Port 593 – HTTP RPC Ep Map , Distributed Component Object Model and Microsoft Exchange Server services.

Hot Fixes and Patches

Hot fix refers to a code, which is used for fixing a bug in the product. Users of the product will come to know about hot fixes through notification published on the vendor’s website. Product clients can come to know about the same also through emails from the vendor. Hotfixes sometimes come packaged as asset of fixes known as combined hot fix or service pack. A patch can be viewed as a repair job done to attend a programming problem which attempts to provide an alternate code which is thoroughly rid of the known vulnerability of previous code.

Countermeasures of Web Server

  • One should use well configured and acclaimed firewalls only for heightened security
  • The administrator account should be renamed in a manner it is not easily predictable
  • If any unused application if floating around , the same should be removed
  • Disable directory browsing
  • Service Packs, Hot Fixes , and Templates
  • Analysis of Malicious input in forms and Query Strings so that the attacker cannot exploit the inherent vulnerabilities of that
  • Disabling of Remote Administration
By adhering to the aforementioned steps , you can minimize the risk of external malicious attacks on the IIS server by hackers.
Our Facebook:- www.facebook.com/erusbond


Thank You 
Your:- Swetabh suman


The Ultimate Tool to spy on somebody is in every everybody's pocket ! The Modern Engineering marvel aka Mobile Phone's are everybody's need. People often (mostly) do their confidential talks over cell phone's, But only some know how easy it is to eavesdrop them. There are some tricks and hacks to do that, but the most powerful way is to clone theirSIM Card. The Subscriber Identity Card aka SIM Cardis the transmitter of signal to the mobile and tower, And you can do It easily.

Trending: Turn Your Laptop Into J.A.R.V.I.S From Iron Man!



So What Can You Do When You Clone SIM card ?


Well There are many things to do when you clone a SIM Card, You can secretly spy on the victims calls and data transfers, make him mobile bill go crazy, send messages and make calls from his number, All without touching the victims Cell Phone.

First A Little Knowledge Of SIM Hacking :

Not every SIM Card is clone-able, There are two types of SIM Card :

COMP128v1: The most popular and clone-able version of SIM Cards, Distributed widely till 2004 in USA (2007 In ASIA Countries), Of the number of victim is older than 2004 in USA or 2007 in Asia, Chances are you can clone it pretty easily.


COMP128v2: The newer SIM's, Capable of better 3G Reception, Video Call Support, New and Secure firmware, Complex Design, Very ( I mean very fu*king very) Hard. If the SIM is bought after 2004, it is probably this version.

Things Required :



Or Make your own SIM Writer : CLick Here

The Victim's SIM For 15 minutes to 30 Minutes !

So The inventory is full, Lets Begin The Work :

The main mission in cloning a SIM Card is to get KI and IMSI codes, these codes are the identifier of the SIM Card, and help you register your mobile to the network. 

Trending: HOW TO BUY IN-APP PURCHASE AND REMOVE ADS!


The Step 1 :

Plug in the SIM Reader, Install the software, get the vic's SIM.

Step 2 :

Configure the Software as shown in the below pictures :

Step 3 :

First Run The IMSI Search :
Real Hackers Point, Spoof A Number
Note Down The IMSI Number !


When the results come, write them down. Then start the ICC Search :

Note This Value Down Too.

Write down the ICC Number too, Now run the KI Search, This may take some time :
Real Hackers Point
After 45 Minutes, IF you don't Get the First Value, The Sim IS Un-cloneable !


Now remove the Vic's SIM And give it back to him.

Trending: 190+ Keyboard Shortcuts (Windows) to Boost Your Productivity


Step 4 :

Download SIM-EMU, A software to write settings on Blank SIM Card.
Now insert the blank SIM and wait for it to detect.

Step 5 :

Run SIM-EMU and click the configure tab, 

Enter the ALL the Info Gathered from the Woron Scan Process: IMSI, KI, ICC.

Real Hackers Point : Clone A SIM Card !
The Setup Menu


For the rest Info :
For ADN/SMS/FDN# (ADN= Abbreviated Dialing No. / SMS = No. of SMSes stored on SIM / FDN = Fixed Dialing No.) Enter: 140 / 10 / 4 OR if the Program has suggested values, let it remain as it is.

The Phone Number should be in International Format, EG: For India +91(the international code) 9999999999 (the number)

Step 6 :

Let The Writing Begin, Select the Write To Disk button and Name the File: SuperSIM.HEX.

Real Hackers Point
Wait For The Conformation, Then Select OK.

A write EEPROM file window will appear. Name the EEPROM file SuperSIM_EP.HEX and click the Save button.

Real Hackers Point
Now You Have 2 Files, Ready to be Flashed.

TrendingHow to Password Protect Files, Photos, Videos and Other Docs Using Encryption


Step 7 :

Now We Flash the files on Blank SIM Card  :
Install the card that came with the card writer, cause using any other software will fu*k up your card and your reader.

Our Card Readers Software was Infinity USB Unlimited, The interface can be changed in your software, but the functioning is the same. 

Now Put the required files in the appropriate fields :

Hacking Mobile
Flashing The Blank SIM.

Step 8 :

Now run the writing task, Click on done when it has completed.

Congrats, You Have Cloned A SIM Card ! 


So here you have it, A Cloned SIM Card, Now when somebody calls the victim, Both of the mobiles will ring, same will happen in the case of SMS, But only one can pick up the call. Also don't do something big that will raise a red flag in Mobile Company. You are responsible for your own Shit.

So how was this post ? Love/Hate/Spot A Mistake ? Leave you feedback on the comment section below or on Facebook, Twitter Or Google + . Also If you want us to write an article on something please leave it below and we'll publish the article as soon as we can.

Trending: How To Not Get Hacked, According To Expert Hackers


Thanks Guys, You're Awesome !

Re EDIT 06/01/2016 : A Police Complaint has been filed against one "Nipun Somani", For counterfeit DCMA complaints, Copyright Abuse, Defacement of online property.
And P.S : You've pissed off the wrong guy.

Source regards : http://realhackerspoint.blogspot.in (Thanks)


 
How To Hack WhatsApp Using SS7 Flaw

 

Researchers are easily able to hack WhatsApp and Telegram using the known telecom flaw.


We continuously receive queries from readers about how to hack WhatsApp. The world’s most popular cross platform messaging App is seen to be ultimate hack by many because it has recently enabled 256-bit encryption.


For ordinary souls this encryption would take days and months to decode a sentence or a complete message. Ditto with another secure messaging service called Telegram. Though Telegram is not as popular as WhatsApp, it has its ardent group of followers who use it for its encryption as well as snooping free service.
Though both of these Apps are end-to-end encrypted both of them suffer from hardware side vulnerability which can be exploited to hack and hijack both WhatsApp and Telegram.
The vulnerability lies in Signalling System 7, or SS7, the technology used by telecom operators, on which the highly secure messaging system and telephone calls rely. SS7 is a set of telephony signalling protocols developed in 1975, which is used to set up and tear down most of the world’s public switched telephone network (PSTN) telephone calls. It  also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other mass market services.


SS7 is vulnerable to hacking and this has been known since 2008. In 2014, the media reported a protocol vulnerability of SS7 by which both government agencies and non-state actors can track the movements of cell phone users from virtually anywhere in the world with a success rate of approximately 70%. In addition, eavesdropping is possible by using the protocol to forward calls and also facilitate decryption by requesting that each caller’s carrier release a temporary encryption key to unlock the communication after it has been recorded. Researchers created a tool (SnoopSnitch) which can warn when certain SS7 attacks occur against a phone and detect IMSI-catchers.

source: techWorm


You can view how researchers managed to hack WhatsApp and Telegram using the SS7 flaw below :

 

Telegram Hack