粗人是什么意思| 皮蛋是什么蛋做的| 命里缺水取什么名字好| 早搏什么症状| 黄体期出血是什么原因| 锁钥是什么意思| 玉皇大帝姓什么| 腹腔淋巴结是什么意思| 疝外科是治什么病的| 胎次是什么意思| 养什么鱼招财转运| 一什么车厢| 海里有什么鱼| 恩客是什么意思| drg什么意思| 肌肉跳动是什么原因| 脑梗吃什么最好| 48年属什么| 8月14日是什么星座| 小孩子肚子疼吃什么药| 眼皮一直跳是什么原因| 长焦镜头是什么意思| 接踵而至是什么意思| 混油皮是什么特征| 肾虚吃什么补最好| 什么东西进去是硬的出来是软的| 身体虚弱打什么营养针| 腕管综合征吃什么药| 药石是什么意思| 眼睛干涩疼痛用什么滴眼液好| 胃窦糜烂是什么意思严重吗| 南瓜和窝瓜有什么区别| 套是什么意思| 秋季养胃吃什么好| 高铁上什么东西不能带| 谷草谷丙高是什么原因| 股票换手率是什么意思| 新疆人信仰什么教| 甘草是什么| 16周检查什么项目| 投射效应是什么意思| 紫萱名字的含义是什么| 树脂是什么材质| jimmy是什么意思| sjh是什么意思| 月经来的少是什么原因| 小孩感冒发烧吃什么药| 用你的手解我的锁是什么歌| 报喜鸟属于什么档次| 点字五行属什么| 右侧上颌窦粘膜增厚是什么意思| 师长是什么级别| 五脏六腑是什么意思| 心脏不好喝什么茶比较好| 赞赏是什么意思| 教育是什么意思| 什么颜色的猫最旺财| 艾灰有什么作用和功效| 胰腺钙化灶是什么意思| 代血浆又叫什么| 黄金芽是什么茶| 什么叫肠化| 开塞露有什么功效| 履历是什么意思| 托塔李天王的塔叫什么| fwb什么意思| 书店里买不到什么书| 甄嬛传什么时候上映的| 吃牛肉有什么好处| 牙疼吃什么药管用| 周围型肺ca是什么意思| 榄仁叶是什么树的叶子| qs排名是什么意思| 柔软的什么| 孕妇可以吃什么零食| 彩排是什么意思| 弈五行属什么| 县里的局长是什么级别| 干眼症吃什么药好| 道心是什么意思| 男人结扎了有什么坏处| 天庭的动物是什么生肖| 正常的包皮什么样子| 市公安局局长什么级别| fila是什么品牌| 喝苹果醋有什么好处和坏处| 3个火念什么| 鸡肉配什么菜好吃| 霉菌阴道炎用什么药| 梦见骆驼是什么意思| 火烈鸟为什么是红色的| 缓刑是什么意思| 全身发抖是什么原因| 女人内心强大说明什么| 急性胃肠炎用什么药| 眼睛有异物感是什么原因| 农历六月是什么夏| 哺乳期什么东西不能吃| 梦见媳妇出轨什么预兆| 四眼狗有什么迷信说法| 后面的牙齿叫什么| 尿路感染挂什么科| 覆盆子是什么东西| 环移位了有什么症状| 眼角发痒是什么原因| 银耳为什么助湿气| 姓蔡的女孩起什么名字| 芹菜吃多了会有什么影响| 观照是什么意思| 宝宝睡觉出汗是什么原因| 梦见浇花是什么意思| 颈椎病吃什么药最好效果| 查乳房挂什么科| 宝宝肠炎吃什么药| 喝什么茶养胃| 熬夜 吃什么| 偶尔头疼是什么原因| 痛经什么感觉| 补给是什么意思| 19年属什么| 阿胶烊化是什么意思| 腰椎生理曲度变直是什么意思| 身体内热是什么原因| 禹五行属什么| 德不配位是什么意思| 砖红色是什么颜色| 脚痒脱皮是什么原因| 悲伤是什么意思| 石灰的主要成分是什么| 割掉胆对人有什么影响| 吃什么全面补充维生素| 戒断是什么意思| 高血糖吃什么水果| 经常流鼻涕是什么原因引起的| mm是什么意思| 成都人民公园有什么好玩的| 今天什么日子老黄历| 晕车药吃多了有什么副作用| 梦见红色的蛇是什么意思| 睡觉头出汗是什么原因| 果子狸是什么动物| 择日不如撞日什么意思| 茶叶水洗脸有什么好处| 肾阳虚喝什么泡水最好| 今年是什么年啊| 秘辛是什么意思| 为什么会尿频| 牡丹花代表什么生肖| 慢性萎缩性胃炎吃什么药可以根治| 为什么会得脂溢性皮炎| 丑时是什么时辰| hp是什么意思| 倒斗是什么意思| 蜜蜂为什么要采蜜| 劳伦斯属于什么档次| 身份证穿什么衣服| 吃什么有助于排便| 翡翠对人体有什么好处| hpv16阳性是什么意思| 吐黄水是什么原因| 会考是什么意思| 手心朝上是什么意思| 93年的鸡是什么命| 中枢是什么意思| 书卷气是什么意思| 死鱼是什么意思| 外阴瘙痒用什么| 潮吹是什么感觉| 儿茶是什么中药| 产妇吃什么好| 心率高是什么原因| 93年什么命| 吃什么能提神不打瞌睡| 动脉硬化有什么危害| 护照补办需要什么材料| 为什么手会麻| adhd是什么病| 胰腺炎为什么不能同房| 品牌是什么意思| 镜花缘是什么意思| 玉兰花什么时候开| 柠檬什么时候成熟| 什么是腰间盘突出| 男士私处瘙痒用什么药| 第一次坐飞机要注意什么| 一产二产三产分别包括什么| 去湿气喝什么好| 精子是什么味道| 血氧低吃什么提高的快| 辅酶q10是什么| 牛跟什么生肖相冲| a货是什么意思| 菌子不能和什么一起吃| 直升是什么意思| 精囊腺囊肿是什么意思| 鸡和什么属相相冲| afi是胎儿的什么意思| 杜康原是什么| 结核病是什么| 上日下文念什么| 小酌怡情下一句是什么| gtp是什么| 思密达是什么意思| 羊五行属什么| 胜肽的主要功能是什么| 外阴溃烂用什么药| 偶数和奇数是什么意思| 屁股痒是什么原因| 大山羊是什么病| 汶字五行属什么| 什么是手足口病| 炁读什么| 经常手瘾吃什么药| 狭鳕鱼是什么鱼| 黄金的动物是什么生肖| 智齿为什么叫智齿| 什么烟最便宜| 晚上睡觉睡不着是什么原因| 绸缪是什么意思| 失败是成功之母是什么意思| 盥洗室什么意思| 第二职业干点什么好呢| 补充公积金是什么意思| 安门是什么意思| 容易脸红的人是什么原因| 小孩肺炎吃什么药| 小孩啃指甲是什么原因| 二个月不来月经是什么原因| 雾化是什么意思| 白凉粉是什么原料做的| 6月28是什么星座| 尿素低是什么原因| 坐月子吃什么水果| 以身相许什么意思| 莲子不能和什么一起吃| 女性脉弦是什么意思| tpa是什么意思| 呼吸道感染吃什么药| 肠易激综合征吃什么药好| 前列腺液和精液有什么区别| 心血管堵塞吃什么药| 中签是什么意思| 背痒是什么原因| 什么蜂蜜最好| 看好你是什么意思| 减肥晚餐吃什么| 龙延香是什么| 印尼用什么货币| 中秋是什么时候| 中出什么意思| 市长什么级别| 四个月宝宝可以吃什么辅食| 快乐是什么意思| 什么动物怕热| 哈儿是什么意思| 为什么种牙那么贵| 十二月十号是什么星座| 情是什么意思| 发际线是什么| 手掌发黄是什么原因| 2月24是什么星座| 人生观价值观世界观是什么意思| 鹏字五行属什么| dm医学上是什么意思| 百度

