WiFi Based IMSI Catcher Black Hat - Europe - 2016

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=eOFae07G2Qc



Duration: 59:24
73 views
3


We introduce a new type of IMSI catcher which operates over WiFi. Whilst existing Stingray type IMSI catchers exploit 2-4G radio protocols to track movements of mobile subscribers, in this talk, we introduce two new approaches to track mobile devices which exploit authentication protocols that operate over WiFi. These protocols are now widely implemented in most modern mobile OSes, allowing for the creation of a low cost IMSI catcher.

We demonstrate how users may be tracked on a range of smartphones and tablets including those running iOS , Android and other mobile OSs. This tracking can be performed silently and automatically without any interaction from the tracked user. We have developed a proof of concept system that demonstrates our IMSI catcher employing passive and active techniques.

Finally, we present guidelines for vendors and cellular network operators to mitigate the user privacy issues that arise.

Piers O'Hanlon | Researcher, University of Oxford
Ravishankar Borgaonkar | Researcher, University of Oxford
Location: Gallery Hall
Date: Thursday, November 3 | 10:00am-11:00am
Format: 50 Minute Briefing
Track: Android, iOS and Mobile Hacking


Black Hat - Europe - 2016 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-20Chasing Foxes by the Numbers Patterns of Life and Activity in Hacker Forums
2021-12-2050 Thousand Needles in 5 Million Haystacks Understanding Old Malware Tricks
2021-12-20Code Deobfuscation Intertwining Dynamic, Static and Symbolic Approaches
2021-12-20I Know What You Saw Last Minute The Chrome Browser Case
2021-12-20Use After Use After Free Exploit UAF by Generating Your Own
2021-12-20Inside Web Attacks The Real Payloads Black Hat - Europe - 2016
2021-12-20CTX Eliminating BREACH with Context Hiding Black Hat - Europe - 2016
2021-12-20When Virtualization Encounter AFL A Portable Virtual Device Fuzzing Framework with AFL
2021-12-20Locknote Conclusions and Key Takeaways from Black Hat Europe 2016
2021-12-20AI based Antivirus Can AlphaAV Win the Battle in which Man Has Failed
2021-12-20WiFi Based IMSI Catcher Black Hat - Europe - 2016
2021-12-20Cyber Judo Offensive Cyber Defense Black Hat - Europe - 2016
2021-12-20Another Brick Off the Wall Deconstructing Web Application Firewalls Using Automata Learning
2021-12-20ARMageddon How Your Smartphone CPU Breaks Software Level Security and Privacy
2021-12-20Witchcraft Compiler Collection Towards Self Aware Computer Programs
2021-12-20Attacking Windows by Windows Black Hat - Europe - 2016
2021-12-20Fuzzing Android A Recipe For Uncovering Vulnerabilities Inside System Components In Android
2021-12-20Breaking Access Controls with Blekey Black Hat - Europe - 2015
2021-12-20Faux Disk Encryption Realities of Secure Storage On Mobile Devices
2021-12-20Locknote Conclusions and Key Takeaways from Black Hat Europe 2015
2021-12-20Stegospolit Exploit Delivery With Steganography and Polyglots Black Hat - Europe - 2015



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering