Showing posts with label CELLPHONE HACKING TIPS AND TRIKS. Show all posts
Showing posts with label CELLPHONE HACKING TIPS AND TRIKS. Show all posts

Android Ransomware

Jun 20, 2013 | comments

 Android Phones Ransom,Ransom

These days, fake Antivirus programs that run under Windows look just as good as real, valid antivirus tools. They'll run a scan for free—a fast one, since there's no actual scanning going on. However, to remove the imaginary malware found by the scan, you'll have to pay up. In a recent blog post, Symantec researcher Joji Hamada reported that this type of malware has come to Android, and it's even more aggressive than the typical Windows fake antivirus. Symantec calls the malware sample featured in this post Android.Fakedefender, because it installs as a trial version calling itself Android Defender.

The typical Windows-based fake antivirus programs attempt to scare the user into paying for a registered version by displaying frightening scan results, hence the name scareware. They work hard to look just like a valid antivirus, to the point that some even offer tech support. It's not uncommon for victims to express outrage when a legitimate security product removes the fake one: "Hey, that's my antivirus! I paid for that!"
  
Porn Discovered :
 

In what may be an attempt to discourage you from seeking help, the fake antivirus reports that it has detected malware attempting to steal pornographic content from the phone. How embarrassing! At this point, you can't delete the fake antivirus and can't launch any other apps. The only way to recover, short of a hard reset, is to purchase the full version. It's effectively holding your phone for ransom. Hamada didn't state whether paying the ransom actually unlocks the phone.

F-Secure's Mikko Hypponen has gone on record stating that the biggest threat for Android users is losing your phone, not malware. Hamada begs to differ, pointing out that malware like this is really, really hard to remove once it gets a foothold. He advises running mobile security software to keep threats like this from installing in the first place.

Samsung Location Spoofing flaw

Dec 7, 2012 | comments

Samsung Location Spoofing

According to experts, 113 devices are lost or stolen every minute in the Unites States. Because of the large number of incidents, many phone owners deploy some sort of anti-theft/anti-loss solutions to protect their data or to track down their smartphones in case they get lost.

In the case of Samsung smartphones, the service is called Samsung Dive. The system allows the phone’s owner to pinpoint the whereabouts of the device via GPS and other location acquisition techniques. 

In case of Phone theft the Thief can simply broadcast a fake location on Samsung tracking server and mislead Original Phone User/Owner to believe that the phone is genuinely at fake location. The locations can be faked continuously to random places anywhere in the world.

All this happens because Samsung’s Location API’s are completely vulnerable to be manipulated by installing commonly available simple GPS location spoofer on the device.

Another noteworthy thing is that Samsung’s tracking application shows notifications when the device is being remotely monitored.
This simply alerts the hacker or thief. This defeats the very fundamental principal and purpose of a tracking application, which should always work on the principal of hidden remote tracking in case of theft.

Though other applications like AVG and famous tracking application like Lookout also provide similar Services were are also vulnerable to location spoofing but Samsung's own tracking service becomes far more critical and important as Samsung is the device Manufacturer and tracking module comes inbuilt in the phone and most widely used. Since such tracking applications also provide remote data wipe service also, Phone owners always prefers device manufacturers solution instead of a Third party tracking application
Apart from this Location spoofing Vulnerability, To make thing worse, Samsung tracking application also shows notification that device is being tracked remotely. This simply alerts the hacker or thief. This defeats the very fundamental principal and purpose of a tracking application, which should always work on the principal of hidden remote tracking in case of theft.

We’ve contacted Samsung to find out if they’re aware of this issue and if they plan on doing anything to address it. We’ll return with more details once they become available.




Spy Any Phone Via Hardware Hack With AudioJack Malware

Nov 27, 2012 | comments

The researcher Atul Alex has presented at last edition of International Malware Conference (MalCon) how it is possible to attack every mobile devices with a special hardware designed using common electronic components.
Atul Alex presented a paper that covers “abusing voice dialing and combining Arduino / Microcontroller to steal private data on iphone, Android, Windows Phone and Blackberry using only the Audio jack.
Mobile devices are sophisticated devices that manage a huge quantity user’s information and their exploit could open the door to a mine of sensible data, due this reason the expert provides that in incoming months defense system will be reinforced and it will be more  difficult in the future software based attacks.
It must be considered that an efficient attack on large scale against mobile world have to be able to infect multi platform devices.

During its presentation Atul Alex explained how to transform any mobile device into a spy tool, avoiding the installation of any malicious software on it, abusing voice dialing feature which is enabled by default on all mobile platforms.

Modern devices are equipped with powerful software able to interpret user’s vocal commands, the hardware device proposed by Alex Atul is able to mimic them to give orders to the device. The functionality opens future scenarios in which hackers are able to control phone simply sending unauthorized text messages to steal sensible data.
Almost all events on the mobile are notified to the user with the help of corresponding tones/sounds, the researched has demonstrated that adding a microcontroller to the headset’s circuit is possible to:
  • Initiate phone calls without user interaction.
  • Note duration of phone calls.
  • Detect incoming/outgoing calls,  sms & so on.


In the future versions the hardware could also integrate more complex functionalities such as recording of phone calls or remote activation of the device.
For sure similar devices will represent in the future a privileged option for cyber espionage operations and more in general for cyber operations. Many governments are working or financing projects for development of new cyber tools. Government agencies have massively invested in programs to “violate” citizen’s privacy in the name of national security, world is changed from 11/9 and the risk of a new dramatic cyber attack is high.

The Defense Advanced Research Projects Agency (DARPA) is one of the most advanced agency in this sense, it is responsible for the development of new technologies for use by the military and recently it has proposed a device called the Power Pwn designed by Pwnie Express company that apparently look like a surge protector, but it’s a powerful tool to infiltrate networks allowing remote access to every  machine.

How to defend our device from similar attacks? In the future every interface of mobile device have to be properly designed, every input must be validated by a specially designed circuitry.
Another factor to consider as critical is the qualification of hardware for devices similar to the one described in the research , different compromised components may invade the consumer market with disastrous consequences, it is necessary a great effort to avoid dangerous incidents.

dSploit:Penetration Testing ToolKit For Android

Oct 15, 2012 | comments

A while back i wrote an article about Anti an android Pen-testing toolkit, Today i came across a wonderful Tool Dsploit Which is more powerful and has more features than Anti, The best part about Dsploit is its open source (i.e) free, unlike anti which has some Premium Restrictions.


Mobile devices have accelerated productivity as they move to replace many of the other devices we used to carry in a small package. Most phones have Wi-Fi capability, cameras, mass storage capability and a persistent internet connection via 3G and 4G and allow a wide number of applications and if rooted provide many of the same tools as a computer, but with more hardware and network capabilities. These conveniences also carry over to make them an very powerful tool to use in penetration tests, more powerful I would argue than a laptop, as a mobile device can be easily hidden on your person, or inside of an office building.

dSploit contains a number of powerful functions that allow you to analyze, capture, and manipulate network transactions. You can scan networks for connected devices, identify the operating system, running services and open ports on each device, as well as checking them for vulnerabilities.
You can also use dSploit to perform so-called “man in the middle’ operations. This is where the ‘fun’ comes. You can use it to intercept traffic from a network-attached computer, and mess with it in a number of ways. For example you can cause havoc with friends or family by replacing all images that appear on every web page on a computer with an image you specify. You can also completely block all internet traffic on the computer. There are a number of other tools such as password sniffers and login crackers, which of course should never be used for anything malicious.