Tuesday, October 30, 2012

Abusing WiFi-Based A-GPS To Achieve Extreme Low-Cost Targeted Tracking

When security consultants and analysts consider the use of modern-day tracking techniques, they think of two things: tracking devices and mobile phones. And that's fair. GPS tracking devices, such as the Zoombak, are cheaper and more effective than ever before. However, as I demonstrated in 2011, tracking devices are often poorly designed, easy to reverse, and insecure. This means that they can not only be found remotely, but they can be hacked.

Mobile phones are always a significant vector for location tracking, as they commonly move with a target. But, what if the target is only exposed while using a burner? The MSISDN or software on the mobile endpoint may not persist beyond exposure, making the endpoint a less desirable resource.

Advances in technology, however, provide an interesting alternative to these solutions that has not yet been widely discussed by privacy advocates. Though, the pieces of the puzzle have been available for some time. A significant decrease in the cost of microcontrollers (uC) and wireless components, coupled with the increase in use of peripheral technology, provides an interesting vector for abuse.

What if, for a couple of dollars, a tiny device could be constructed that allows for targeted tracking? This article describes a simple example of how and why this is possible.

The Wireless Photograph

An interesting device crossed my path on Woot in the past few months: the Eye-Fi. This product is a simple SD memory card, like you would use with any digital camera. Models are offered that support flash storage of 4GB to 16GB, along with a more interesting storage option: wireless image delivery.

Eye-Fi 802.11 enabled SD Card
At 3.3V, the Eye-Fi product line integrates three chip components: a microcontroller, a flash chip for image and application/configuration storage, and a Marvell 802.11 wireless chip. The internal layout of the product can be seen in this FCC filing from 2010. From this information, it is easy to determine that the Eye-Fi is meant to act as a wireless client driven by the power of a digital camera.

When the camera saves an image to the Eye-Fi, the Eye-Fi SD card transparently uploads the image over a WiFi network to a laptop, phone, or other endpoint on the same network. While gimmicky as a SD card, this product is exceptionally inventive because of the way it exploits power from a host device.

Alternative Use Cases

While writing to the network is certainly an important feat, an aside to this article would be the use of this design for fuzzing/testing of devices that read from an SD card (such as a firmware update). Reads from the SD card could be cached from the network in order to test multiple variations of a firmware image without the chore of having to copy each new image to an SD card. I'm looking at you Travis Goodspeed.

Assisted GPS and WiFi

Regardless, the design of the Eye-Fi brings to mind another technology: Assisted GPS (A-GPS). A-GPS helps devices determine their approximate physical location even when a Global Positioning System (GPS) beacon is unavailable. As many technologists know, A-GPS has evolved beyond the analysis of cellular beacons for location derivation. Today, alternative signals can be used as location control as well, such as 802.11.

Google Street View Car in Action
I'm sure that everyone remembers Google's trouble with WiFi, Street View, and Privacy. Google, along with many other companies, use WiFi to ascertain the physical position of a mobile device when GPS is no longer available. This means that they were collecting a giant database of WiFi access points across several countries around the world. 

Samy Kamkar, a security researcher, came up with a brilliant application that abused Google's web API  and allowed anonymous users to query for 802.11 access points. Google responded by blocking Samy's application and restricting queries to only users that are known to be associated with particular access points.

The Access Point That Wasn't

So, let's presume users can't query devices that they aren't associated with. I'm sure this is hardly the case as even if Google has solidified this issue, custom databases like Zoombak's, Skyhook, and others, have had similar issues to Google's but are far less vetted by the security industry. Regardless, let's step back for a minute and presume this "hole" is patched. What does a researcher do? 

Well, systems like Skyhook and Google don't actually attempt to log on to random WiFi access points. Instead, they simply take note of the location of the beacon along with the access point name (SSID) and the address (MAC/BSSID). This means that the access point (AP) doesn't have to function. In fact, it doesn't have to do anything except emit a valid beacon. 

What if technology similar to the Eye-Fi could be designed to emit a fake AP beacon instead of acting as a client? The "Fake-Fi" could simply emit a beacon intended to be picked up by devices that would pass on the beacon name and MAC to another authority, such as a Google location database.

