SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
Ethical Hacking and
CountermeasuresCountermeasures
Version 6
Mod le LVIModule LVI
Hacking Global
P iti i S tPositioning System
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.newscientist.com/
Module Objective
This module will familiarize you with:
• Global Positioning System(GPS)
• Secret Startup commands
• Firmware Hacking
• Waypoints
• GPS Tools
• Security Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Global Positioning
System(GPS)
Waypoints
Secret Startup commands GPS ToolsSecret Startup commands GPS Tools
Firmware Hacking Security Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Global Positioning System (GPS)
The Global Positioning System (GPS) is a satellite-
based navigation system that provides reliable
positioning, navigation, and timing services
GPS shows the exact position on earth
GPS is a constellation of 24 satellites revolving
11,000 nautical miles above earth surface
A GPS receiver can detect signals transmitted by
GPS satellite
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GPS satellite
Terminologies
Differential GPS (DGPS)
• DGPS is a method of improving the accuracy of your receiver by
adding a local reference station to expand the information
available from the satellites
Wide Area Augmentation System (WAAS)
• WAAS is intended to enable aircraft to rely on GPS for all phases
of flight, including precision approaches to any airport within its
coverage area
• It transmits signals containing information on reliability and
f h l h h b d
European Geostationary Navigation Overlay
Service (EGNOS)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
accuracy of the positioning signals which are sent by GPS and
Global Orbiting Navigation Satellite system(GLONASS)
Terminologies (cont’d)
Local Area Augmentation System (LAAS)
• Corrected data are transmitted from a local source, typically an
airport or another location where accurate positioning is needed
• These correction data are typically useful for only about a thirty to
oca ea ug e a o Sys e ( S)
These correction data are typically useful for only about a thirty to
fifty kilometer radius around the transmitter
Geometric Dilution of Precision (GDOP)
• The effects of the combined errors of four variables (latitude,
longitude, altitude, and time) on the accuracy of a three-
dimensional fix
• The ratio of incoming signal strength to the amount of interfering
Signal to Noise Ratio (SNR)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
The ratio of incoming signal strength to the amount of interfering
noise as measured in decibels on a logarithmic scale
GPS Devices Manufacturers
Garmin
3S Navigation3S Navigation
Alpine
Navtech
MagellanMagellan
Silva
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Gpsd-GPS Service Daemon
sd is s i d th t it s GPSs tt h d tgpsd is a service daemon that monitors one or more GPSs attached to a
host computer through serial or USB ports
It makes all data on the location/course/velocity of the sensors,
available to be queried on TCP port 2947 of the host computer
With gpsd, multiple GPS client applications (such as navigational and
d i i s ft ) sh ss t GPSs ith t t tiwardriving software) can share access to GPSs without contention or
loss of data
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Gpsd-GPS Service Daemon:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://gpsd.berlios.de/gpsd2.png
Sharing Waypoints
A waypoint is a spot on the surface of the Earth as defined byyp p y
coordinates that are inputted into the GPS and stored, usually along
with an icon, a descriptive name, and some text
• Storing in External storage devices
• Distribute them on paper
There are variety of ways to store waypoints:
• Distribute them on paper
• Make it available on Internet
Websites where waypoints can be stored:
• www.waypoint.org
• www.swopnet.com/waypoints
• www travelbygps com
yp
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• www.travelbygps.com
• www.pickatrail.com
Wardriving
Wardriving is an activity by which WiFi
networks, broadcasting signals are
detected
With addition of GPS, pinpoint location
of the discovered hotspot can be storedof the discovered hotspot can be stored
Information regarding street namesInformation regarding street names,
building numbers, network spots, and
logs by location are stored automatically
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Areas of Concern
Use of precision weapons in which jamming can degrade the
f lt iaccuracy of weapon, results in:
• Unnecessarily increased weapons expenditures
ll l d• An increase in collateral damage
Interruption of GPS can deny warfighters with a common time
d i i di l diand position coordinate, leading to:
• Delays in finding targets
• Increased exposure to threats• Increased exposure to threats
• Missed engagements
"Warfighter" is a term used by the United States Department of
Defense to refer to any member of the US armed forces or a
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Defense to refer to any member of the US armed forces or a
member of any armed forces under the US flag
Sources of GPS Signal Errors
Factors which reduce quality of GPS signal are:
Ionosphere and troposphere delays
Signal multipathSignal multipath
Receiver clock errors
Orbital errors
Number of satellites visibleNumber of satellites visible
Satellite geometry/shading
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Intentional degradation of the satellite signal
Sources of GPS Signal Errors
