Events

Click here to browse all events and RSVP! :)

Friday, June 20th, 8pm: Network/Mobile Sniffing, Protocol Deobfuscation, Reverse Engineering

FREE and open to the public!

Location: Crash Space
10526 Venice Blvd, Culver City CA 90232
Google Map

Samy Kamkar [email] will go over Network/Mobile Sniffing, Protocol Deobfuscation, Reverse Engineering

To go over some of the cross-over, I think what we'll do for this class is go through a real-world and step-by-step walk-through of an encrypted, obfuscated, undocumented protocol on the Android or iOS stack which was NOT open source (source was NOT in Android), yet binaries included in all Android installations (and similarly iOS). From reasons to investigate these funny packets and how I ultimately found Android (and iPhone, and Windows 8 mobile) were sending massive amounts of encrypted, obfuscated GPS/geolocation data and MAC addresses of all networks around you (correlated to GPS) and storing it all, from every single smartphone.

Even when you turned GPS off.

So we'll go over:

By the end of the class, not only do I hope you will be able to do this process or use any of these methods yourself in other areas, but you will be able to manipulate Google/Apple Maps' Traffic, meaning you can make Venice Blvd look green for fast or red for slow (for anyone using Google/Apple Maps) to reroute them, and you will be able to find the physical address of anyone by obtaining their router's MAC address (which you can often get by having them visit a page without authorization -- more will be discussed in the class). That wasn't my intention, but a side effect of learning about one thing opens up some pretty crazy, unexpected possibilities.

By the end you should have a basic understanding of doing this process yourself, have a pretty good toolchain for this type of research, and also be able to use any of these a la carte for useful reasons in the future.

I'll try to use cross-platform software for the most part (OS X [my weapon of choice typically], Loonix and Windows) and provide any tools I've developed to make these easier.

Our google calendar (shown above) is also available HERE!