The machines that betrayed their masters
地址: https://www.youtube.com/watch?v=NiiI_oZ7y64
machines: with computing power and e signals (with wireless chip, NFC, bluetooth)
We all carry ‘machines’ nowadays.
Two interested things:
1.设备发射出的unique signal, eg. RFID signature, mac address. 由这个uniqueness来identify the same device.
To give an example, when wifi is on,the phone will continuously makes noises, shouting information including the mac address of your phone.
2. some way to get the info about the owner of the device.
All in all, a machine, a unique signature, and a link from sig to human
【Smartphones makes people to be surveilled more easily than old days. Yet people are voluntarily carry them. 】
This talk focuses on the unique signature: wifi
手机无线打开的情况下,在没有接入无线连接时,它会自动尝试连接已经记住的所有 wifi, 由此可以知道owner去过什么地方.所以记得点击忘记wifi喔。
Approach 1: passive linking:
if the identifier of a wifi network is unique, then it is easy to geo-location this network. (还记得用war driving来定位WLAN,然后蹭网吗?呵呵。。 http://en.wikipedia.org/wiki/Wardriving )
Approach 2: active linking: 伪造一个热点,interact with the device, then can intercept the traffic, etc.
Tool:
Next generation snoopy: distributed, tracking, data interception, profiling framework. written in python.
save the data to a local database and synchronise with central server.
把attack device和飞行器结合起来,这样vicitm觉察不到attack device的存在,但是攻击设备可以监听到信号;另外可以略过地面的障碍物 (香港占中的时候可以用。有木有?)
用途来啦: sprial search: 我们已经知道了the signature (eg. mac address) of John’s phone, and John is carrying his device, now want to find John, 将装载了spiral search的飞行设备低空飞行进行spiral search,搜寻John手机的signature即可。 (想起了速7里面的天眼,把设备的signature换成人的signature就好了,有木有!不过这一步好难,所以速7是科幻片,鉴定完毕。)
Followed by demo.......
郑重声明:本站内容如果来自互联网及其他传播媒体,其版权均属原媒体及文章作者所有。转载目的在于传递更多信息及用于网络分享,并不代表本站赞同其观点和对其真实性负责,也不构成任何其他建议。