Bio: Luiz Eduardo with 20 years of experience, throughout his career he has worked with possibly all types of networking technologies on the enterprise and service provider sectors and the security involved in these technologies, especially 802.11 WiFi. He has also developed the Incident Response practices at two networking hardware vendors. Luiz is the creator and co-founder of the y0u Sh0t the Sheriff and Silver Bullet security conferences held in Brazil and has worked on the wireless infrastructure of Blackhat, DefCon, Computer Chaos Congress and Shmoocon. As a public speaker, he has addressed numerous top-level conferences including DEF CON, FIRST, H2HC, HitB Malaysia, Layerone, ShmooCon, BlueHat, THOTCON, ToorCon, SecTor, BayThreat and others. Luiz currently holds many certifications in the information security field.
Topic of Presentation: Introduction to Mobile Snitch.
Speakers: Luiz Eduardo, Rodrigo “Sp0oKeR” Montoro
In the past few years, we have not only seen a significant growth in use of mobile devices, but also it is not uncommon to see people using more than one mobile device.
With the combination of the nature of mobile WiFi device operations along with the lack of user awareness (or attention), could lead someone not only to know what device you use, but also where’ve you been (and possible where you’re heading to), where do you work, and in some cases who you are. Some users are security-cautious and use VPNs when connecting company provided devices to public hotspots, but still there are a large number of people that use a personal mobile device to check corporateemails and other resources.
This presentation will cover the proof-of-concept for Mobile Snitch. Mobile Snitch will automatically gather information about these devices once in the same network with the goal to pinpoint who that person in that network (or room, coffee shop, etc) is based on the use of certain protocols used by these devices and the way they are configured. The different ways that WiFi devices behave even when not connected to any networks will also be discussed and how passively and without the need of having the device to connect to anything, the tool could also try to fingerprint the owner of the device.