DEF CON 24 - JusticeBeaver - Discovering and Triangulating Rogue Cell Towers

  Рет қаралды 13,714

DEFCONConference

DEFCONConference

Күн бұрын

The number of IMSI-catchers (rogue cell towers) has been steadily increasing in use by hackers and governments around the world. Rogue cell towers, which can be as small as your home router, pose a large security risk to anyone with a phone. If in range, your phone will automatically connect to the rogue tower with no indication to you that anything has happened. At that point, your information passes through the rogue tower and can leak sensitive information about you and your device. Currently, there are no easy ways to protect your phone from connecting to a rogue tower (aside from some Android apps which are phone specific and require root access). In this talk I’ll demonstrate how you can create a rogue cell tower detector using generic hardware available from Amazon. The detector can identify rogue towers and triangulate their location. The demonstration uses a software defined radio (SDR) to fingerprint each cell tower and determine the signal strength of each tower relative to the detector. With a handful of these detectors working together, you can identify when a rogue cell tower enters your airspace, as well as identify the signal strength relative to each detector. This makes it possible to triangulate the source of the new rogue cell tower.
Bio:
JusticeBeaver (Eric Escobar) is a Security Engineer at Barracuda Networks. His interests are broad and generally include putting computers in places you wouldn’t expect. From chicken coops to rockets and even bee hives. Before being called to the dark side, Eric procured a Bachelor’s and Master’s degree in Civil Engineering. He now enjoys all things wireless, from WiFi, to SDR, and Ham Radio. Last year his team placed 1st in DEF CON 23’s Wireless CTF.

Пікірлер: 10
@morgulbrut
@morgulbrut 6 жыл бұрын
It's worth to watch only for the explanation of triangulation... ;)
@gunturpribadi3705
@gunturpribadi3705 8 жыл бұрын
good
@cesaryasus5319
@cesaryasus5319 7 жыл бұрын
I asked her two questions. where can I have more detailed information to assemble i.m.s.i catcher (Stingray)? where can I buy this item assembled at low cost?
@thallium200
@thallium200 8 жыл бұрын
Harris makes the Stingray. Same company that provides communications equip to the US govt
@PureAmericanPatriot
@PureAmericanPatriot 7 жыл бұрын
thallium200, how do we get anonymous or shadow brokers to hack them? Can you imagine just how nice a customer listing and sales records (with IMSI's and other UID's) would be? It would be nice for once to turn the harassment around and plan flashmobs wherever they have the white MB Sprinter parked.
@_randombob
@_randombob 7 жыл бұрын
lol I have everything but the gsm module on my desk.
@monamoralisch264
@monamoralisch264 8 жыл бұрын
pump it to elk
@blazingkin
@blazingkin 7 жыл бұрын
No one is pointing out that this dude just doxxed himself?
6 жыл бұрын
greater good
Quando A Diferença De Altura É Muito Grande 😲😂
00:12
Mari Maria
Рет қаралды 45 МЛН
1% vs 100% #beatbox #tiktok
01:10
BeatboxJCOP
Рет қаралды 67 МЛН
DEF CON 24 - Jmaxxz - Backdooring the Frontdoor
38:38
DEFCONConference
Рет қаралды 65 М.
FA2023 Week 11: Antivirus and EDR Evasion (2023-11-12)
53:06
SIGPwny
Рет қаралды 1,7 М.
Defcon 21 - The Secret Life of SIM Cards
42:36
HackersOnBoard
Рет қаралды 700 М.
DEF CON 22 - Michael Ossmann - The NSA Playset: RF Retroreflectors
47:22
DEFCONConference
Рет қаралды 183 М.