Selecting a WiFi network on Android
For example, Android and iPhone devices that see the beacon could upload data describing the Fake-Fi access point to a centralized database. This means that everyone in range of the Fake-Fi is helping tell the world where this beacon is located. This makes for an interesting tracking opportunity without having to use a large amount of power, cellular infrastructure, or other complicated technologies. The Fake-Fi can be driven with two simple chips (a uC and an 802.11 chip) off a 3.3V power source for the cost of dollars, just like the Eye-Fi.


The Result

Using this methodology, researchers can poison technologies that are more likely to stay present on an individual's person. A USB cable, USB dongle, mouse, mini-keyboard, laptop power adapter, wall wart, or another commonly trafficked device can now become a beacon.

This is an extremely hard to detect attack as the components used are small and thin enough to fit on a SD Card. There is a large amount of potential host technologies for this technique and few ways to effectively detect them. A user may notice the addition of a WiFi access point in their range, but will they presume it originates from their own equipment, or will they presume a neighbor is the source of the beacon? An attacker can diminish the potential for inspection by lowering the beacon strength of the wireless signal, making it look as if the source is farther away than it actually is.

A common Samsung microSD Card in an Android phone
The SD card in a user's Android phone can even be replaced with this technology, turning the phone into a proxy for the tracking beacon without the user's knowledge. How's that for parasitic technology?


Read and Store

An alternative and purely passive methodology would be to use almost the exact same formula as the Eye-Fi technology: WiFi client. Except, instead of connecting to WiFi networks, the software on the uC could simply log the access points and their frequency to the flash storage. Access points with higher frequency (occurrence) would identify a user's location and could be searched for using the same technologies: Google, Skyhook, etc. 

However, this purely passive tracking technique would require physical access to the target's devices at two exposure points in time, rather than one, significantly increasing the risk of the operation. 


The Take Away

At Capitol Hill, we believe that desktops, laptops, and even BYOD, are no longer the only risks a group or individual must monitor. Instead, security analysts must consider the applicability of each potential wireless endpoint as a source for malicious or parasitic behavior. And, analysts must consider that not all devices are known - or can be known - in a particular environment.

Discovering, cataloging, and isolating, the risks of the wireless world is a growing challenge. At Capitol Hill, we help organizations identify and mitigate the risks introduced by the Bring Your Own Radio world through our years of embedded engineering and security expertise. Our team will help define what practical threats mean to your organization, how they can be detected, and the most fiscally effective ways of removing these risks. Contact us today to determine if our services are right for your organization at: info at capitolhillconsultants dot com.

Best,
Don A. Bailey
Founder

什么防晒霜好用 什么 姿势 最深 萎靡是什么意思 拉肚子能吃什么食物 什么是春梦
NPY什么意思 女人腰疼是什么原因引起的 上海为什么叫申城 上善若水下一句是什么 为什么一吃东西就拉肚子
上火吃什么水果降火快 6岁属什么 例假少吃什么药 存款准备金率是什么意思 尿道口感染吃什么药
国民老公是什么意思 p和t分别是什么意思 什么茶减肥效果好 认知是什么 登革热吃什么药
平纹布是什么面料hcv9jop3ns0r.cn 培根是什么肉做的gysmod.com 女人吃什么养颜又美白sscsqa.com 喇蛄和小龙虾什么区别hcv9jop3ns9r.cn 点睛之笔是什么意思inbungee.com
娘家人是什么意思hcv9jop3ns2r.cn 子宫内膜手术后需要注意什么hcv8jop4ns6r.cn 西柚不能和什么一起吃hcv8jop2ns2r.cn 开瑞坦是什么药hcv8jop4ns1r.cn 小哥哥是什么意思hcv7jop5ns4r.cn
青定读什么weuuu.com 吃菌子不能吃什么hcv9jop6ns2r.cn 性交是什么hcv7jop4ns7r.cn 双鱼座的幸运石是什么hcv7jop4ns5r.cn 脚脖子粗是什么原因hcv8jop7ns8r.cn
霸王花煲汤放什么材料hcv8jop5ns4r.cn 六味地黄丸什么功效hcv7jop9ns7r.cn adhd挂什么科hcv8jop6ns6r.cn 健康证查什么mmeoe.com 涧是什么意思hcv9jop6ns7r.cn
百度