Skip to main content

Qualcomm chips insecurity.

Since I can't be too far from phones and alikes,
I started studying Qualcomm chips.
These chips are included in a LOT of data cards
and MANY phones (blackberry,
android based phones, etc)
Well Security on these chips (all of them)
is ridiculous compared to competitors.
Now, let me tell you one thing:
I found a way to know the unlock code
(SP lock, sim lock, network lock, whatever)
directly from the card with a simple procedure.
For now I won't spread this information.
I will wait sometime and give time to
qualcomm or any company producing
phones or cards based on qualcomm chips
to contact me.
If you want to contact me,
you can write your message and
contact as a comment to this post.
Namaste,
Zibri

Comments

  1. Who is back? :D
    Congrats!
    Cheers...
    Daniel

    ReplyDelete
  2. How can i contact you personally any email or IM?

    ReplyDelete
  3. Leave a message here with your email. It won't be published. (Finding my email is not so difficult anyhow :) )

    ReplyDelete
  4. How fascinating!
    ... Your discovery and the b/w photo

    ReplyDelete
  5. Sono curioso di sapere qual'è la procedura di cui parli e come hai fatto a trovarla. Se hai tempo e voglia, puoi dirmi di più? ^__^
    tommasofantini@gmail.com

    ReplyDelete
  6. This comment has been removed by a blog administrator.

    ReplyDelete

Post a Comment

Popular posts from this blog

TP-LINK Configuration file encrypt and decrypt.

Here we go! TP-Link is another company that thinks that security by obscurity could ever work. If you "backup" the configuration from most TP-Link routers, you will get a .BIN file which is "encrypted". Use this utility below, to decrypt it (so you can edit it) and encrypt it again. Have fun. Drop files here or

Obfuscation will never work.

ml> Hello again, sweet readers ! OpenRG is an embedded OS for routers. It's based on Linux and it's inside many ISP routers out there. Inside OpenRG configuration file, passwords appear in a way that can seem to be crypted, but it's just obfuscated. For example: (username(admin)) (password(&b7;X&5c;&b9;&a2;)) Above you can see a simple deobfuscator. Enjoy! You can try it with: &ad;Y&5b;&b3;&a3;&17;T&8b;&c4;&b9;#&96;&04;c&ea;&1d;$%&5d;&16;&08;B3&c0; :) Zibri.

Powerline Ethernet fun and secrets.

Many 200 Mb/s powerline adapters nowadays are based on the INTELLON 6300 chipset. Despite what can be thought looking at them, they are all using the same hardware and firmwares. I heard many people with Netgear XAV101 or Linksys PLK 200 or PLE 200 having problems after firmware updates and many other people with other brands having much more problems because of lack of support or configuration/upgrade utilities. So let me explain a few things I learnt studying them. Many of 200 Mb/s powerline ethernet adapters follow the "HomePlug AV" standard. (85 Mb adapters use HomePlug 1.0 standard which is completely different). This standard uses ethernet broadcast packets using the HomePlug AV protocol. The interesting thing is that their firmware is made of two different parts: a .PIB file (Parameter Information Block) and a .NVM file (the code itself). In the P.I.B. there are many interesting things: The branding (mac address, device name, etc) and the tone map. I test