Features :
  • RouterPWN  - Launch the http://routerpwn.com/ service to pwn your router.
  • Trace - Perform a traceroute on target.
  • Port Scanner - A syn port scanner to find quickly open ports on a single target.
  • Inspector - Performs target operating system and services deep detection, slower than syn port scanner but more accurate.
  • Vulnerability -  FinderSearch for known vulnerabilities for target running services upon National Vulnerability Database.
  • Login CrackerA -  very fast network logon cracker which supports many different services.
  • Packet ForgerCraft -  and send a custom TCP or UDP packet to the target.
  • MITM - A set of man-in-the-midtle tools to command&conquer the whole network.
  • Simple Sniff - Only redirects target's traffic through the device ( useful when using a network sniffer like 'Sharp' for Android ) and shows network stats.
  • Password Sniffer - Sniff passwords of many protocols such as http, ftp, imap, imaps, irc, msn, etc from the target.
  • Session Hijacker - Listen for cookies on the network and hijack sessions.
  • Kill Connections - Kill connections preventing the target to reach any website or server.
  • Redirect - Redirect all the http traffic to another adtress.
  • Replace Images - Replace all images on webpages with the specified one.
  • Replace Videos - Replace all youtube videos on webpages with the specified one.
  • Script Injection - Inject a javascript in every visited webpage.
  • Custom Filter - Replace custom text on webpages with the specified one.

 Requirements :
  • An Android device with at least the 2.3 ( Gingerbread ) version of the OS.
  • The device must be rooted
  • The device must have a BusyBox full install, this means with every utility installed ( not the partial installation).


                                  Download dSploit







Sendrawpdu iPhone SMS spoofing tool

Sep 8, 2012 | comments

A French hacker has released a tool capable of sending SMSes with spoofed sender details on the iPhone 4. The sendrawpdu command line interface tool allows users to customise the reply number on SMSes and could be ideal for phishing attacks. Researcher revealed an SMS spoofing flaw that affects every version of Apple’s mobile OS. Using the flaw, hackers could spoof their identities via text and send messages asking for private information (by pretending to be from a users’ bank, for example), or direct users to phishing sites.
pod2g highlights several ways in which malicious parties could take advantage of this flaw, including phishing attempts linking users to sites collecting personal information or spoofing messages for the purposes of creating false evidence or gaining a recipient’s trust to enable further nefarious action.
In many cases the malicious party would need to know the name and number of a trusted contact of the recipient in order for their efforts to be effective, but the phishing example shows how malicious parties could cast broad nets hoping to snare users by pretending to be a common bank or other institution.
French hacker has published on his blog that he developed iPhone SMS security app and called it Sendrawpdu. The tool is designed for iPhone 4, and can be downloaded free of charge from the service repository Github where you can find the app.

Download

https://github.com/pod2g/sendrawpdu

Location Tracking of a Mobile Device Via Silent SMS

May 10, 2012 | comments

SMS
SMS (Short Message Services) has become an extended part of modern day life. Initially created to send non-sensitive information using spare space in signaling channels, it has now evolved into a feature-rich service.

How SMS is used to track the location of a mobile device

The law enforcement agencies used the basic principle that every time a mobile device performs any activity, it exposes its presence to the Cell tower. If the mobile network can force the mobile device to some very short activity without making it perceptible to the user, then using Radiolocation technologies, the mobile device can be tracked.  To do that, a special type of SMS known as “Silent SMS” is used. Every time a silent SMS is delivered, the mobile silently acknowledges. This creates activities for a mobile which is tracked by a LMU (Location Measurement Unit) at BTS (Base Transceiver Station) by using a variety of multilateration methods.

A commonly used technique for tracking location in GSM network is called E-OTD (Enhanced-Observed Time Difference of arrival) . This is a network-based location tracking method. In this technique, the signal arrival time from the mobile device is measured from 3 BTS/LMUs’. The position of the ME (Mobile Equipment) is determined by comparing the time differences between two sets of timing measurements. The accuracy is between 50 – 200 meters. More accurate location measurement is possible using A-GPS (Assisted GPS) based systems.

In the past using Cell Tower log generated by forcing the target mobile device into some activities, a target’s locations and movements were accurately reconstructed and identified.  In the USA vs. Forrest case, police used similar techniques

The SMS message is specified by the ETSI in documents GSM 03.38  and GSM 03.40. It can be up to 160 characters long, where each character is 7 bits. Eight-bit messages can contain up to 140 characters and are usually not viewable by the phones as text messages. Instead they are used for data in e.g. smart messaging (images and ringing tones) and Over The Air (OTA) provisioning of Wireless Application Protocol (WAP) settings.
Silent messages, often referred to as  “Silent SMS” or “Stealth SMS” is a type of SMS message which when received by a mobile device does not notify either by the display or by a sound. GSM 03.40  describes a Short Message of type 0 which indicates that the mobile equipment must acknowledge receipt of the short message but may discard its contents.

How to create Silent SMS

To create Silent SMS, the SMS PDU (Protocol Data Unit) needs to be manipulated. It is best done from an application that communicates with SMSC (SMS Center) using a protocol called SMPP. To send a SMS, the application need to send SMPP GSM 03.38 encoded Submit_Sm PDU.  A sample Submit_Sm PDU is shown below:

Encoding PDU Header . .’ command length ’ , ( 7 1 ) . . . 00 00 00 47
’ command id ’ , ( 4 ) . . . 00 00 00 04
’ command s t a tus ’ , ( 0 ) . . . 00 00 00 00
’ sequence number ’ , ( 1 ) . . . 00 00 00 01
Encoding PDU Body . .
’ service type ’ , ( 0 ) . . . 30 00
’ source_add r_ t o n ’ , ( 1 ) . . . 01 __ ’ source_ addr_ npi ’ , ( 1 ) . . . 01 **
‘source_ addr ’ , (27829239812) . . . 32 37 38 32 39 32 33 39 38 31 32 00
’dest_addr_ton ’ , ( 1 ) . . . 01 **
’dest_addr_npi ’ , ( 1 ) . . . 01 **
’dest_ addr’ , (27829239812) . . . 32 37 38 32 39 32 33 39 38 31 32 00
’esm_ class ’ , ( 0 ) . . . 00
’protocol_ id ’ , ( 0 ) . . . 00
’priority_flag ’ , ( 0 ) . . . 00
’schedule_delivery_time ’ , ( 0 ) . . . 30 00
’validity_period ’ , ( 0 ) . . . 30 00
’registered_delivery ’ , ( 1 ) . . . 01
’replace_ if_ present_fl ag ’ , ( 0 ) . . . 00
’data_coding ’ , ( 0 ) . . . 00
’sm_default_msg_ id ’ , ( 0 ) . . . 00
’sm_length ’ , ( 0 ) . . . 00
’short_message ’ , ( xyz..etc ) . . . 69 76 69 7A 73 65 63 75 72 69 74 79 2E 63 6F 6D
Full PDU ( 70 o c t e t s + + ) . . 00 00 00 47 00 00 00 04 00 00 00 00 00 00
00 01 30 00 01 01 32 37 38 32 39 32 33 39 38 31 32 00 01 01 32 37 38
32 39 32 33 39 38 31 32 00 00 00 00 30 00 30 00 01 00 00 00 00 73 61
74 6E 61 63 2E 6F 72 67 2E 7A
** ( 0 )  indicates local numeric numbering formatting
( 1 ) indicates international numeric number formatting
++ Octet is a group of 8 bits , often referred to as a byte

