Joke Collection Website - Blessing messages - About mobile phone spoof SMS imy files
About mobile phone spoof SMS imy files
Recently, people often report that after receiving a prank text message, their mobile phones have a black screen, vibrating, and ringing. This is the most typical vulnerability feature. This type of text message basically tells you that if you scroll down the text message, you will see a black screen, etc. If you have the courage, just scroll through it. Most people will think that it is a boring game for boring people. Who knows that when you scroll down, the situation mentioned will actually occur...
2. Vulnerability code:
In fact, all of the above situations occur. It is caused by an imy format ringtone supported by MTK mobile phones. Loading different imy files in the text message content will cause different effects. The specific content of this imy file is as follows: (note that the code is the part between the two lines of #, excluding #)
1. Black screen
##########################
BEGIN: IMELODY
BEAT: 1200
MELODY: (ledoffbackoffvibeoffr5ledoffbackoffvibeoffr5@600)
END: IMELODY
############## #############
2. Violent earthquake
##########################
BEGIN: IMELODY
VERSION: 1.2
FORMAT: CLASS1.0
BEAT: 100
MELODY: (ledoffledonbackoffbackonvibeon@300)
END :IMELODY
##########################
3. Ring
##########################
BEGIN: IMELODY
VERSION: 1.2
FORMAT: CLASS1.0
BEAT: 200
MELODY: (ledoffbackoffvibeonr5vibeoffledonbackonr5@200)
END :IMELODY
#########################
3. How to use the vulnerability
p>The use of this SMS vulnerability can only be used on MTK mobile phones, which means that the MTK mobile phone must be edited to send similar text messages to other MTK mobile phones for it to take effect. So first, you must have an MTK mobile phone. Then open Notepad on your computer, paste the corresponding code above (the part between the two lines of #, excluding the #), and save it as a file with the suffix imy, and put the imy file in the Audio of your phone In the folder, be sure to note that it is the folder of your phone, not the memory card. Finally, start writing a text message on your phone (note that it is a text message, not a multimedia message). The content of the text message is arbitrary. After editing, click "Options" - "Insert Object" - "My Ringtone" - Select the imy file you just made. , just send it to users who are also MTK mobile phones.
When writing the imy file, please note that there is an @ symbol in the "MELODY" line, followed by a number. In fact, this number is the action time. The larger the number after @, the longer the time will be. You can change it according to the situation. The time unit is milliseconds.
4. Vulnerability Analysis
After reading the previous content, it is clear that the essence of this vulnerability is the imy file.
It is understood that the imy file is the earliest monosyllabic ringtone in the form of code supported by Sony Ericsson. The code can be used to call the decoding chip of the mobile phone to emit some sounds and even some core instructions. Therefore, if there are similar commands in the code, such as black screen, ringing, etc., after being sent to the other party, these commands will be triggered once opened, and of course they will cause corresponding results. At present, it seems that as long as someone can understand the language in which these codes are written, there should be no problem in sending text messages such as formatting memory cards. I have an imy file with a formatting command in my hand, but I have not experimented with it because I was worried about causing adverse consequences to others.
5. Experimental Situation and Prevention
During my experiment, I found that not all mobile phones with gray function keys on the screen can be infected. Maybe these mobile phones do not use MTK. Make a plan. I speculate that since imy is not a proprietary format for MTK mobile phones, theoretically all mobile phones that support imy ringtones will be affected. As for prevention, I think it is difficult. After all, you will be infected as long as it is triggered. Maybe you can only close it immediately when you see similar text messages and not continue to browse to avoid activating the imy file code, which may be helpful. Of course, this is only relative. If the text message sent by the other party is to insert the imy file first and then write the text...
Once again, it is okay if you use this vulnerability to play a prank, but if it causes corresponding losses, Then the sender must bear corresponding legal responsibility, so please be careful before experimenting. My article here only discusses the vulnerability itself and does not involve any financial interests. Any losses caused by this vulnerability have nothing to do with me.
- Previous article:Why didn't Qixian send a text message after the traffic police trailer?
- Next article:How to activate China Mobile Phone Card by SMS?
- Related articles
- I received a short message from China Taxation Bureau. Is this true or a scam? My salary income is only 5000 yuan, and after paying social security, there are still 4574 left.
- Where does Huawei allow settings from unknown sources?
- Do Taurus girls take the initiative to chat with people they like?
- A short message expressed my thoughts.
- Received a text message from the civil mediation center.
- Dear customer of Agricultural Bank of China, your bank card with suffix is paying the clearing information with quick money.
- "You have an important value-added courier, please contact this courier as soon as possible". Is this a new type of SMS fraud?
- I received the motor vehicle inspection today, which was postponed for one year.
- Suppose you are the owner of a clothing store. Please write an advertisement for your clothing store. About 45 words
- Children celebrate the Year of the Tiger in 30 seconds.