Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Android geolocation using GSM network

URL
http://mirror.fem-net.de/CCC/27C3/mp3-audio-only/27c3-4151-en-android_geolocation_using_gsm_network.mp3
File name
27c3-4151-en-android_geolocation_using_gsm_network.mp3
File size
28.7 MB
MD5
a4906d86c6b63c23152a2f8baa57d8c7
SHA1
855c12cb92bfc0c9694ce5c0abf855cb4542079e

We introduce a new forensic technique that allows to collect users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few hours or days. The attack is based on GSM BTS cell location and little-known Android logging features and can be extended to track a user's activity over long periods of time. We will also show how to perform the attack locally and remotely, and ways to protect against these techniques, as well as forensic applications and privacy concerns. As a part of the presentation we plan to show a live demonstration of both local and remote attacks to retrieve geolocation and activity history of targeted phones. The graphical mapping tool used for the presentation will be released as open source.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !