Retrieve the phone number that has been lost for half a year

Source: Internet
Author: User

I lost my mobile phone for half a year, so I found it back. The process was tortuous and I could write a story. There are many security-related things, hoping to inspire everyone.

Samsung mobile phones have such a good function called "urgent help". They are designed in many mobile phones to be "under threat, A text message is sent to an emergency help number. After receiving the text message, you can call the emergency help number and the mobile phone will automatically answer it.

This is a very good function. There are usually some external key combinations to complete this function, for example, "in the screen lock status, four connections follow the phase key. Because it is easy to trigger, this function will be very depressing. If you leave it in your pocket, you may press it. My mother-in-law's mobile phone number, of course, is me. One day, my mobile phone is lost.

Put it in a bicycle on the same day. After the phone is lost, the phone number is called multiple times and the phone number is not answered until the other party shuts down. Angry at the same time, also want to think, if that function... How can I use a cell phone bomb to kill him?

After half a year, this problem also fades away, and it has long been no longer entangled in mobile phones. One day, I received a strange number and sent me a text message: "Help! Please call me. My situation is urgent ". At that time, I thought someone had sent a wrong message. I only remembered it when I went to bed at night. Who would have sent the wrong text message?

I thought about it, so I couldn't sleep anymore. Look at how I killed you with a bomb!

But for a long time, I 'd like to retrieve my cell phone. After all, I am reporting the time. Yes, it is best to take your own things back to this breath.

This person may not be a thief, but will never be a good citizen. After all, the mobile phone source is incorrect. How can I get my mobile phone back when I deal with such a person? If you tell the police station, it is very likely that the phone is broken, and you are often reported. If I can make him have to give me back, it will be a perfect solution. If I do not fight, I will turn to the best strategy.

So I began to consider the feasibility of this incident. What is the most feared of such a person? It is related to the mobile phone. If the case is reported, the public security department can find his name, ID card number, and contact person from the mobile phone... Yes! The key is contact people. If all your friends know that you are a thief and you are using a stolen mobile phone, then you will be completely miserable!

How can I get the call records? This is private!

As long as it intrude into 10086, in its database... It's no longer a tragedy.

Well, the key point is to convince him that I have all his contacts, not that I actually have contacts. So I finally remembered a vulnerability I found on the 10086 website a long time ago.

I have already reported it to wooyun. After they fix it, I just published this article for a month.

Http://www.wooyun.org/bugs/wooyun-2011-02254

According to the vulnerability principle, you can obtain the real name, the last four digits of your ID card, and the contacts on Apsara stack. I want to come. This information is well utilized. It's enough to scare him!

So I first got the real name and then called him:


Me: "Hello, are you Mr. XXX ?" (In terms of name, he is a man. At this time, he is very polite ).

Peer: "Well, yes !" (So I smiled ).

Me: "Are you using a Samsung XXX black phone ?".

The other party was stunned, and the voice was a little nervous: "Ah. You. What do you have ?".

I started to change my tone and said, "I lost this phone last year. You want to return it to me !"

 

The other party's phone is immediately suspended.

Next we will start the text message attack, directly (android is good ).

Because the name of this person is directly displayed on the phone, I can hold him down. When I send a text message, as long as I get my name and phone record from the business office, I think I really got it.

The first three messages are the "life-saving" messages sent to me.

The other party began to speak hard, saying that in Shanghai, does it mean to despise me for staying in a city smaller than Shanghai?

It's funny to tell me what I'm threatening? Well, from this point of view, it should not be a thief. I guess I got my mobile phone, but I don't want to pay back it. (On the day I lost my mobile phone, I called for an hour ), or you have acquired stolen goods. Such a person is more afraid of contacts. You must go to the recipient's address first.

Once you get the address, you will have a better base. Once again, you will report the case if you fail to report the case. Your information is in my hands. Either I report the case or other means, the other party will be more passive.

If I remember correctly, what you mean may be swearing. I am also planning to warn me about a lawsuit. I actually have proof of mobile phone purchase. Haha, it seems that he really believes I can get the call record. So it's more calm. Don't worry about him.

One hour later:

On the surface, it seems to be soft. In fact, he is using a word called "Classmate". If I am a student, maybe he will ignore me for the reason that everyone wants.

The company is big. I changed a branch that I could never go to, asked him to send it, and then asked someone to bring it to me. Finally, I got my cell phone.

In fact, there is already a mobile phone used, and it is useless to get the old phone, but the mood is very good. If you follow this path, you can pass through the mobile website vulnerabilities. Because there are too many ways to get the real name, for example, to charge, report the wrong name, and then let the service staff read it again.

In many cases, some technical means can be applied to life. Only technologies that serve life are actually useful. Like this time, the other party's main concern is: "If I send a 'help information' one by one to the phone number in the call record of the other party, then he will suffer ".

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.