There are many different ways to manipulate SMS PDU but many of them may cause mobile device malfunctioning. The two techniques described by N.J Croft and M.S Olivier ["A silent SMS denial of service (DoS) attack," Proceedings of the Southern African Telecommunication Networks and Applications Conference 2007 (SATNAC 2007), Sugar Beach Resort, Mauritius, September 2007 (Published electronically)]  were used and found working are: Manipulating Data Encoding Scheme and Manipulating Timing in a WAP Push Message.

In the first technique, the data_encoding attribute of SMS PDU was set to 0xC0. This sets the MWIG (Message Waiting Indication Group) identifier that as per GSM 03.38 translates to “Discard Message”. The mobile device on receiving the message discards it after sending delivery acknowledgement.
In the second technique, the scheduled_delivery_time   is set to a date and time before today in the format “YYMMDDhhmmsstnn”. It was observed that the message was delivered, delivery acknowledgement was sent by the mobile device but the message was never displayed.




Install Google Play Android apps on Kindle Fire without root

Mar 2, 2012 | comments

Dependancies

  • Android Device running with an active Google Play install (to allow for application installs)
  • A computer with the Android SDK running
  • A Kindle Fire

Android Phone/Device Steps

  1. Install the application you want to ALSO install on your Kindle Fire onto your Android phone or device.
  2. Post Install, connect your phone/device to your computer
  3. Use adb to pull the .apk file from your device onto your computer for install onto the kindle.

Kindle Installation

  1. Connect your Kindle Fire to your computer and make sure the SD Card mounts
  2. Enable unknown sources:
    1. Tap the “gear” by the wifi and battery icons,  tap settings, Device.
    2. Slide on “Allow Installation of Applications (from unknown sources)”
  3. Copy the newly obtained .apk from the root of your Android SDK directory (/Android/tools/ in my case)
  4. Paste the .apk on your Kindle Fire’storage (Documents or Downloads for example)
  5. Use a file explorer/manager installed from the Amazon app store to navigate to the directory you placed the .apk
  6. Tap the .apk after it has been copied and install like normal (be sure you check permissions)

Thats it!

Enjoy playing Draw Something without rooting your device!

 


 

Tips for Better Mobile Security

Dec 25, 2011 | comments


"You need to take mobile device security just as seriously as you do for your PCs and laptops."

The more you do on your mobile device, the more you should be concerned about its security. This is especially true if you use it for work. Keep in mind, if your device is configured with your employer’s email or messaging server, they may already be implementing some of the security tips we’re going to discuss.

Tip No. 1 - Choose a mobile OS that supports encryption, oh, and use it: If you are truly concerned about the security of your mobile phone or device you should use a mobile operating system (OS) and device that supports hardware-based encryption, such as Apple’s iOS or RIM’s BlackBerry, for both internal and external storage. This means the data stored on it is protected even from the most advanced hacker. Without encryption it’s possible that someone could recover the data on the device even without your lock pin or password.

Full device encryption on current Android devices is limited and varies between manufactures. Motorola Mobility's business-oriented smartphones offers encryption capabilities on Android 2.3. Android 3.x includes an API to help developers offer encryption on tablets, which some currently implement. And in the next year, we should see Android 4.x tablets and smartphones support encryption. WhisperCore is a third-party encryption solution you may want to also keep your eye on. Beta versions are currently available for Nexus S and Nexus One.

Tip No. 2 - Set a lock pin or password: Enabling a password, whether it’s called a pin, passcode, or passphrase, is the first line of defense in protecting your privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It’s also usually required if encryption is enabled on the device.

If encryption isn’t supported by the OS you should still definitely require yourself to set a password. Though your data can possibly be recovered by determined individuals without them knowing the password, you’ll at least protect it from the causal snoopers.

Tip No. 3 - Enable auto-wiping of data: Most mobile OSes support automatic wiping of the device’s data after a certain number of incorrect passwords attempts. This is great if encryption isn’t supported by the device but it can actually be just as beneficial for encrypted devices. Because giving others unlimited guesses to your password makes it much more possible that they could get it right, and once that happens the data is decrypted.

Auto-wiping is natively supported by iOS, Windows Phone 7, and BlackBerry.

Android requires the use of a third party app, such as Autowipe or a security app as in the last tip.

Just remember to keep all your data regularly backed up and use a solution that lets you restore the data to a new device in case you can’t find the one you wiped.

Tip No. 4 - Setup remote tracking and management: Before your phone or device gets misplaced or stolen you ought to setup a remote tracking and management solution. Most let you see the device’s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and/or wipe it before someone else gets their hands on it.

For iOS 4.2 or later, Apple provides a free service. For earlier iOS versions there’s the MobileMe service from Apple at $99 a year after the 60 day free trial.

For Android you have to use a third-party app, such as the security apps mentioned in the last tip.

For Windows Phone 7 Microsoft provides the free Windows Live for Mobile service.

For BlackBerry, RIM provides the free BlackBerry Protect service.

Tip No. 5 - Limit Wi-Fi hotspot usage: When you use public Wi-Fi hotspots that aren’t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don’t; thus eavesdroppers can likely capture their passwords and traffic.

On the other hand most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn’t as popular. Therefore, when you’re out and about you should try to use the data connection rather unsecured Wi-Fi hotspots.

If you insist on using Wi-Fi hotspots, use those that provide enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.

Tip No. 6 - Use an antivirus or security app: Viruses, malware, and hacking on mobile devices aren’t a huge issue now but they are becoming more of an issue. You should consider installing a security app to help prevent infections and intrusions. Most AV solutions also offer additional features, such as remote wiping, backup and locating.

AVG and NetQin provide free security apps for Android.

LookOut offers free apps for Android, BlackBerry and Windows Mobile.

Some paid options include McAfee WaveSecure, Kaspersky Mobile Security and Trend Micro Mobile Security.


Speed up ur mobile 50%.

Feb 24, 2011 | comments

This is only for those users which have memory card in their PHONESfirst of all you will need-computer-usb connectivity of MEMORY CARD TO PC(CARD READER) NOT BLUETOOTH-little brainfollow these steps:-1.remove memory card from mobile.2.insert it in CARD READER.3.OPEN start menu>All program>acceSSories>system tools>DISK DEFRAGMENTER4.Just run defragmenter at your memory card.5.FRAGMENT IT 2 OR 3 TIMES.6.PUT back memory card to phone.7ENJOY THE "SPEED."

BSNL 3G hack

Feb 17, 2011 | comments


Here is a 100 % working trick to unlimited use BSNL 3G at the cost of
Normal GPRS

First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.
now activate gprs by sending sms GPRS PRE to 53733 It will be
actrivated in 24 hours, after activation get gprs settings by calling c.care

Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)
in it, After activation You have to chnage only one thing in yor 3G enabled cell.

Go to settings>tools>settings>phone&g
t;network>network mode> now select UMTS

THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default


Now see your data singnal
s logo..... vola it is converted into 3G
You will get near about 500kbps to 1200 kbps speed
Remember use BSNLEGPRS or BSNLPREPAID as ur access point

This trick is copy pasted from some other source
but its 100% working
Enjoy 3G at appr. no cost.....

CALL FROM SAME NUMBER FREE

| comments


1. FIRST MAKE A ACCOUNT ON WAP.MIG33.COM(USING COMP OR MOBILE]

2. USING UR ACCOUNT INVITE ATLEAST 2 PERSON(must needed to get balance)




3.now go to the option-"make a call" you see two option there-"MY PHONE #(put ur

host number..whr u want to call)

"phone # TO CALL"(PUT UR NUMBER THERE)NOW CALL....AFTER SOME TIME(10 SECOND) "AK CALL AYE GI TUMHARE VICTIM K NUMBER SE...JUST RECIVED IT AND TALK...............b]Note: the person whom u invited must needed to register otherwise u nt get balance"





HAVE FUN



DNT MISSUSE






ENJOY !!!!!!!!!!!!!!!!!!!!!!!

NOKIA secret codes

Feb 15, 2011 | comments


IMEI Number
*#06# Cells Identity Code (IMEI = International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type Approval Code (first 2 digits = country code of the approval-country )
FAC = Final Assembly Code: (01,02 = AEG)
(10,20 Nokia)
(40,41,44 Siemens)
(30 Ericsson)
(50 Bosch)
(51 Sony,Siemens,Ericsson)
(60 Alcatel)
(65 AEG)
(70 Sagem)
(75 Dancall)
(80 Philips)
(85 Panasonic)
SNR = Serial Nr.
SP = Spare (always "0"
Software Version
*#0000# shows the software version
Signal Processing
*3370# - Enchanced full Rate Codec (EFR) activation. It will automatically restart.
#3370# - Enchanced full Rate Codec (EFR) deactivation
*4720# - Half Rate Codec activation. It will automatically restart.
#4720# - Half Rate Codec deactivation
Enchanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced with about 5%



Sim Clock Stopping
*#746025625#
[*#sim0clock#]
Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by mode which will save battery time. This code doesn't work with software version 4.59.
It will tell you if it can be stopped or not.


Warrenty Menu
*#92702689# takes you to a secret menu with 6 choices:
[*#war0anty#]
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997).
3. Displays (if there) the date where the phone was purchased (MMYY).
4. Displays the date of the last repairment - if found (0000).
5. Makes you capable of transferring user data if you have the gear for it.
6. Shows how long the phone has been used to talk. This counter is not reset by when you "clear timers" like the counters in the call register.


Bypass the SP lock With a Nokia 16xx/21xx/31xx/51xx/81xx
1. Insert SIM card of different provider.
2. Turn on the phone and press the UP VOLUME key for 3 sec.
Then release it and the phone says PIN CODE?
3. Press the "C" key.
4. Then Press * and wait until it disappears and appears again, then press * one more time and 04*PIN*PIN*PIN#


Nokia Speed Trap Detector Urban Legend spread by Nokia Engineers ;^)
The settings for radar speed traps detector. Your Nokia cell phone can be programmed to pick up radar speed traps, when programmed your cell phone picks up the radar and alerts you on the message alert tone. ( Doesn't work with Nokia 7110! )
1. Enter your menu
2. Select settings
3. Select security settings
4. Select closed user group
5. Select on
6. Enter 00000
7. Press ok
8. Clear back to normal, within a few seconds your phone will display a radar sign with five zero's next to it. It is now activated.
Unfortunately only Nokia phones have this function. The Cell Phone info display needs to be de-activated. Settings -> Phone Settings -> Cell Info display. Each time you turn off your phone, or even each time you loose contact with your carrier, you'll have to activate it again... It is done using steps 1 through 5 above, but the number (00000) will be already on the field as a default.

The James Bond Trick



If you short-circuit the left middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying! Network Monitor
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
Take apart the phone.
De-solder the EEPROM (ATMEL AT 24C64)
Read out the data with an EEPROM programmer and save it to a file (Backup)
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF"
If you have v5.24 then change the address "0378" from "00" to "FF"
Write the new data to the EEPROM and solder it back to the phone
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information:
Carrier number, MS RX Level in DBM, Received signal quality, MS TX power level, C1 (Path loss criterion, used for cell selection and reselection). The range is -99 to 99, RTL (Radio link timeout), Timeslot, Indication of the transmitter status, Information on the Network parameters, TMSI (Temporary Mobile Subscriber Identity), Cell identification (Cell ID, Number of cells being used), MCC (Mobile country code), MCN (Mobile network code), LAC (Location area code), Ciphering (On/Off), Hopping (On/Off), DTX (On/Off), Discard cell barred information.


Game Hacking with Blizzard



Get the file called the 'BlizzardN-GAGE.SIS' from IRC get in #mediaplace on Efnet (note: Downloading cracked/Hacked games is illegal unless you already own a copy of game)
The Blizzard Nokia N-Gage Installer.
1. Unpack Blizzard.sis file that you get from mIRC
2. Transfer the .sis file to your N-Gage
3. Get the .blz (N-gage ROM) from mIRC
4. copy the file to the root dir of your MMC (16MB MMC)Multimedia Card
5. Use the Blizzard application to unpack the .blz file
6. After unpacking the sonic icon should appeared in the MENU
7. Clicked sonic icon and it should work !



List of compatible games for the 3650,6600 and the N-gage that work:
[3650]
SonicN (v.2.5+)
Puyo Pop (v.2.5+)
[6600]
SonicN
Puyo Pop
Pandemonium
Tomb Raider
Super Monkey Ball
Tony Hawks Pro Skater
[N-Gage]
SonicN
Puyo Pop
Pandemonium
Tomb Raider
Super Monkey Ball
Tony Hawks Pro Skater
GSM Network Services Command Strings
When various network functions are selected via the cellphone's menu using the keypad, the cellphone automatically generates the corresponding GSM network command string and transmits it to the network. These commands can however be manually entered via the keypad.


Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
© Call button


Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key - this is represented here with the © character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).
Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate /td> **67*number#©<
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#© (Service numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#©
Deactivate barr all outgoing calls #33*code#©
Check status of barr all outgoing calls *#33#©
Activate barr all calls **330*code#©
Deactivate barr all calls #330*code#©
Check status of barr all calls /td> *#330*code#©<
Activate barr all outgoing international calls **331*code#©
Deactivate barr all outgoing international calls #331*code#©
Check status of barr all outgoing international calls *#331#©
Activate barr all outgoing international calls except to home country **332*code#©
Deactivate barr all outgoing international calls except to home country #332*code#©
Check status of barr all outgoing international calls except to home country *#332#©
Activate barr all outgoing calls **333*code#©
Deactivate barr all outgoing calls #333*code#©
Check status of barr all outgoing calls *#333#©
Activate barr all incoming calls **35*code#©
Deactivate barr all incoming calls #35*code#©
Check status of barr all incoming calls *#35#©
Activate barr all incoming calls when roaming **351*code#©
Deactivate barr all incoming calls when roaming #351*code#©
Check status of barr all incoming calls when roaming *#351#©
Activate barr all incoming calls **353*code#©
Deactivate barr all incoming calls #353*code#©
Check status of barr all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©

Cellphone Services
10 All types of cellphone services
11 Speech service
12 Data service
13 Fax
14 Datex-J
15 Teletex
16 Short message service (SMS)
18 All data services without SMS
19 All cellphone services without SMS

Carrier Services
20 All services
21 All asynchronous services
22 All synchronous services
23 3.1kHz services
24 Synchronous point-to-point connections including PAD's (all synchronous data services)
25 Asynchronous point-to-point connections including PAD's (all asynchronous data services)
26 Data packet sending including PAD's (all synchronous data packet services)
27 Services with PAD-share
29 Digital connection with 12kbps

GSM Network Service Codes
Note that at present only the following service codes are in use:
11 Speech
13 fax
25 data

Cell Broadcast
While Short Message Service (SMS) can be configured as a personal service, Cell Broadcast is a general service which is designed for subscribers of a specific cell or topic. For example, a subscriber to cell 050 in England will receive information on the GSM tower currently being used by their phone. This new concept brings a whole new meaning to the term mobile communications as the phone is now able to receive information such as share prices or weather updates without the need of data cards and computers. At present the following message types exist (note: this may vary from carrier to carrier and some carriers may charge for this service):

Code Title
000 Index
010 Flashes
020 Hospitals
022 Doctors
024 Pharmacy
030 Long Distant Road Reports
032 Local Road Reports
034 Taxis
040 Weather
050 District
052 Network Information
054 Operator Services
056 Directory Inquiries (national)
057 Directory Inquiries (international)
058 Customer Care (national)
059 Customer Care (international)

In the future one will be able to control each individual call by use of the following service codes. To do this the user has to insert the service code in front of the last # in the MMI command above.


Or More

Secret Codes for some Nokia models
Nokia 9000/9000i

To view IMEI number *#06#
To view Software Version enter *#8110# Latest Version is under Phone Info.
To view Week and Year of manufacture enter *#3283#

Nokia 9110

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# shows the SW version.

Latest software version: v5.02 (26-08-99)RAE-2

Nokia 7110

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# To view Software Version.
*#3370# - Enhanced Full Rate Codec (EFR) activation. It will automatically restart.
*#3370* - Enhanced Full Rate Codec (EFR) deactivation. It will automatically restart.
*#4720# - Half Rate Codec activation. It will automatically restart
*#4720* - Half Rate Codec deactivation. It will automatically restart
*#746025625# - Sim clock allowed status.
*#92702689# [*#war0anty#] - takes you to a secret menu with 6 choices:

1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997)
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repairment - if found (0000)
5. makes you capebel of transferring user data if you have the gear for it
6. shows how many hours the phone has been on

Latest software version: 4.77 25-01-00 NSE-5 - EFR and half rate codes do not work with these version.

V 4.76 13-01-00 NSE-5
V 4.75 07-01-00 NSE-5
V 4.73 15.11.99 NSE-5

Nokia 6190

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#6190# shows the SW version.
*#92772689# (after removing the analog module) shows service menu.
*3001#12345[OK] to enter test mode.
*#639# to change NAM.

Nokia 3810

To view IMEI number *#06#
To view Software Version enter *#3810#

Nokia 6120 / 6160 / 6162 (TDMA phones)

*#92772689# for checking ISDN number.
*3001#12345# for field test mode and nam selection and some other stuff...
*#9999# shows the SW version


Nokia 3210 Secret Codes
Nokia 3210

*#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI:

XXXXXX XX XXXXXX X

TAC FAC SNR SP


TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare

*#0000# To view Software Version.

#746025625# [*#sim0clock#]
Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by mode which will save battery time. This code doesn't work with software version 4.59.

*#92702689# [*#war0anty#] takes you to a secret menu with 6 choices:

1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997)
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repairment - if found (0000)
5. makes you capebel of transferring user data if you have the gear for it
6. shows how many hours the phone has been on

Latest software version: V 5.02 NSE-8/9

*#3370# - Enhanced Full Rate Codec (EFR) activation. It will automatically restart.
*#3370* - Enhanced Full Rate Codec (EFR) deactivation. It will automatically restart.
*#4720# - Half Rate Codec activation. It will automatically restart
*#4720* - Half Rate Codec deactivation. It will automatically restart

Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (Algebraic Code Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced by about 5% when using the ERF option.
  

SAMSUNG Mobile Secret Codes

| comments


*#1111# S/W Version
*#1234# Firmware Version
*#2222# H/W Version
*#8999*8376263# All Versions Together

*#8999*8378# Test Menu
*#4777*8665# GPSR Tool
*#8999*523# LCD Brightness
*#8999*377# Error Menu
*#8999*327# EEP Menu
*#8999*3825523# Don't Know. .
*#8999*667# Debug Mode

*#92782# PhoneModel (Wap)

