BE THERE FRIDAY, June 20th at 8p for what will prove to be a very informative class with Samy Kamkar
FREE and open to the public!
Network/Mobile Sniffing, Protocol Deobfuscation, Reverse Engineering
To go over some of the cross-over, I think what we’ll do for this class is go through a real-world and step-by-step walk-through of an encrypted, obfuscated, undocumented protocol on the Android or iOS stack which was NOT open source (source was NOT in Android), yet binaries included in all Android installations (and similarly iOS). From reasons to investigate these funny packets and how I ultimately found Android (and iPhone, and Windows 8 mobile) were sending massive amounts of encrypted, obfuscated GPS/geolocation data and MAC addresses of all networks around you (correlated to GPS) and storing it all, from every single smartphone.
Even when you turned GPS off.
So we’ll go over:
top-down approach of trying to examine something undocumented
man in the middle attacks (SSL and non-SSL)/decrypting SSL connections
unknown protocol investigation
By the end of the class, not only do I hope you will be able to do this process or use any of these methods yourself in other areas, but you will be able to manipulate Google/Apple Maps’ Traffic, meaning you can make Venice Blvd look green for fast or red for slow (for anyone using Google/Apple Maps) to reroute them, and you will be able to find the physical address of anyone by obtaining their router’s MAC address (which you can often get by having them visit a page without authorization — more will be discussed in the class). That wasn’t my intention, but a side effect of learning about one thing opens up some pretty crazy, unexpected possibilities.
By the end you should have a basic understanding of doing this process yourself, have a pretty good toolchain for this type of research, and also be able to use any of these a la carte for useful reasons in the future.
This entry was posted by matt on Friday, June 20th, 2014 at 7:52 am and is filed under Events. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response below, or trackback from your own site.