All Your GPS Trackers Belong to Us - C. Kasmi, P. Barre - Hack in Paris - 2019
Offered By: Hack in Paris via YouTube
Course Description
Overview
Explore a comprehensive analysis of security vulnerabilities in GPS-enabled trackers during this conference talk from Hack in Paris. Delve into the potential risks associated with using these devices in private and professional settings. Examine various attack scenarios, including traffic analysis, SMS-based configuration exploitation, protocol reverse engineering, and GPS signal spoofing. Learn about the implemented test-beds designed to uncover critical security flaws that lead to privacy and security issues. Discover how some trackers contain hidden microphones for eavesdropping and how attackers can gain access to audio recordings. Gain insights into the detection methods for trackers and the implications of their widespread use in law enforcement and private sectors.
Syllabus
Introduction
Overview
Background
Architecture
Attack vectors
Attack Scenario
Analysis
Live Demo
Explanation
Fake GPS trackers
Analyzing GPS trackers
GPS tracker website
Conclusion
Taught by
Hack in Paris
Related Courses
NetflOSINT- Taking an Often-Overlooked Data Source and Operationalizing It - Joe Gray - Hack in ParisHack in Paris via YouTube All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon Brizinov - Hack in Paris - 2021
Hack in Paris via YouTube Exploits in Wetware - R. Sell - Hack in Paris - 2019
Hack in Paris via YouTube In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019
Hack in Paris via YouTube Cracking the Perimeter with SharpShooter - Dominic Chell - Hack in Paris - 2019
Hack in Paris via YouTube