Explore a comprehensive analysis of security vulnerabilities in GPS-enabled trackers during this conference talk from Hack in Paris. Delve into the potential risks associated with using these devices in private and professional settings. Examine various attack scenarios, including traffic analysis, SMS-based configuration exploitation, protocol reverse engineering, and GPS signal spoofing. Learn about the implemented test-beds designed to uncover critical security flaws that lead to privacy and security issues. Discover how some trackers contain hidden microphones for eavesdropping and how attackers can gain access to audio recordings. Gain insights into the detection methods for trackers and the implications of their widespread use in law enforcement and private sectors.
All Your GPS Trackers Belong to Us - C. Kasmi, P. Barre - Hack in Paris - 2019
Hack in Paris via YouTube
Overview
Syllabus
Introduction
Overview
Background
Architecture
Attack vectors
Attack Scenario
Analysis
Live Demo
Explanation
Fake GPS trackers
Analyzing GPS trackers
GPS tracker website
Conclusion
Taught by
Hack in Paris