Black Hat Asia 2014 - The Machines That Betrayed Their Masters

preview_player
Показать описание
By: Glenn Wilkinson

The devices we carry betray us to those who want to invade our privacy by emitting uniquely identifiable signals. The most common example is the wireless signals emitted by your mobile phone (even whilst tucked safely into your pocket). Such signals may be used to track you, or be used toward more malicious intent.

This talk will discuss the process the author has gone through to build a resilient, modular, reliable, distributed, tracking framework - originally spawned as a PoC tool in 2012 by the name 'Snoopy'. The dog is back, and with more bite - looking beyond just Wi-Fi. Also, he's now airborne via a quadcopter.
Рекомендации по теме
Комментарии
Автор

This is a cool combination of some older revamped stuff (pineapple networks, wardriving databases, sniffing) used together to gather some detailed information.

inurbse
Автор

@33:09 For efficiencies sake, use a hexagonal close-packing pattern instead of a square grid pattern for the search grid.

stan.rarick
Автор

There's no way you're gonna be able to fly your drone over an entire city nowadays without someone shooting it down for violation of airspace or something...

unfa
Автор

Great video, black hat tools for free.

LeeAnnabelarticlespinner
Автор

Here's he's code for Snoopy Next Generation:

unfa
Автор

this is why you guy's can't buy me a coffee

paulindawsoncr
Автор

At 18:30 he mentions some attack. I can't hear what he says.. "coma attack"? Anyone? - Edit: he said: karma attack

bitraker
Автор

11:20

Mr hacker can't connect to the projector .

gchinmayvarma