|
|
|
Making Sense of Static - New Tools for Hacking GPS |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Making Sense of Static - New Tools for Hacking GPS Par SecurityTube.NetLe [2013-01-31] à 16:04:47
Présentation : GPS receivers are a part of everyday life, you probably own several already and use them everyday, in your phone or in your car. Its really pretty amazing that you can find your position anywhere on Earth with just a small device you can fit in your pocket, but how does it actually work In this talk we would like to guide you through the amazing technical journey that makes this possible and to open it up to the hacker community to explore. Current GPS receivers found in mobile phones etc. are capable of about 5m accuracy but high-end receivers costing thousands can get this down to centimeters just using some more sophisticated algorithms and processing. This really opens up a lot of opportunities for UAVs and Quadcopters and other applications we havenâ t even thought of - what would you use it for and we would like to see this level of performance available in an open-source system. We have developed and would like to share with you a new set of tools which we hope will make GPS accessible to hackers and experimenters a library, libswiftnav, which contains a complete toolset for building a GPS receiver, and Piksi, a stand-alone hardware platform to run it on. The prototype is already very capable - we canâ t wait to see what you can come up with. Fergus Noble graduated in 2011 with an MSc. in Physics from the University of Cambridge, UK. Whilst at Cambridge he spent most of his spare time working on an 100km amateur rocket attempt which led to his frustration with available GPS systems. After graduating, he moved to California to work for Joby Energy on GPS systems for high-altitude wind turbines before co-founding Swift Navigation with Colin Beighley and Henry Hallam to work on a new open-source GPS receiver. He is also a co-maintainer of libopencm3, an open-source peripheral library for ARM Cortex-M based microcontrollers and creator of Plot-o-matic, an open-source tool for quickly visualising real-time data streams. https github.com fnoble Colin Beighley graduated from the University of California at Santa Cruz in 2010 with a BS in Electrical Engineering. He worked at Joby Energy in Bonny Doon, California, before co-founding Swift Navigation with fellow GPS hackers Fergus Noble and Henry Hallam. He is the creator of softgnss_python, an open-source GPS GNSS post-processing library.
Les mots clés de la revue de presse pour cet article : static Les videos sur SecuObs pour les mots clés : static
Les derniers articles du site "SecurityTube.Net" :
- TROOPERSCON - Crypto code the 9 circles of testing - TROOPERSCON - Towards a LangSec Aware SDLC - TROOPERSCON - Deep dive into SAP archive file formats - TROOPERSCON - Thanks SAP for the vulnerabilities. Exploiting the unexploitable - TROOPERSCON - An easy way into your multi-million dollar SAP systems An unknown default SAP account - TROOPERSCON - One Tool To Rule Them All - TROOPERSCON - Mind The Gap - Exploit Free Whitelisting Evasion Tactics - TROOPERSCON - The Chimaera Processor - TROOPERSCON - Lets Play Hide and Seek in the Cloud - TROOPERSCON - Planes, Trains and Automobiles The Internet of Deadly Things
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|