#*5737425# JAVA Mode
*#2255# Call List

*#232337# Bluetooth MAC Adress

*#5282837# Java Version
#*4773# Incremental Redundancy
#*7752# 8 PSK uplink capability bit
#*7785# Reset wakeup & RTK timer cariables/variables
#*1200# ????
#*7200# Tone Generator Mute
#*3888# BLUETOOTH Test mode
#*#8999*324# ??
#*7828# Task screen
#*5111# ??
#*#8377466# S/W Version & H/W Version
#*2562# Restarts Phone
#*2565# No Blocking? General Defense.
#*3353# General Defense, Code Erased.
#*3837# Phone Hangs on White screen
#*3849# Restarts Phone
#*3851# Restarts Phone
#*3876# Restarts Phone
#*7222# Operation Typ: (Class C GSM)
#*7224# !!! ERROR !!!
#*7252# Operation Typ: (Class B GPRS)
#*7271# CMD: (Not Available)
#*7274# CMD: (Not Available)
#*7337# Restarts Phone (Resets Wap Settings)
#*2787# CRTP ON/OFF
#*2886# AutoAnswer ON/OFF
#*3737# L1 AFC
#*5133# L1 HO Data
#*7288# GPRS Detached/Attached
#*7287# GPRS Attached
#*7666# White Screen
#*7693# Sleep Deactivate/Activate
#*7284# L1 HO Data
#*2256# Calibration info? (For CMD set DEBUGAUTONOMY in cihard.opt)
#*2286# Databattery
#*2527# GPRS switching set to (Class 4, 8, 9, 10)
#*2679# Copycat feature Activa/Deactivate
#*3940# External looptest 9600 bps
#*4263# Handsfree mode Activate/Deactivate
#*4700# Please use function 2637
#*7352# BVMC Reg value (LOW_SWTOFF, NOMINAL_SWTOFF)
#*2558# Time ON
#*3370# Same as 4700
#*3941# External looptest 115200 bps
#*5176# L1 Sleep
#*7462# SIM Phase
#*7983# Voltage/Freq
#*7986# Voltage
#*8466# Old Time
#*2255# Call Failed
#*5187# L1C2G trace Activate/Deactivate
#*5376# DELETE ALL SMS!!!!
#*6837# Official Software Version: (0003000016000702)
#*7524# KCGPRS: (FF FF FF FF FF FF FF FF 07)
#*7562# LOCI GPRS: (FF FF FF FF FF FF FF FF FF FF FF FE FF 01)
#*2337# Permanent Registration Beep
#*2474# Charging Duration
#*2834# Audio Path (Handsfree)
#*3270# DCS Support Activate/Deactivate
#*3282# Data Activate/Deactivate
#*3476# EGSM Activate/Deactivate
#*3676# FORMAT FLASH VOLUME!!!
#*4760# GSM Activate/Deactivate
#*4864# White Screen
#*5171# L1P1
#*5172# L1P2
#*5173# L1P3
#*7326# Accessory
#*7683# Sleep variable
#*8465# Time in L1
#*2252# Current CAL
#*2836# AVDDSS Management Activate/Deactivate
#*3877# Dump of SPY trace
#*7728# RSAV
#*2677# Same as 4700
#*3797# Blinks 3D030300 in RED
#*3728# Time 2 Decod
#*3725# B4 last off
#*7372# Resetting the time to DPB variables
#*7732# Packet flow context bit Activate/Deactivate
#*6833# New uplink establishment Activate/Deactivate
#*3273# EGPRS multislot (Class 4, 8, 9, 10)
#*7722# RLC bitmap compression Activate/Deactivate
#*2351# Blinks 1347E201 in RED
#*4472# Hysteresis of serving cell: 3 dB
#*2775# Switch to 2 inner speaker
#*9270# Force WBS
#*7878# FirstStartup (0=NO, 1=YES)
#*3757# DSL UART speed set to (LOW, HIGH)
#*8726# Switches USBACM to Normal
#*8724# Switches USBACM to Generator mode
#*8727# Switches USBACM to Slink mode
#*8725# Switches USBACM to Loop-back mode
#*3838# Blinks 3D030300 in RED
#*2077# GPRS Switch
#*2027# GPRS Switch
#*0227# GPRS Switch
#*0277# GPRS Switch
#*22671# AMR REC START
#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)
#*22673# Pause REC
#*22674# Resume REC
#*22675# AMR Playback
#*22676# AMR Stop Play
#*22677# Pause Play
#*22678# Resume Play
#*77261# PCM Rec Req
#*77262# Stop PCM Rec
#*77263# PCM Playback
#*77264# PCM Stop Play
#*2872# CNT
*#8999*283# ???
#*22679# AMR Get Time
*288666# ???
*2886633# ???
*#8999*364# Watchdog ON/OFF
#*8370# Tfs4.0 Test 0
#*8371# Tfs4.0 Test 1
#*8372# Tfs4.0 Test 2
#*8373# Tfs4.0 Test 3
#*8374# Tfs4.0 Test 4
#*8375# Tfs4.0 Test 5
#*8376# Tfs4.0 Test 6
#*8377# Tfs4.0 Test 7
#*8378# Tfs4.0 Test 8
#*8379# Tfs4.0 Test 9
#837837# error=...

#*36245# Turns Email TestMenu on.

*2767*22236245# Email EPP set (....)!
*2767*837836245# Email Test Account!
*2767*29536245# Email Test2 Account!
*2767*036245# Email EPP reset!
*2767*136245# Email EPP set (1)!
*2767*736245# Email EPP set (7)!
*2767*3036245# Email...
*2767*3136245# Email...
*2767*3336245# Email...
*2767*3436245# Email...
*2767*3936245# Email...
*2767*4136245# Email...
*2767*4336245# Email...
*2767*4436245# Email...
*2767*4536245# Email...
*2767*4636245# Email...
*2767*4936245# Email...
*2767*6036245# Email...
*2767*6136245# Email...
*2767*6236245# Email...
*2767*6336245# Email...
*2767*6536245# Email...
*2767*6636245# Email...
*2767*8636245# Email...
*2767*85236245# Email...

*2767*3855# = E2P Full Reset
*2767*2878# = E2P Custom Reset
*2767*927# = E2P Wap Reset
*2767*226372# = E2P Camera Reset
*2767*688# Reset Mobile TV
#7263867# = RAM Dump (On or Off)
*2767*49927# = Germany WAP Settings
*2767*44927# = UK WAP Settings
*2767*31927# = Netherlands WAP Settings
*2767*420927# = Czech WAP Settings
*2767*43927# = Austria WAP Settings
*2767*39927# = Italy WAP Settings
*2767*33927# = France WAP Settings
*2767*351927# = Portugal WAP Settings
*2767*34927# = Spain WAP Settings
*2767*46927# = Sweden WAP Settings
*2767*380927# = Ukraine WAP Settings
*2767*7927# = Russia WAP Settings
*2767*30927# = GREECE WAP Settings
*2767*73738927# = WAP Settings Reset
*2767*49667# = Germany MMS Settings
*2767*44667# = UK MMS Settings
*2767*31667# = Netherlands MMS Settings
*2767*420667# = Czech MMS Settings
*2767*43667# = Austria MMS Settings
*2767*39667# = Italy MMS Settings
*2767*33667# = France MMS Settings
*2767*351667# = Portugal MMS Settings
*2767*34667# = Spain MMS Settings
*2767*46667# = Sweden MMS Settings
*2767*380667# = Ukraine MMS Settings
*2767*7667#. = Russia MMS Settings
*2767*30667# = GREECE MMS Settings

*#7465625# = Check the locks
*7465625*638*Code# = Enables Network lock
#7465625*638*Code# = Disables Network lock
*7465625*782*Code# = Enables Subset lock
#7465625*782*Code# = Disables Subset lock
*7465625*77*Code# = Enables SP lock
#7465625*77*Code# = Disables SP lock
*7465625*27*Code# = Enables CP lock
#7465625*27*Code# = Disables CP lock
*7465625*746*Code# = Enables SIM lock
#7465625*746*Code# = Disables SIM lock
*7465625*228# = Activa lock ON
#7465625*228# = Activa lock OFF
*7465625*28638# = Auto Network lock ON
#7465625*28638# = Auto Network lock OFF
*7465625*28782# = Auto subset lock ON
#7465625*28782# = Auto subset lock OFF
*7465625*2877# = Auto SP lock ON
#7465625*2877# = Auto SP lock OFF
*7465625*2827# = Auto CP lock ON
#7465625*2827# = Auto CP lock OFF
*7465625*28746# = Auto SIM lock ON
#7465625*28746# = Auto SIM lock OFF