(cont’d)(cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Methods to Mitigate Signal Loss
Methods to mitigate GPS signal loss are:
1
• Use precision oscillators as flywheel time/frequency generators, as
these oscillators “hold-over” the required specifications for some
period of time until the GPS signal is recoveredp g
• Jam-resistant antennas and receiver front-end add-ons helps to
2
• Jam resistant antennas and receiver front end add ons helps to
minimize the risk of GPS signal loss
3
• Use FAA civil Aviation (Wide Area Augmentation System)
infrastructure; it is a differential ground-based system providing
improved position accuracy, typically 1.5 m, for CAT III aircraft
landing
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g
GPS Secrets
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GPS Hidden Secrets
Electronic device have diagnostic
screen or setup menus
These screens used by
f t t di f lt dmanufacturers to diagnose fault and
possible remedy
GPS devices also have the same but
due to limited number of buttons,
many complex keystrokes are
Source: www.the-gadgeteer.com
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
y p y
necessary to open hidden menus
Secret Startup Commands in
GarminGarmin
Three keyboard keys are important while checking secret
commands if those held down while powering the unitcommands, if those held down while powering the unit
The keys are:
Page Mark Enter
While powering
up unit , holding
page key down
will result in
Holding mark
key down , will
totally reset the
unit
All data will be
lost without any
warning
message
Holding Enter
key down will
show test mode
screen
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
forced cold start
unit message screen
Hard Reset/ Soft Reset
Hard reset
• It erases all data from GPS unit and restores it to
factory default
d h l h f• Hard reset is the last option when soft reset is not
working
• Soft reset erases all data from GPS memory and
Soft Reset
So t eset e ases a data o G S e o y a d
restarts the system
• Soft reset maintains the settings changed by the
user but deletes all routes, waypoints, and other
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
, yp ,
data
Firmware Hackingg
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Firmware
Firmware is software which controls the working of hardware and
Fi t l k f ti f
g
acts on the inputs
Firmware controls many key functions of
GPS devices:
• Data processing
• Positional information decoding
• Data conversion
Reception of satellite data• Reception of satellite data
• External communication with devices
• Storing and managing route/waypoint data
• Interpreting and displaying the information
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Interpreting and displaying the information
Firmware: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Figure: Basic Functions of Firmware
Hacking GPS Firmware: Bypassing the
Garmin eTrex Vista Startup ScreenGarmin eTrex Vista Startup Screen
• Download the latest firmware for the Garmin eTrex Vista and
1
Download the latest firmware for the Garmin eTrex Vista and
extract it
2
• Open 016901000228.RGN file in a hex editor and perform the
below changes
2
3
• Go to the address “00024024” and replace F5 with 6D
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hacking GPS Firmware: Bypassing the
Garmin eTrex Vista Startup Screen (cont’d)p ( )
• Go to address “00024025” and replace 24 with BA
4
Go to address 00024025 and replace 24 with BA
5
• Go to the address “00024026” and replace 03 with 04
6
• Connect the GPS unit to the PC and switch on the GPS receiver
7
• Run the .exe file which you have extracted, it will starts the
firmware update process
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
7
Hacking GPS Firmware: Bypassing the
Garmin eTrex Legend Startup ScreenGarmin eTrex Legend Startup Screen
Use UltraEdit as the hex editor:
1
• Download the latest firmware from the Garmin website
1
• Download the latest version firmware for the Garmin eTrex Vista
2
• Download the latest version firmware for the Garmin eTrex Vista
and extract it
3
• Open the file “017901000241.RGN” in a hex editor and perform
the next changes
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hacking GPS Firmware: Bypassing the
Garmin eTrex Legend Startup Screen (cont’d)g p ( )
4
• Go to the address “000229DC” and replace 91 with 49
4
5
• Go to the address “000229DD” and replace DE with 39
5
6
• Go to the address “0011CB07” and replace 91 with 7E
6
• Connect the GPS unit to the PC and switch on the GPS receiver
7
8
• Run the .exe file which you have extracted, it will begin the firmware
update process
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
8 update process
Hacking GPS Firmware: Bypassing the
Garmin eTrex Venture Startup ScreenGarmin eTrex Venture Startup Screen
1
• Download the firmware from Garmin website
2
• Download the 2.34 version firmware for the Garmin eTrex Vista
and extract it
2
3
• Open the 015401000234.RGN file in a hex editor and perform
the following changes on it
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hacking GPS Firmware: Bypassing the
Garmin eTrex Venture Startup Screen (cont’d)p ( )
4
• Go to the address “0001F4DC” and replceE1 with C9
4
5
• Go to the address “0001F4DC” and replace 99 with FE
5
6
• Go to the address “0001F4DE” and replace 02 with 01
6
7
• Go to the address “000D002F” and replace A7 with 5B
7
8
• Connect the GPS unit to the PC and switch on the GPS receiver
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
8
GPS ToolsGPS Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: GPS NMEA LOG
