filmov
tv
Black Hat Asia 2014 - The Machines That Betrayed Their Masters
Показать описание
By: Glenn Wilkinson
The devices we carry betray us to those who want to invade our privacy by emitting uniquely identifiable signals. The most common example is the wireless signals emitted by your mobile phone (even whilst tucked safely into your pocket). Such signals may be used to track you, or be used toward more malicious intent.
This talk will discuss the process the author has gone through to build a resilient, modular, reliable, distributed, tracking framework - originally spawned as a PoC tool in 2012 by the name 'Snoopy'. The dog is back, and with more bite - looking beyond just Wi-Fi. Also, he's now airborne via a quadcopter.
The devices we carry betray us to those who want to invade our privacy by emitting uniquely identifiable signals. The most common example is the wireless signals emitted by your mobile phone (even whilst tucked safely into your pocket). Such signals may be used to track you, or be used toward more malicious intent.
This talk will discuss the process the author has gone through to build a resilient, modular, reliable, distributed, tracking framework - originally spawned as a PoC tool in 2012 by the name 'Snoopy'. The dog is back, and with more bite - looking beyond just Wi-Fi. Also, he's now airborne via a quadcopter.
Black Hat Asia 2014 - The Machines That Betrayed Their Masters
Black Hat Asia 2014 - Keynote by Dr. Steve Crocker
Black Hat Asia 2014 - Z:\MAKE TROY\NOT WAR: Case Study of the Wiper APT in Korea, and Beyond
Black Hat Asia 2014 - Persist It: Using and Abusing Microsoft's Fix It Patches
Black Hat Asia 2014 - Dude, WTF in My CAN!
Blackhat 2014 Keynote Briefings Training Expo Highlights
Black Hat Asia 2014 The Machines That Betrayed Their Masters
Black Hat Asia 2014 Z MAKE TROY NOT WAR Case Study of the Wiper APT in Korea, and Beyond
Black Hat Asia 2014 - Dude, WTF in My CAN!
Black Hat Asia 2014 Persist It Using and Abusing Microsoft s Fix It Patches
Comprehensive Virtual Appliance Detection by Kang Li Black Hat - Asia - Singapore - 2014
Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips
Black Hat Asia 2014 Keynote by Dr Steve Crocker
Keynote by Dr Steve Crocker Black Hat - Asia - Singapore - 2014
China's Military Cyber Operations: Has the Strategic Support Force Come of Age?
Metasploit Mastery Promo - BlackHat 2014
Solutum Cumulus Mediocris by Eldar Marcussen Black Hat - Asia - Singapore - 2014
Scan All the Things Project Sonar by Mark Schloesser Black Hat - Asia - Singapore - 2014
Building Trojan Hardware at Home by JP Dunning Black Hat - Asia - Singapore - 2014
Blackhat 2014 Browser Exploits, Heartbleed & Cyber Espionage
Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014
Black Hat Asia 2014 Dude, WTF in My CAN!
Welcome and Introduction to Black Hat Asia 2015
PPLdump Is Dead. Long Live PPLdump!
Комментарии