YoVDO

All Your GPS Trackers Belong to Us - C. Kasmi, P. Barre - Hack in Paris - 2019

Offered By: Hack in Paris via YouTube

Tags

Hack in Paris Courses Cybersecurity Courses Reverse Engineering Courses Privacy Courses

Course Description

Overview

Explore a comprehensive analysis of security vulnerabilities in GPS-enabled trackers during this conference talk from Hack in Paris. Delve into the potential risks associated with using these devices in private and professional settings. Examine various attack scenarios, including traffic analysis, SMS-based configuration exploitation, protocol reverse engineering, and GPS signal spoofing. Learn about the implemented test-beds designed to uncover critical security flaws that lead to privacy and security issues. Discover how some trackers contain hidden microphones for eavesdropping and how attackers can gain access to audio recordings. Gain insights into the detection methods for trackers and the implications of their widespread use in law enforcement and private sectors.

Syllabus

Introduction
Overview
Background
Architecture
Attack vectors
Attack Scenario
Analysis
Live Demo
Explanation
Fake GPS trackers
Analyzing GPS trackers
GPS tracker website
Conclusion


Taught by

Hack in Paris

Related Courses

NetflOSINT- Taking an Often-Overlooked Data Source and Operationalizing It - Joe Gray - Hack in Paris
Hack in Paris via YouTube
All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon Brizinov - Hack in Paris - 2021
Hack in Paris via YouTube
Exploits in Wetware - R. Sell - Hack in Paris - 2019
Hack in Paris via YouTube
In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019
Hack in Paris via YouTube
Cracking the Perimeter with SharpShooter - Dominic Chell - Hack in Paris - 2019
Hack in Paris via YouTube