NMEALOG.ZIP contains 2 programs, one for logging all NMEAp g gg g
protocol data, and one specially for GPS data
The serial com port can be passed to the program as a command lineThe serial com port can be passed to the program as a command line
parameter
The program NMEA DATA LOGGING writes one LOG file that contains
all the important information line by line
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GPS NMEA LOG: Screenshots
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: GPS Diagnostic
GPSDiag is a free GPS program for 32-bit Microsoft WindowsG S ag s a ee G S p og a o 3 b t c oso t do s
platforms to monitor incoming NMEA GPS messages from a serial
port
It displays the interpreted data in the top half of the window with raw
data in the bottom half
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GPS Diagnostic:
Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: RECSIM III
It enables a PC to generate National Marine Electronics Association (NMEA)
i h i l i l h fsentences via the serial port to simulate the output of a GPS, DECCA, or LORAN
navigation receiver
Features:
• Reset the PC's date/time from within RECSIM for ease of time related
testing
• NMEA filtering on input monitors
• Optional NMEA Logging to text filesOptional NMEA Logging to text files
• Support for COM ports 1 - 4 (not just COM1 and COM2)
• Handles dates beyond 2000
• NMEA compatible format
• Optional 4 digit year format for use in ZDA sentences for time related
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
p 4 g y
testing
RECSIM III: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: G7toWin
G7ToWin is designed to transfer data between a PC and Garmin, Magellan, or
Lowrance/Eagle GPS units
G7ToWin supports download of waypoints, track logs, routes, and events
Selected waypoints in the waypoints list can be used to create a track
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
G7toWin: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: G7toCE
G7ToCE can create IGC track files with and without a 'G' validation
drecord
Feat res
• Added support for record D304 for Garmin units
Add d W i t N L th t f i
Features:
• Added a Waypoint Name Length parameter for use in name
comparisons
• Added Category edit for Garmin Waypoint Category values
• Modified .gpx output to support Garmin Extensions
• Supports input datum in Ozi files
• Added track color to .gpx routines--needs further debugging
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
G7toCE: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
S i T lSecurity Tool
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: GPS Security Guard
Components of GPS Security Guard
• G-Guard is a new generation of high-tech satellite security system
• Unmanned Control Center is designed for G-Guard users to have
DIY vehicle location search Tracking and SOS EmergencyDIY vehicle location search, Tracking and SOS Emergency
reporting services
Features:
• Using unmanned control center and Internet, the users can find
their car in 30 seconds
Features:
3
• Car Unit and remote control are designed in separate body to
increase safety
• Car Unit and it's accessories are designed to be installed at well
hidden place to prevent any intentional destruction
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
hidden place to prevent any intentional destruction
• G-Guard has self-testing and automatic recharging functions
GPS Security Guard Functions
M bil Ph S hi d T kiMobile Phone Searching and Tracking
Function
Vehicle Searching: Using any
mobile phone can show vehiclemobile phone can show vehicle
physical location
Continuous Tracking: Using any
mobile phone can show vehicle
continuous tracking
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
continuous tracking
Source: www.gps.electronic.com
GPS Security Guard Functions
(cont’d)(cont d)
Internet Searching and Tracking Function
• Using Notebook or PC through Internet to link with unmanned
control center for vehicle searching and tracking
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: www.gps.electronic.com
GPS Security Guard Functions
(cont’d)(cont d)
Portable Decoder for Continuous Tracking
Function
• Use portable decoder and PDA or Notebook with E-map for
continuous tracking of the vehicle without Internet
Function
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: www.gps.electronic.com
UberTracker
The UberTracker represents a merger of GPS and
Cellular technologies into one package capable of
real-time asset tracking
fi k di ifi dGPS fixes are taken according to a user specified
interval, then reported via email or GPRS to the
user’s designated email address
Features:
• Able to report via email in 3 different formats: Google
Maps links, regular text and NMEA standard (RMC)
• Configurable to send to a web server
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Configurable to send to a web server
• Able to take GPS fixes frequently
Source: http://www.sparkfun.com
Summary
The Global Positioning System (GPS) is a satellite-based navigation
system that provides reliable positioning navigation and timingsystem that provides reliable positioning, navigation, and timing
services
Electronic devices contain hidden diagnostic screens or setup menus
Firmware is a software which controls working of the hardware and
respond to inputs
Wardriving is an activity by which WiFi networks, broadcasting signals
d d
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
are detected
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Contenu connexe

