The Machines That Betrayed Their Masters

Your machine (mobile phone, bluetooth device, router etc etc) may betrayed you and can be used to detect your position or even invade your privacy. They are watching you, stay alert.

The devices we carry betray us to those who want to invade our
privacy by emitting uniquely identifiable signals. The most common
example is the wireless signals emitted by your mobile phone (even
whilst tucked safely into your pocket). Such signals may be used to
track you, or be used toward more malicious intent.

This talk will discuss the process the author has gone through to
build a resilient, modular, reliable, distributed, tracking framework –
originally spawned as a PoC tool in 2012 by the name ‘Snoopy’. The dog
is back, and with more bite – looking beyond just Wi-Fi. Also, he’s now
airborne via a quadcopter.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Exploit Heartbleed using Metasploit in Kali Linux

Heartbleed vulnerability (registered as CVE-2014-0160) is a security bug present in the older version of OpenSSL cryptographic library. OpenSSL is a cryptographic toolkit used...

How to Install Parrot Security OS on VirtualBox in 2020

Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013. It is a mixture of Kali Linux and Frozenbox OS, aims to...

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...