# Review

### Attacks on device

* Caller ID check&#x20;
* SMS sender check&#x20;
* Bruteforce
* Default passwords, stolen passwords
* Lack of authorization
* Online configurators
* Hidden commands and passwords

### Attack on connection

* Jamming connection modem - base station
* Attacks on mobile networks&#x20;
* Spend all money in account or change tariff
* Block SIM-card
* Flood with calls

### Attack on other systems

* Insecure security agency
* Old protocols
* Attacks on family/employees
* Phishing
* Spoofed reverse call from device
* Reverse-attacks on mobile operator

### Common Types of Telecom Attacks

#### Denial of Service (DoS) Attacks

DoS attacks aim to make the telecom network unavailable to its intended users. Attackers typically flood the network with excessive traffic, causing legitimate users to experience service interruptions.

#### Man-in-the-Middle (MitM) Attacks

In a MitM attack, the attacker intercepts and potentially alters the communication between two parties without their knowledge. This can lead to data theft or unauthorized data manipulation.

#### Eavesdropping

Eavesdropping involves unauthorized interception of voice, data, or messaging services. Attackers can capture confidential information or conversations without the user's consent.

#### SIM Card Cloning

SIM card cloning allows an attacker to create a duplicate of a victim's SIM card. This enables the attacker to make calls, send messages, and access the victim's data plan, leading to potential financial loss.

#### SMS Phishing (Smishing)

Smishing involves sending fraudulent SMS messages to deceive users into revealing personal information, such as login credentials or financial information, which can then be used for malicious purposes.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://gsm-hacking.telco-sec.com/gsm-attacks/review.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