**********************

#*7878# FirstStartup (0=NO, 1=YES)
#*3838# Blinks 3D030300 in RED
#*2077# GPRS Switch
#*2027# GPRS Switch
#*0227# GPRS Switch
#*0277# GPRS Switch
#*22671# AMR REC START
#*22672# Stop AMR REC (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)
#*22673# Pause REC
#*22674# Resume REC
#*22675# AMR Playback
#*22676# AMR Stop Play
#*22677# Pause Play
#*22678# Resume Play
#*77261# PCM Rec Req
#*77262# Stop PCM Rec
#*77263# PCM Playback
#*77264# PCM Stop Play
#*22679# AMR Get Time
*#8999*364# Watchdog ON/OFF
*#8999*427# WATCHDOG signal route setup
*2767*3855# = Full Reset (Caution every stored data will be deleted.)
*2767*2878# = Custom Reset
*2767*927# = Wap Reset
*2767*226372# = Camera Reset (deletes photos)
*2767*688# Reset Mobile TV
#7263867# = RAM Dump (On or Off)
Samsung Secret Codes Part 3
*2767*49927# = Germany WAP Settings
*2767*44927# = UK WAP Settings
*2767*31927# = Netherlands WAP Settings
*2767*420927# = Czech WAP Settings
*2767*43927# = Austria WAP Settings
*2767*39927# = Italy WAP Settings
*2767*33927# = France WAP Settings
*2767*351927# = Portugal WAP Settings
*2767*34927# = Spain WAP Settings
*2767*46927# = Sweden WAP Settings
*2767*380927# = Ukraine WAP Settings
*2767*7927# = Russia WAP Settings
*2767*30927# = GREECE WAP Settings
*2767*73738927# = WAP Settings Reset
*2767*49667# = Germany MMS Settings
*2767*44667# = UK MMS Settings
*2767*31667# = Netherlands MMS Settings
*2767*420667# = Czech MMS Settings
*2767*43667# = Austria MMS Settings
*2767*39667# = Italy MMS Settings
*2767*33667# = France MMS Settings
*2767*351667# = Portugal MMS Settings
*2767*34667# = Spain MMS Settings
*2767*46667# = Sweden MMS Settings
*2767*380667# = Ukraine MMS Settings
*2767*7667#. = Russia MMS Settings
*2767*30667# = GREECE MMS Settings
*#7465625# = Check the phone lock status
*7465625*638*Code# = Enables Network lock
#7465625*638*Code# = Disables Network lock
*7465625*782*Code# = Enables Subset lock
#7465625*782*Code# = Disables Subset lock
*7465625*77*Code# = Enables SP lock
#7465625*77*Code# = Disables SP lock
*7465625*27*Code# = Enables CP lock
#7465625*27*Code# = Disables CP lock
*7465625*746*Code# = Enables SIM lock
#7465625*746*Code# = Disables SIM lock
*7465625*228# = Activa lock ON
#7465625*228# = Activa lock OFF
*7465625*28638# = Auto Network lock ON
#7465625*28638# = Auto Network lock OFF
*7465625*28782# = Auto subset lock ON
#7465625*28782# = Auto subset lock OFF
*7465625*2877# = Auto SP lock ON
#7465625*2877# = Auto SP lock OFF
*7465625*2827# = Auto CP lock ON
#7465625*2827# = Auto CP lock OFF
*7465625*28746# = Auto SIM lock ON
#7465625*28746# = Auto SIM lock OFF

Type *#9998*627837793# Go to the 'my parameters' and there you will find new menu where you can unlock phone.(not tested-for samsung C100)
To unlock a Samsung turn the phone off take the sim card and type the following code *#pw+15853649247w# .

Java status code: #*53696# (Samsung X600)

If you want to unlock your phone put a sim from another company then type *#9998*3323# it will reset your phone. Push exit and then push 7, it will reset again. Put your other sim in and it will say sim lock, type in 00000000 then it should be unlocked. Type in *0141# then the green call batton and it's unlocked to all networks. This code may not work on the older phones and some of the newer phones. If it doesn't work you will have to reset your phone without a sim in it by typing *#2767*2878# or *#9998*3855# (not tested)



*2767*688# = Unlocking Code
*#8999*8378# = All in one Code
*#4777*8665# = GPSR Tool
*#8999*523# = LCD Brightness
*#8999*3825523# = External Display
*#8999*377# = Errors
#*5737425# = JAVA Something{I choose 2 and it chrashed}][/b]
*#2255# = Call List

#*536961# = Java Status Code
#*536962# = Java Status Code
#*536963# = Java Status Code
#*53696# = Java Status Code

#*1200# = AFC DAC Val
#*1300# = IMEI
#*1400# = IMSI

#*2562# = ??? White for 15 secs than restarts.
#*2565# = Check Blocking
#*3353# = Check Code
#*3837# = ??? White for 15 secs than restarts.
#*3849# = ??? White for 15 secs than restarts.
#*3851# = ??? White for 15 secs than restarts.
#*3876# = ??? White for 15 secs than restarts.

#*7222# = Operation Typ (Class C GSM)
#*7224# = I Got !! ERROR !!
#*7252# = Oparation Typ (Class B GPRS)
#*7271# = Multi Slot (Class 1 GPRS)
#*7274# = Multi Slot (Class 4 GPRS)
#*7276# = Dunno
#*7337# = EEPROM Reset (Unlock and Resets WAP Settings)
#*2787# = CRTP ON/OFF
#*3737# = L1 Dbg data
#*5133# = L1 Dbg data
#*7288# = GPRS Attached
#*7287# = GPRS Detached
#*7666# = SrCell Data
#*7693# = Sleep Act/DeAct (Enable or Disable the Black screen after doing nothing for a while)
#*7284# = Class : B,C or GPRS
#*2256# = Calibration Info
#*2286# = Battery Data
#*2527# = GPRS Switching (set to: class 4, class 8, class 9 or class 10)
#*2679# = Copycat feature (Activate or Deactivate)
#*3940# = External loop test 9600 bps
#*4263# = Handsfree mode (Activate or Deactivate)
#*4700# = Half Rate (Activate or Deactivate)
#*7352# = BVMC Reg value
#*8462# = Sleeptime
#*2558# = Time ON
#*3370# = EFR (Activate or Deactivate)
#*3941# = External looptest 115200 bps
#*5176# = L1 Sleep
#*7462# = SIM phase
#*7983# = Voltage/Frequenci (Activate or Deactivate)
#*7986# = Voltage (Activate or Deactivate)
#*8466# = Old time
#*2255# = Call ???
#*5187# = L1C2G trace (Activate or Deactivate)
#*5376# = ??? White for 15 secs than restarts.
#*6837# = Official Software Version
#*7524# = KCGPRS
#*7562# = LOCI GPRS
#*7638# = RLC allways open ended TBF (Activate or Deactivate)
#*7632# = Sleep mode Debug
#*7673# = Sleep mode RESET
#*2337# = Permanent Registration Beep
#*2474# = ???
#*2834# = Audio Path
#*3270# = DCS support (Activate or Deactivate)
#*3282# = Data (Activate or Deactivate)
#*3476# = EGSM (Activate or Deactivate)
#*3676# = Flash volume formated
#*4760# = GSM (Activate or Deactivate)
#*4864# = Dunno doesn't work on newer versions
#*5171# = L1P1
#*5172# = L1P2
#*5173# = L1P3
#*7326# = Accessory (I got Vibrator)
#*7683# = Sleep variable (
#*7762# = SMS Brearer CS (Activate or Deactivate)
#*8465# = Time in L1
#*9795# = wtls key
#*2252# = Current CAL
#*2836# = AVDDSS Management (Activate or Deactivate)
#*3877# = Dump of SPY trace
#*7728# = RSAV done# (Everything went to standart but nothing was deleted)
#*2677# = ARM State (None or Full Rate)
*#8999*636# = Have no clue what it is, i see 20 lines
*#9999# = Software version
*#8999*8376263# = HW ver, SW ver and Build Date
*#8888# = HW version
*#8377466# = Same HW/SW version thing

*#7465625# = Check the locks
*7465625*638*Code# = Enables Network lock
#7465625*638*Code# = Disables Network lock
*7465625*782*Code# = Enables Subset lock
#7465625*782*Code# = Disables Subset lock
*7465625*77*Code# = Enables SP lock
#7465625*77*Code# = Disables SP lock
*7465625*27*Code# = Enables CP lock


#7465625*638*Code# = Disables Network lock
*7465625*782*Code# = Enables Subset lock
#7465625*782*Code# = Disables Subset lock
*7465625*77*Code# = Enables SP lock
#7465625*77*Code# = Disables SP lock
*7465625*27*Code# = Enables CP lock
#7465625*27*Code# = Disables CP lock
*7465625*746*Code# = Enables SIM lock
#7465625*746*Code# = Disables SIM lock
*7465625*228# = Activa lock ON
#7465625*228# = Activa lock OFF
*7465625*28638# = Auto Network lock ON
#7465625*28638# = Auto Network lock OFF
*7465625*28782# = Auto subset lock ON
#7465625*28782# = Auto subset lock OFF
*7465625*2877# = Auto SP lock ON
#7465625*2877# = Auto SP lock OFF
*7465625*2827# = Auto CP lock ON
#7465625*2827# = Auto CP lock OFF
*7465625*28746# = Auto SIM lock ON
#7465625*28746# = Auto SIM lock OFF

*2767*3855# = E2P Full Reset
*2767*2878# = E2P Custom Reset
*2767*927# = E2P WAP Reset
*2767*226372# = E2P Camera Reset
#*6420# = MIC Off
#*6421# = MIC On
#*6422# = MIC Data
#*6428# = MIC Measurement
#*3230# = Trace enable and DCD disable
#*3231# = Trace disable and DCD enable
#*3232# = Current Mode
#7263867# = RAM Dump (On or Off)
*2767*49927# = Germany WAP Settings
*2767*44927# = UK WAP Settings
*2767*31927# = Netherlands WAP Settings
*2767*420927# = Czech WAP Settings
*2767*43927# = Austria WAP Settings
*2767*39927# = Italy WAP Settings
*2767*33927# = France WAP Settings
*2767*351927# = Portugal WAP Settings
*2767*34927# = Spain WAP Settings
*2767*46927# = Sweden WAP Settings
*2767*380927# = Ukraine WAP Settings
*2767*7927# = Russia WAP Settings
*2767*30927# = GREECE WAP Settings
*2767*73738927# = WAP Settings Reset
*2767*49667# = Germany MMS Settings
*2767*44667# = UK MMS Settings
*2767*31667# = Netherlands MMS Settings
*2767*420667# = Czech MMS Settings
*2767*43667# = Austria MMS Settings
*2767*39667# = Italy MMS Settings
*2767*33667# = France MMS Settings
*2767*351667# = Portugal MMS Settings
*2767*34667# = Spain MMS Settings
*2767*46667# = Sweden MMS Settings
*2767*380667# = Ukraine MMS Settings
*2767*7667#. = Russia MMS Settings
*2767*30667# = GREECE MMS Settings
*335# = Delete all MMS Messages
*663867# = Dump Mm file
#*536961# = WAPSAR enable / HTTP disable
#*536962# = WAPSAR disable / HTTP enable
#*536963# = Serial eable / Others disable
#*53696# = Java Download Mode
#*5663351# = WAP Model ID [Your Model]
#*5663352# = WAP Model ID [SEC-SGHXXXX/1.0]
#*566335# = WAP Model ID [SEC-SGHXXXX/1.0]
*2767*66335# = Check on which model it is
*2767*7100# = SEC-SGHS100/1.0
*2767*8200# = SEC-SGHV200/1.0
*2767*7300# = SEC-SGHS300/1.0
*2767*7650# = Nokia7650/1.0
*2767*2877368# = Reset WAP Model ID to standart
  

MOTOROLA Secrects Codes

| comments


Code to lock keys. Press together *7
Note: [] (pause) means the * key held in until box appears.
Select phone line - (use this to write things below the provider name):
[] [] [] 0 0 8 [] 1 []
Add phonebook to main menu:
[] [] [] 1 0 5 [] 1 []
Add messages to main menu:
[] [] [] 1 0 7 [] 1 []
Copy SIM memory (phonebook menu):
[] [] [] 1 0 8 [] 1 []
Eng Field options (main menu):
[] [] [] 1 1 3 [] 1 []
Slow (Frequency of search menu):
[] [] [] 1 0 1 [] 1 []
Medium (Frequency of search menu):
[] [] [] 1 0 2 [] 1 []
Fast (Frequency of search menu):
[] [] [] 1 0 3 [] 1 []
Enable EFR:
[] [] [] 1 1 9 [] 1 []
Function :
[] [] [] # # # [] 1 []
Change pin:
[] [] [] 0 0 4 [] 1 []
Unblocking using the "puk" number:
[] [] [] 0 0 5 [] 1 []
There are lots of similar codes exist. If you change the last number to 0 you can deactive that code. The 3 digit number at the middle are from 0 to 999. I put the most interesting codes. (EFR):Enhanced Full Rate Codec.



You can change GSM frequencies to 900/1800 by entering the enginnering model. Following the below steps:
enter menu and press 048263* quickly, then you will enter the secret engineering menu
under "Opcode"
input 10*0*3 for GSM 900
10*0*4 for GSM 1800
10*0*5 for GSM 1900
10*0*6 for dual band GSM 900/1800
10*0*7 for dual band GSM 850/1900
To add extra message space 4 your Motorola C350 C450 C550 or C650, press menu button, press 048263* quickly, then on the popup menu enter 47 press ok.press 50 and ok.press 1 ok.press 64 ok.press 1 ok.press 186 and ok.You will receive an extra 50 msgs memory space.Switch phone off and back on.
 
Support : INDIATRIKS
Copyright © 2011. INDIATRIKS - All Rights Reserved
Template Edited By Indiatriks
Proudly Powered By Blogger