Phase2_UE_Android_SIM

Phase 2 - UE, Android, and SIM Security Assessment

Warning

Keep this phase focused on devices, SIMs, and applications that you own or are explicitly authorized to assess.

Purpose

This phase evaluates subscriber-side risk without requiring RF transmission. It is the fastest way to start collecting useful findings while your core lab is being stabilized.

Primary assessment questions

Area Question Typical evidence
Carrier app exposure Do carrier apps over-collect, trust weak TLS paths, or expose sensitive functions? Traffic captures, manifest review, exported component review
Device telephony exposure Are diagnostic, telephony, or local management surfaces overly permissive? Device inventory, service list, allowed/blocked interfaces
SIM and eSIM controls Are subscriber identifiers, SIM services, and OTA features appropriately constrained? SIM file inventory, enabled services, provisioning notes
Privacy posture Does the device expose more identity or cell data than expected? Screenshots, dumpsys output, cell inventory, settings state
  1. Build a device baseline: OS version, patch level, baseband version, carrier profile, root state.
  2. Inventory carrier and telephony apps and document the components worth reviewing.
  3. Validate proxying, capture, and logging on your own device before testing any workflow.
  4. Review SIM/eSIM identity and service configuration using approved lab SIM material.
  5. Record findings as control weaknesses, not just interesting behaviors.

Outputs expected from this phase

Assessment themes

1. Device and carrier-app review

Focus on:

2. Telephony and local interface review

Focus on:

3. SIM and OTA posture

Focus on:

4. Evidence and decision points

Capture enough detail to answer:

Companion procedures

Exit criteria

Move on when you can clearly explain: