![]() It will be a section of different devices and vehicles that has Bluetooth capability. The data points of the MAC address will be presented in a way that is shown as a colored dot with lines on a map over the location where it has been tracked. In the fifth part, the author will explain how and what data is passing from the raw data set and being present with a data visualization software called Tableau. In this part of the assignment, the author will also give a runthrough of the detailed configuration of the setup of the MAC address capture device as well as pictures of the device. In the fourth part, the author will write about what device has been used in the capture of the MAC address, with a brief tour of the different hardware chosen, and with an explanation of why it is used. This will be explained with visual explanations as well as a technical explanation of what frames are being broadcasted from the wireless devices and where in the frame the MAC addresses are located. In the third part, the author will explain how the MAC address is broadcast from a WiFi Access Points and Bluetooth device. In the next part of the rapport, the author will explain what a MAC address is, with a visual explanation of what makes a MAC address as well as why a MAC address is unique in a technical explanation. In this report, the author will show how it was possible to location track the MAC address of WiFi Access Points and Bluetooth devices that people use in their daily lives without the knowledge of the user. Below in Figure 0 is the result that I have presented for him about how I tracked him because of the keychain tracker, and allows me to present the data.įigure 0. This Tile is a Bluetooth tracker device that you can attach to whatever you want. ![]() He mentioned he used a Tile to find his keys in another setting. I took this as a challenge to prove to my fellow students that this was possible. Secondly, I would like to thank my teacher Mehdi Shadidi for the discussion that we had with another student about location tracking without the person being online. And the brainstorming sessions with my brother. This is my final Course Project for the first year of Network and IT-Security at Noroff – School of technology and digital media.įirstly, I would like to thank my two partners for supporting me through the project, especially in the first weeks of the data gathering period, which almost burned me out. No personal information is presented in this report, with exception of the preface where informed consent has been given. All logged data and any identifier of any personal information have been deleted by the author after project end. The purpose of this report was to show the vulnerability of these technologies to tracking. This was done in 12 days,a shoestring budget (3000 kr) and the technical knowledge about exploiting vulnerabilities in WiFi Access Points and Bluetooth. mapped encrypted and unencrypted WiFi networks in the covered area in Oslo.generated repeated data points of specific devices that allowed the author to pinpoint movement patterns and habits of several device owners through Oslo, some with their full name on their devices.This report is the culmination of 5 000 000 logged data points from MAC addresses and WiFi Access Points, which in turn This report will show that it is possible to do not only tracking of a single individual but masstracking/surveillance of a large city as well, i.e Oslo. The author wants to show that these technologies are vulnerable to tracking/surveillance without the individual’s notice and online connection. With the ever-increasing use of WIFI and Bluetooth devices in the daily life of the average citizen, many will own at least one device, if not several, which can be used as tracking devices. ![]() location tracking from 3rd parties without the user’s knowledge. This report goes through the vulnerabilities of WIFI and Bluetooth in terms of privacy i.e. SP1-Location-Tracking-of-WIFI-Access-Points-and-Bluetooth-Devices-redacted DownloadīSides Oslo 2022 Presentation of Location Tracking of Bluetooth Devices:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |