if you want to do something badly enough, you will figure it out - nobody will hold your hand along the way. how badly do you want/need it?
for the noobs - sim swap = someone that has the doxx of another (the target) convinces the targets mobile carrier that they are the target with the info they have obtained.
say you know John Doe has a Coinbase acct linked to his phone and even uses 2FA to login.
Once the mobile carrier transfers the service onto the newly registered SIM card, all of the calls, texts, everything will now go to the phone in your possession using the SIM card you worked with the mobile carrier to activate on the phone. this is just a rough walkthru, it does require more work than just that and there is alot i left out, but its safe to say that if you have all of your personal, financial and social accounts linked to phone and your personal data is leaked or ends up in the wrong hands, someone who knows what theyre doing can have a damn field day in your name and remain anonymous as they cash in
I know how its done, and I have done it personally and recently - i cannot say i have tried all of the carriers, but believe they are probably all vulnerable to this sort of attack, unless there is no SIM present...