Tendances

Ce hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomCe hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomVi Tính Hoàng Nam
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesKislaychd
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAnicholas njoroge
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Confidentiality& Privacy
Confidentiality& PrivacyConfidentiality& Privacy
Confidentiality& Privacykutelemedicine
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national securityMUTHU LAKSHMI
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg122. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12CRISP Project
 
Zycom 2010 Safety & Security Preso
Zycom 2010 Safety & Security PresoZycom 2010 Safety & Security Preso
Zycom 2010 Safety & Security PresoRobin Evaige
 
Technology for national security.ppt
Technology for national security.pptTechnology for national security.ppt
Technology for national security.pptNithish Balaji P
 
Flir Portafolio de Productos y Soluciones
Flir Portafolio de Productos y Soluciones Flir Portafolio de Productos y Soluciones
Flir Portafolio de Productos y Soluciones Notiseg, S.A. de C.V.
 

Tendances (20)

Ce hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomCe hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atom
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 
File000138
File000138File000138
File000138
 
File000139
File000139File000139
File000139
 
File000143
File000143File000143
File000143
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Fortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USAFortinet Network Security Appliance - Case Study, CARE USA
Fortinet Network Security Appliance - Case Study, CARE USA
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Privacy
PrivacyPrivacy
Privacy
 
Confidentiality& Privacy
Confidentiality& PrivacyConfidentiality& Privacy
Confidentiality& Privacy
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg122. crisp final conf ste fi workshop_reflections iec-tc79 wg12
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12
 
Zycom 2010 Safety & Security Preso
Zycom 2010 Safety & Security PresoZycom 2010 Safety & Security Preso
Zycom 2010 Safety & Security Preso
 
Technology for national security.ppt
Technology for national security.pptTechnology for national security.ppt
Technology for national security.ppt
 
RCS Demo HackingTeam
RCS Demo HackingTeam RCS Demo HackingTeam
RCS Demo HackingTeam
 
Flir Portafolio de Productos y Soluciones
Flir Portafolio de Productos y Soluciones Flir Portafolio de Productos y Soluciones
Flir Portafolio de Productos y Soluciones
 

En vedette

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorismVi Tính Hoàng Nam
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesVi Tính Hoàng Nam
 
Ce hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersCe hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersVi Tính Hoàng Nam
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresVi Tính Hoàng Nam
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetVi Tính Hoàng Nam
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsVi Tính Hoàng Nam
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsVi Tính Hoàng Nam
 
Ce hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversCe hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversVi Tính Hoàng Nam
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageVi Tính Hoàng Nam
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesVi Tính Hoàng Nam
 
Ce hv6 module 65 patch management
Ce hv6 module 65 patch managementCe hv6 module 65 patch management
Ce hv6 module 65 patch managementVi Tính Hoàng Nam
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingVi Tính Hoàng Nam
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesVi Tính Hoàng Nam
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesVi Tính Hoàng Nam
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceVi Tính Hoàng Nam
 

En vedette (20)

Ceh v5 module 21 cryptography
Ceh v5 module 21 cryptographyCeh v5 module 21 cryptography
Ceh v5 module 21 cryptography
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online games
 
Ce hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsersCe hv6 module 53 hacking web browsers
Ce hv6 module 53 hacking web browsers
 
Ce hv6 module 62 case studies
Ce hv6 module 62 case studiesCe hv6 module 62 case studies
Ce hv6 module 62 case studies
 
Ce hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasuresCe hv6 module 61 threats and countermeasures
Ce hv6 module 61 threats and countermeasures
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
 
Ce hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database serversCe hv6 module 42 hacking database servers
Ce hv6 module 42 hacking database servers
 
Ce hv6 module 64 economic espionage
Ce hv6 module 64 economic espionageCe hv6 module 64 economic espionage
Ce hv6 module 64 economic espionage
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniques
 
Ce hv6 module 65 patch management
Ce hv6 module 65 patch managementCe hv6 module 65 patch management
Ce hv6 module 65 patch management
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devices
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 

Similaire à Ce hv6 module 56 hacking global positioning system

GLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking SystemGLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking SystemIRJET Journal
 
SigfoxGettingStarted October2018
SigfoxGettingStarted October2018SigfoxGettingStarted October2018
SigfoxGettingStarted October2018Aurelien Lequertier
 
Necessity of GPS-based 'Proximity Warning System' in mining industry – a tool...
Necessity of GPS-based 'Proximity Warning System' in mining industry – a tool...Necessity of GPS-based 'Proximity Warning System' in mining industry – a tool...
Necessity of GPS-based 'Proximity Warning System' in mining industry – a tool...Roshan Kumar Patel
 
AeroGear Linecard 2015
AeroGear Linecard 2015AeroGear Linecard 2015
AeroGear Linecard 2015Zenie Noon
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system Sumit Kumar
 
Location in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSLocation in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSSalah Amean
 
GPS Assisted Roadmapping and Vehicle Monitoring
GPS Assisted Roadmapping and Vehicle Monitoring GPS Assisted Roadmapping and Vehicle Monitoring
GPS Assisted Roadmapping and Vehicle Monitoring Niranjan Shintre
 
Vehicle Tracking System for School Bus by Arduino
Vehicle Tracking System for School Bus by ArduinoVehicle Tracking System for School Bus by Arduino
Vehicle Tracking System for School Bus by ArduinoIRJET Journal
 
Ca code and its properties
Ca code and its propertiesCa code and its properties
Ca code and its propertiesKSINDHU6
 
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET Journal
 
Automatic solider tracking & health monitoring system
Automatic solider tracking & health monitoring system Automatic solider tracking & health monitoring system
Automatic solider tracking & health monitoring system ijaranjani
 
A Precision Flight Test Application of a Differential Global Positioning Syst...
A Precision Flight Test Application of a Differential Global Positioning Syst...A Precision Flight Test Application of a Differential Global Positioning Syst...
A Precision Flight Test Application of a Differential Global Positioning Syst...Mark Hardesty
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisAurelien Lequertier
 
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...IRJET Journal
 

Similaire à Ce hv6 module 56 hacking global positioning system (20)

GLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking SystemGLONASS and GSM based Vehicle Tracking System
GLONASS and GSM based Vehicle Tracking System
 
Advanced Remote Air-Ground (RAG) System
Advanced Remote Air-Ground (RAG) SystemAdvanced Remote Air-Ground (RAG) System
Advanced Remote Air-Ground (RAG) System
 
SigfoxGettingStarted October2018
SigfoxGettingStarted October2018SigfoxGettingStarted October2018
SigfoxGettingStarted October2018
 
Matlab
MatlabMatlab
Matlab
 
Necessity of GPS-based 'Proximity Warning System' in mining industry – a tool...
Necessity of GPS-based 'Proximity Warning System' in mining industry – a tool...Necessity of GPS-based 'Proximity Warning System' in mining industry – a tool...
Necessity of GPS-based 'Proximity Warning System' in mining industry – a tool...
 
AeroGear Linecard 2015
AeroGear Linecard 2015AeroGear Linecard 2015
AeroGear Linecard 2015
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system
 
Location in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSLocation in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMS
 
Cse satrack ppt
Cse satrack pptCse satrack ppt
Cse satrack ppt
 
GPS Assisted Roadmapping and Vehicle Monitoring
GPS Assisted Roadmapping and Vehicle Monitoring GPS Assisted Roadmapping and Vehicle Monitoring
GPS Assisted Roadmapping and Vehicle Monitoring
 
Vehicle Tracking System for School Bus by Arduino
Vehicle Tracking System for School Bus by ArduinoVehicle Tracking System for School Bus by Arduino
Vehicle Tracking System for School Bus by Arduino
 
Ca code and its properties
Ca code and its propertiesCa code and its properties
Ca code and its properties
 
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...IRJET-  	  Land Mine Data Collection System using Long Range WiFi and P2P Com...
IRJET- Land Mine Data Collection System using Long Range WiFi and P2P Com...
 
Automatic solider tracking & health monitoring system
Automatic solider tracking & health monitoring system Automatic solider tracking & health monitoring system
Automatic solider tracking & health monitoring system
 
SigfoxGettingStarted
SigfoxGettingStartedSigfoxGettingStarted
SigfoxGettingStarted
 
Sigfox Euratech Workshop
Sigfox Euratech WorkshopSigfox Euratech Workshop
Sigfox Euratech Workshop
 
A Precision Flight Test Application of a Differential Global Positioning Syst...
A Precision Flight Test Application of a Differential Global Positioning Syst...A Precision Flight Test Application of a Differential Global Positioning Syst...
A Precision Flight Test Application of a Differential Global Positioning Syst...
 
Open-Source Based Direct Georeferencing Thermal Camera System
Open-Source Based Direct Georeferencing Thermal Camera SystemOpen-Source Based Direct Georeferencing Thermal Camera System
Open-Source Based Direct Georeferencing Thermal Camera System
 
SigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParisSigfoxGettingStarted TechshopParis
SigfoxGettingStarted TechshopParis
 
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
Advanced Anti Accidental Solution by Pre Analyzing, Tracking and Detection of...
 

