I wont say too much in an open forum, not because i do not wish to share, simply i cannot be sure who is reading the content and therefore wont want to assist those who are less than honest.
It would also be useful Just.Encased if you inidcate who you are and your working role.
What is acceptable to mention; I assume you have taken a complete 'image' (inc compressed files, slack and free space) of the target PC hdd and created numerous copies for (a) analysis and (b) placing a clone HDD to run in a test bed PC.
Of the target SIMbox, do not switch it on and do not insert the SIM cards into the SIMbox in a switched ON state. (i) Just carrying out an analysis at this stage of what is on the SIM cards and thorough investigation into the SIM cards origins and working status etc? (ii) obtain a spec sheet of the SIMbox and its memory.
From a working copy of the hdd image (using the tools and associated search functions at your disposal) search for MCC, MNC, IMSI, MSISDN, ICCID etc
When the bandit kit was found were they in a fixed building location or truck/van/car?
↧