Transcript
Page 1: Exploiting vulnerabilities in location based commerce

Location Based Services → Exploiting Vulnerabilities

   

   

Page 2: Exploiting vulnerabilities in location based commerce

+

Netherlands | USA | India | France | UK

SOFTWARE DEVELOPMENT DONE RIGHT

www.xebia.in; Blog :http://.xebee.xebia.in

Page 3: Exploiting vulnerabilities in location based commerce

What are Location Based Services ? → A service that depends on the network knowing your location

 LBS allow consumers to receive services and advertising based on their geographic location.

Page 4: Exploiting vulnerabilities in location based commerce

Location Based Services  Location Based Services Can be basically divided into 4 Broad

Categories1. Location Based Search Information

2. Location Based Commerce

3. Navigation Services

4. Tracking Applications

Page 5: Exploiting vulnerabilities in location based commerce

Location Based Information

Page 6: Exploiting vulnerabilities in location based commerce

Location Based Commerce

Page 7: Exploiting vulnerabilities in location based commerce

Location Based Navigation    

       

Page 8: Exploiting vulnerabilities in location based commerce

Location Based Tracking    

       

Page 9: Exploiting vulnerabilities in location based commerce

Loca&on  and  Constella&ons    

Page 10: Exploiting vulnerabilities in location based commerce

Loca&on  and  Constella&ons    

Page 11: Exploiting vulnerabilities in location based commerce

A  New  Man  Made  Constella&on  

Page 12: Exploiting vulnerabilities in location based commerce

Loca&on  Acquisi&on  Methods  

1.GPS

2.Assisted GPS

3.Cell Towers

4.Cell-ID

5. WiFi Hotspots

6. IP Address

Page 13: Exploiting vulnerabilities in location based commerce

Loca&on  Accuracy  and  Usage                        Precise  Loca+on  Acquisi+on  

GPS (Global Positioning System) •  24 satellites in orbit. Typically 5 to 8 are

visible from any one place •  Distance calculated by time it takes for signal

to travel from satellite to receiver. Calculating the time it takes from 4 satellites provides an accurate fix.

Page 14: Exploiting vulnerabilities in location based commerce

Loca&on  Accuracy  and  Usage                        Precise  Loca+on  Acquisi+on  

Assisted -GPS •  GPS has a slow time to

fix unless it is permanently tracking satellites

•  Assisted GPS is based

upon providing GPS satellite information to the handset, via the cellular network

•  Assisted GPS gives

improvements in Time to First Fix

Page 15: Exploiting vulnerabilities in location based commerce

NO  Loca+on  Verifica+on  

•  99 % of Applications Providing Location Based Services lack Location Verification Mechanism.

         This  Leaves  all  these  Applica+ons            Vulnerable  to  Loca+on  Spoofing  A=acks  

Page 16: Exploiting vulnerabilities in location based commerce

Loca+on  Spoofing  

   

                     Injec+ng  Fake  Loca+ons  

Page 17: Exploiting vulnerabilities in location based commerce

Loca+on  Spoofers  

Page 18: Exploiting vulnerabilities in location based commerce

Results  of  Loca+on  Spoofing  

   

•  Commercial  applica+ons  can  be  fooled  by  Checking  in  with  spoofed  Loca+ons.  

 •  Rewards,  Offers,  

Deals  on  Specific  Loca+ons  Can  be  Availed  ☺  

Page 19: Exploiting vulnerabilities in location based commerce

Results  of  Loca+on  Spoofing  

    •  Tracking  Applica+ons  

can  be  fooled  by  fixing  a  fake  loca+on  or  Randomly  changing    Loca+on.  

 •  Incase  of  Con+nuous    

Fleet  tracking,  Pre-­‐Designed  Routes  can  be  Simulated  to  spoof  con+nuous  Loca+on  

Page 20: Exploiting vulnerabilities in location based commerce

Solu+ons  to  Loca+on  Spoofing  

   

 Client  side  valida+ons    •  Hourly  loca+on  •  Cell  towers  triangula+on    

Server  side  Valida+ons  •  Date  of  Registra+on  •  RapidFire  Check-­‐ins  •  Previous  Check-­‐ins,  History    •  Distance  Algorithims  •  Traffic  updates.  •  Speed  and  stops  •  Loca+ons  in  other  Applica+ons    

Page 21: Exploiting vulnerabilities in location based commerce

Spoofing  GPS  Constella+on  

Page 22: Exploiting vulnerabilities in location based commerce

Spoofing  GPS  Constella+on  

GPS Signal Simulators / Signal Spoofer

Page 23: Exploiting vulnerabilities in location based commerce

Spoofing  GPS  Constella+on  

Possible Solutions ????????????

Page 24: Exploiting vulnerabilities in location based commerce

Spoofing  GPS  Constella+on  

Thank You Thank You !

Happy Spoofing :)

Page 25: Exploiting vulnerabilities in location based commerce

Knowledge Sharing: Speakers in national and international conferences

Functional automation Tools: Selenium/Webdriver, AUTO IT, SoapUI, QTP

Language Proficiencies: Java, Ruby, Groovy, Python

ATDD Tools: Cucumber, Fitnesse, JBehave, Geb

Performance Testing Tools: JMeter, LoadUI

Mobile Testing: Appium, Calabash

Agile Testing

Automation Frameworks in place -  Selenium/Webdriver keyword driven -  SoapUI

Current Competencies

Page 26: Exploiting vulnerabilities in location based commerce

Contact us @

Xebia India [email protected]

Websites www.xebia.in www.xebia.com www.xebia.fr

Thought Leadership Htto://xebee.xebia.in http://blog.xebia.com http://podcast.xebia.com


Top Related