Plus de Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

Plus de Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 
I phone v1.2_e
I phone v1.2_eI phone v1.2_e
I phone v1.2_e
 

Dernier

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Dernier (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Ce hv6 module 56 hacking global positioning system

  • 1. Ethical Hacking and CountermeasuresCountermeasures Version 6 Mod le LVIModule LVI Hacking Global P iti i S tPositioning System
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.newscientist.com/
  • 3. Module Objective This module will familiarize you with: • Global Positioning System(GPS) • Secret Startup commands • Firmware Hacking • Waypoints • GPS Tools • Security Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow Global Positioning System(GPS) Waypoints Secret Startup commands GPS ToolsSecret Startup commands GPS Tools Firmware Hacking Security Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 5. Global Positioning System (GPS) The Global Positioning System (GPS) is a satellite- based navigation system that provides reliable positioning, navigation, and timing services GPS shows the exact position on earth GPS is a constellation of 24 satellites revolving 11,000 nautical miles above earth surface A GPS receiver can detect signals transmitted by GPS satellite EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited GPS satellite
  • 6. Terminologies Differential GPS (DGPS) • DGPS is a method of improving the accuracy of your receiver by adding a local reference station to expand the information available from the satellites Wide Area Augmentation System (WAAS) • WAAS is intended to enable aircraft to rely on GPS for all phases of flight, including precision approaches to any airport within its coverage area • It transmits signals containing information on reliability and f h l h h b d European Geostationary Navigation Overlay Service (EGNOS) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited accuracy of the positioning signals which are sent by GPS and Global Orbiting Navigation Satellite system(GLONASS)
  • 7. Terminologies (cont’d) Local Area Augmentation System (LAAS) • Corrected data are transmitted from a local source, typically an airport or another location where accurate positioning is needed • These correction data are typically useful for only about a thirty to oca ea ug e a o Sys e ( S) These correction data are typically useful for only about a thirty to fifty kilometer radius around the transmitter Geometric Dilution of Precision (GDOP) • The effects of the combined errors of four variables (latitude, longitude, altitude, and time) on the accuracy of a three- dimensional fix • The ratio of incoming signal strength to the amount of interfering Signal to Noise Ratio (SNR) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited The ratio of incoming signal strength to the amount of interfering noise as measured in decibels on a logarithmic scale
  • 8. GPS Devices Manufacturers Garmin 3S Navigation3S Navigation Alpine Navtech MagellanMagellan Silva EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 9. Gpsd-GPS Service Daemon sd is s i d th t it s GPSs tt h d tgpsd is a service daemon that monitors one or more GPSs attached to a host computer through serial or USB ports It makes all data on the location/course/velocity of the sensors, available to be queried on TCP port 2947 of the host computer With gpsd, multiple GPS client applications (such as navigational and d i i s ft ) sh ss t GPSs ith t t tiwardriving software) can share access to GPSs without contention or loss of data EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 10. Gpsd-GPS Service Daemon: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://gpsd.berlios.de/gpsd2.png
  • 11. Sharing Waypoints A waypoint is a spot on the surface of the Earth as defined byyp p y coordinates that are inputted into the GPS and stored, usually along with an icon, a descriptive name, and some text • Storing in External storage devices • Distribute them on paper There are variety of ways to store waypoints: • Distribute them on paper • Make it available on Internet Websites where waypoints can be stored: • www.waypoint.org • www.swopnet.com/waypoints • www travelbygps com yp EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • www.travelbygps.com • www.pickatrail.com
  • 12. Wardriving Wardriving is an activity by which WiFi networks, broadcasting signals are detected With addition of GPS, pinpoint location of the discovered hotspot can be storedof the discovered hotspot can be stored Information regarding street namesInformation regarding street names, building numbers, network spots, and logs by location are stored automatically EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. Areas of Concern Use of precision weapons in which jamming can degrade the f lt iaccuracy of weapon, results in: • Unnecessarily increased weapons expenditures ll l d• An increase in collateral damage Interruption of GPS can deny warfighters with a common time d i i di l diand position coordinate, leading to: • Delays in finding targets • Increased exposure to threats• Increased exposure to threats • Missed engagements "Warfighter" is a term used by the United States Department of Defense to refer to any member of the US armed forces or a EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Defense to refer to any member of the US armed forces or a member of any armed forces under the US flag
  • 14. Sources of GPS Signal Errors Factors which reduce quality of GPS signal are: Ionosphere and troposphere delays Signal multipathSignal multipath Receiver clock errors Orbital errors Number of satellites visibleNumber of satellites visible Satellite geometry/shading EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Intentional degradation of the satellite signal
  • 15. Sources of GPS Signal Errors (cont’d)(cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. Methods to Mitigate Signal Loss Methods to mitigate GPS signal loss are: 1 • Use precision oscillators as flywheel time/frequency generators, as these oscillators “hold-over” the required specifications for some period of time until the GPS signal is recoveredp g • Jam-resistant antennas and receiver front-end add-ons helps to 2 • Jam resistant antennas and receiver front end add ons helps to minimize the risk of GPS signal loss 3 • Use FAA civil Aviation (Wide Area Augmentation System) infrastructure; it is a differential ground-based system providing improved position accuracy, typically 1.5 m, for CAT III aircraft landing EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g
  • 17. GPS Secrets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. GPS Hidden Secrets Electronic device have diagnostic screen or setup menus These screens used by f t t di f lt dmanufacturers to diagnose fault and possible remedy GPS devices also have the same but due to limited number of buttons, many complex keystrokes are Source: www.the-gadgeteer.com EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited y p y necessary to open hidden menus
  • 19. Secret Startup Commands in GarminGarmin Three keyboard keys are important while checking secret commands if those held down while powering the unitcommands, if those held down while powering the unit The keys are: Page Mark Enter While powering up unit , holding page key down will result in Holding mark key down , will totally reset the unit All data will be lost without any warning message Holding Enter key down will show test mode screen EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited forced cold start unit message screen
  • 20. Hard Reset/ Soft Reset Hard reset • It erases all data from GPS unit and restores it to factory default d h l h f• Hard reset is the last option when soft reset is not working • Soft reset erases all data from GPS memory and Soft Reset So t eset e ases a data o G S e o y a d restarts the system • Soft reset maintains the settings changed by the user but deletes all routes, waypoints, and other EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited , yp , data
  • 21. Firmware Hackingg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Firmware Firmware is software which controls the working of hardware and Fi t l k f ti f g acts on the inputs Firmware controls many key functions of GPS devices: • Data processing • Positional information decoding • Data conversion Reception of satellite data• Reception of satellite data • External communication with devices • Storing and managing route/waypoint data • Interpreting and displaying the information EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Interpreting and displaying the information
  • 23. Firmware: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Figure: Basic Functions of Firmware
  • 24. Hacking GPS Firmware: Bypassing the Garmin eTrex Vista Startup ScreenGarmin eTrex Vista Startup Screen • Download the latest firmware for the Garmin eTrex Vista and 1 Download the latest firmware for the Garmin eTrex Vista and extract it 2 • Open 016901000228.RGN file in a hex editor and perform the below changes 2 3 • Go to the address “00024024” and replace F5 with 6D EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. Hacking GPS Firmware: Bypassing the Garmin eTrex Vista Startup Screen (cont’d)p ( ) • Go to address “00024025” and replace 24 with BA 4 Go to address 00024025 and replace 24 with BA 5 • Go to the address “00024026” and replace 03 with 04 6 • Connect the GPS unit to the PC and switch on the GPS receiver 7 • Run the .exe file which you have extracted, it will starts the firmware update process EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 7
  • 26. Hacking GPS Firmware: Bypassing the Garmin eTrex Legend Startup ScreenGarmin eTrex Legend Startup Screen Use UltraEdit as the hex editor: 1 • Download the latest firmware from the Garmin website 1 • Download the latest version firmware for the Garmin eTrex Vista 2 • Download the latest version firmware for the Garmin eTrex Vista and extract it 3 • Open the file “017901000241.RGN” in a hex editor and perform the next changes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. Hacking GPS Firmware: Bypassing the Garmin eTrex Legend Startup Screen (cont’d)g p ( ) 4 • Go to the address “000229DC” and replace 91 with 49 4 5 • Go to the address “000229DD” and replace DE with 39 5 6 • Go to the address “0011CB07” and replace 91 with 7E 6 • Connect the GPS unit to the PC and switch on the GPS receiver 7 8 • Run the .exe file which you have extracted, it will begin the firmware update process EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 8 update process
  • 28. Hacking GPS Firmware: Bypassing the Garmin eTrex Venture Startup ScreenGarmin eTrex Venture Startup Screen 1 • Download the firmware from Garmin website 2 • Download the 2.34 version firmware for the Garmin eTrex Vista and extract it 2 3 • Open the 015401000234.RGN file in a hex editor and perform the following changes on it EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. Hacking GPS Firmware: Bypassing the Garmin eTrex Venture Startup Screen (cont’d)p ( ) 4 • Go to the address “0001F4DC” and replceE1 with C9 4 5 • Go to the address “0001F4DC” and replace 99 with FE 5 6 • Go to the address “0001F4DE” and replace 02 with 01 6 7 • Go to the address “000D002F” and replace A7 with 5B 7 8 • Connect the GPS unit to the PC and switch on the GPS receiver EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 8
  • 30. GPS ToolsGPS Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Tool: GPS NMEA LOG NMEALOG.ZIP contains 2 programs, one for logging all NMEAp g gg g protocol data, and one specially for GPS data The serial com port can be passed to the program as a command lineThe serial com port can be passed to the program as a command line parameter The program NMEA DATA LOGGING writes one LOG file that contains all the important information line by line EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 32. GPS NMEA LOG: Screenshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Tool: GPS Diagnostic GPSDiag is a free GPS program for 32-bit Microsoft WindowsG S ag s a ee G S p og a o 3 b t c oso t do s platforms to monitor incoming NMEA GPS messages from a serial port It displays the interpreted data in the top half of the window with raw data in the bottom half EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. GPS Diagnostic: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. Tool: RECSIM III It enables a PC to generate National Marine Electronics Association (NMEA) i h i l i l h fsentences via the serial port to simulate the output of a GPS, DECCA, or LORAN navigation receiver Features: • Reset the PC's date/time from within RECSIM for ease of time related testing • NMEA filtering on input monitors • Optional NMEA Logging to text filesOptional NMEA Logging to text files • Support for COM ports 1 - 4 (not just COM1 and COM2) • Handles dates beyond 2000 • NMEA compatible format • Optional 4 digit year format for use in ZDA sentences for time related EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited p 4 g y testing
  • 36. RECSIM III: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. Tool: G7toWin G7ToWin is designed to transfer data between a PC and Garmin, Magellan, or Lowrance/Eagle GPS units G7ToWin supports download of waypoints, track logs, routes, and events Selected waypoints in the waypoints list can be used to create a track EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. G7toWin: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Tool: G7toCE G7ToCE can create IGC track files with and without a 'G' validation drecord Feat res • Added support for record D304 for Garmin units Add d W i t N L th t f i Features: • Added a Waypoint Name Length parameter for use in name comparisons • Added Category edit for Garmin Waypoint Category values • Modified .gpx output to support Garmin Extensions • Supports input datum in Ozi files • Added track color to .gpx routines--needs further debugging EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 40. G7toCE: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. S i T lSecurity Tool EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. Tool: GPS Security Guard Components of GPS Security Guard • G-Guard is a new generation of high-tech satellite security system • Unmanned Control Center is designed for G-Guard users to have DIY vehicle location search Tracking and SOS EmergencyDIY vehicle location search, Tracking and SOS Emergency reporting services Features: • Using unmanned control center and Internet, the users can find their car in 30 seconds Features: 3 • Car Unit and remote control are designed in separate body to increase safety • Car Unit and it's accessories are designed to be installed at well hidden place to prevent any intentional destruction EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited hidden place to prevent any intentional destruction • G-Guard has self-testing and automatic recharging functions
  • 43. GPS Security Guard Functions M bil Ph S hi d T kiMobile Phone Searching and Tracking Function Vehicle Searching: Using any mobile phone can show vehiclemobile phone can show vehicle physical location Continuous Tracking: Using any mobile phone can show vehicle continuous tracking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited continuous tracking Source: www.gps.electronic.com
  • 44. GPS Security Guard Functions (cont’d)(cont d) Internet Searching and Tracking Function • Using Notebook or PC through Internet to link with unmanned control center for vehicle searching and tracking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: www.gps.electronic.com
  • 45. GPS Security Guard Functions (cont’d)(cont d) Portable Decoder for Continuous Tracking Function • Use portable decoder and PDA or Notebook with E-map for continuous tracking of the vehicle without Internet Function EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: www.gps.electronic.com
  • 46. UberTracker The UberTracker represents a merger of GPS and Cellular technologies into one package capable of real-time asset tracking fi k di ifi dGPS fixes are taken according to a user specified interval, then reported via email or GPRS to the user’s designated email address Features: • Able to report via email in 3 different formats: Google Maps links, regular text and NMEA standard (RMC) • Configurable to send to a web server EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Configurable to send to a web server • Able to take GPS fixes frequently Source: http://www.sparkfun.com
  • 47. Summary The Global Positioning System (GPS) is a satellite-based navigation system that provides reliable positioning navigation and timingsystem that provides reliable positioning, navigation, and timing services Electronic devices contain hidden diagnostic screens or setup menus Firmware is a software which controls working of the hardware and respond to inputs Wardriving is an activity by which WiFi networks, broadcasting signals d d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited are detected
  • 48. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 49. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited