[applause] >> Alright, ooo wow, you guys can hear me really well, can't you? Alright, my
name is, uh, Eric Escobar, I'm a Security Engineer for Barracuda Networks. Uh and today I'm going
to be talking to you guys about Discovering and Triangulating Rogue Cell Towers. Uh, so a bit
about me, oh that's loud. Uh, I started out as a civil engineer and when I say started out, I
went through, got my Bachelors, my Masters and now I have a PE, I'm a licensed Civil Engineer.
Um, my parents love that, but I told them I was going to go into computers, so that that didn't
go over so well. Um, I've always loved computers, uh, I've always nerded out on all things
wireless, even before that I was a licensed hand radio operator. Um and I also love to automate
things. So my chicken coop is automated, opens, closes, feeds them, does the whole thing. Uh
and my sprinklers are run by a cron Job, so that's the level of nerd that we're talking.
[applause] Uh and so three years ago is when I started working at barracuda Networks. Um, I was
previously about exactly three years ago pumping water in the middle of a field, um as a civil
engineer doing some well maintenance and then I got a lucky break from my great boss
and he said, hey, you know what, I think you have a good mind for this, uh, if you want to try
this security space, then, um, you know, we'd love to have you and so I took them up on it and
then we headed over to DefCon and since then I've been in in all things wireless. Um, so the
first year somebody asked me, are you the Fox? And I said, uh, no, no I'm not the Fox, what are
you talking about? And they said, hey, I'm doing the wireless CTF. And I said
wireless CTF, I could totally get involved with that. The next year, we came back thinking,
we're just going to go look for the Fox and we ended up winning the wireless CTF. Um, so that
was really great. And so this year, hopefully, uh, when I'm done with this talk, we will
have won second year in a row. So that will be pretty awesome too. Um, let's see. Alright, so
a bit about what I do at barracuda Networks. I'm a security engineer like I said,
so I do incident response with my team, uh, pen testing, we do red team Fridays where we bring
in pizza and red team our network, which is pretty awesome. Uh, I've even been
lucky enough to do some social engineering campaigns, phishing campaigns, uh and if any of you
are bug crowd researchers when it was just barracuda doing it, you probably talked to me at
some point in time. Um, I also do infrastructure scanning and I've done a little bit of IPAM
work and multi-factor authentication for barracuda. Alright, so today what we're
going to cover is uh what is a rogue cell tower, why you should care about rogue cell towers,
how to detect rogue cell tower, how to find one after you've detected it and how you can
build a detector at home. And then once you've detected one, what the heck do you do with it.
Alright, so first up, what is a rogue cell tower? Well, it's something that's purchased by
companies, governments or other hackers and it has the ability to trick your phone into
thinking that it's a real cell phone tower. So it's kind of like an evil twin attack if
you're familiar with wireless at all. Uh, these are known as IMSI Captures, Interceptors, cell
site simulators, sting rays and there's probably a few other things, but really, they're
pretty much called cell site simulators or IMSI catchers, cause sting rays, they're
popular known by is a corporate term or it's, uh, the name of the actual company that makes
them. Uh and rogue cell towers have the ability to collect information about you.
Indirectly, just through metadata and metadata can tell you a lot of things about you.
Uh, call length, numbers that you've dialed, uh and those kinds of things. In some
conditions, they can even downgrade, uh, your connection, um, and so they can listen to
your messages, your calls and they can even get some data. Alright, so how are they used
today? I'm not going to go over this a whole lot. But pretty much, the ACLU has identified 66
agencies and 24 states that own stingrays. Um, these have been used to monitor demonstration in
the United States. Such as in, uh, Chicago and the political protests. Last year there was,
uh, Freddy Martinez, he talked at the Crypto Village and he did a great talk on Freedom of
Information Act Requests and dealing with IMSI Catchers and how to prove that they're
actually being used. And then and it's also possible to make IMSI Catcher at home. Um, Chris
back in DefCon 18, uh, he made an actual IMSI Catcher and showed it off and that was way
more technical than I probably ever hope to do in any time soon, but it's a really cool
trick--or not trick--it's a really cool hack and, uh, from there basically we're going to
see if we can detect what he did. So if you want to know more about cell site simulator of if
this is the first time that you've heard that, uh go check EFF and the ACLU, they have
these two, um, great links and they're awesome for just getting a lot more information and it
goes far more in depth than I could do in even a full presentation about that. Um and
so abroad they're also used, there's not a whole lot of great data on this, but we know that
there have been, you know, sightings of these in Ireland, the UK, China, Germany, Norway,
South Africa. Um, Chinese spammers are also also caught using this to send spam phishing
messages. And they're used by governments and corporations alike. And I think corporate
espionage is also where they're used. In terms of, there's a lot of other data that they probably
want from their competitors and if somebody doesn't have a way to detect cell site simulator,
you'd be giving up corporate secrets without even knowing it. So let's talk about what the
IMSI in IMSI Catcher. So IMSI stands for International Mobile Subscriber Identity. Uh, it uses
a means of identifying a device on the cell network. It's typically 15 digits long, um and
it contains information about your device. So there's the MTC, which is the Mobile Country
Code, the MNC which is the Network Code and there's the Mobile Subscription Identity
Identification Number or MSIN. Um, so all of the country codes, the MCC, are available on
Wikipedia, so if you want to look one up, maybe you make one of the devices, you know and
say, he, that doesn't look like the United States country code, and if you're in the United
States, you know, what should mine be? Um, and you see something come up, you can take
a look at these, they're all on Wikipedia. Same thing with MNC. All of these are available,
there's a bit list of them. So if you're ever curious, you can just head over there and check
it out. Uh, so basically to summarize all that, an IMSI is a unique identifier to your
device. So that's you, that's like your MAC address of your laptop, that that's what can
identify your device. And so if you swap you know your SIM card into different phones, then
that's something that can still identify that SIM card itself. And so here's what a sample IMSI
would look like. So you can see it has the MCUU, which is 310 for the USA, has MNC for AT&T
and that's 026 and then the unique identifier, which isSO your MSIN. So why should you
care about this? Well, if somebody were to drive up, uh and have an IMSI catcher, you
know maybe you're sitting there and you're having coffee at a coffee shop. Um, you're one big
fish in that or you're one fish in that big net. So what could happen is if they're driving up
and say their say somebody's looking for someone in the area and they think that they're
there. They grab all of the information, because your phone, it just goes for the strongest
signal strength and so if they, if it happens to be that IMSI Catcher, then that's you and it
doesn't matter if it's the government , it doesn't matter if it's a hacker, these things
are easy to build for less than you know a couple grand. Um and to get all that personal
information, it could be well worth it. And also there was a talk of LTE downgrade to GSN
this year and so that's another thing that you, uh, cell tower, um, controls when you know some
of the options that are sent to the mobile device and so if they want to downgrade you. You can
totally do that. I saw a couple of times, when I was upstairs in the wireless village, that, uh,
what had happened is it downgraded from LTE to 2G and you knew something bad was going
on. Um. Uh, so that that's just one way is you're just a small fish in a big net and they catch
anybody that's around you. Alright, so why should you care about this. Well, I think if you
don't know by now, there's a couple reasons why you should. Um, your phone will connect
automatically to cell site simulators. It doesn't matter, you know, it's not like
connecting to an access point with your cell phone. What will happen is, uh, your phone will
just pick the thing that has the strongest signal, doesn't ask you, doesn't say, hey, this one
looks kind of fishy. It just says, this one gives me the best signal, let's go from there. Um
and these conceal your personal information. Hackers can track where you go, who you're talking
to and they can grab all sorts of data about you. Uh, your digital life can be sniffed out
of the air by anyone. And I mean, it's real, the hardware is always coming down in cost. Um
and your company could be leaking trade secrets. I mean, just think about two-factor
authentication. If it's sent over SMS and they can intercept that. Um, ya know, then they can
have that second factor if they've already got your password. Uh, not to mention, a
lot of people think that text messages are um you know, they're, they're extremely
private and if you don't believe so, just ask somebody, hey, can I flip through your text
messages real quick? They won't let you. Alright, so why build a detector, so there's some
Android phones that have apps that you know that you can do this, but I've found that you
need to have a specific model and you need to have it root to work. Um and I wanted something
cheaper, I didn't want to have a phone dedicated only to just watching, uh, cell towers. Um
and I also wanted a device that was really cheap. I mean, I just want something that's somewhere
around 50 dollars so that it's easy to make and it's not like, oh, well you can totally detect
them for a couple grand. Um, and I also wanted to be able to set it and forget it and I wanted to
be alerted to any anomalies. I didn't want it to have to be something where I got suspicious
all of a sudden. I had to go turn it on and figure out how to rig it all up. Um, I wanted to
be and I wanted the ability to network them together. So if I wanted 3, if I wanted 5, if I
wanted 100. I wanted the ability to just plug it into the network and have them all talk to each
other. So how do you actually detect rogue cell tower? Well, every cell tower or a base
transceiver station – BTS – beacons out information about itself. And this is available to
your phone, um, but you know has stuff like the the radio frequency channel number that
it's on. We talked about the MCC, the MNC, the cell ID, the location area code, so that's
specific to where you actually are. Um, the transmit power and some neighboring cells.
Neighboring cells, I haven't had a lot of luck with, but all the rest should still be enough to
to do it. Um, so like I said, these values should remain pretty constant, you know, you
don't want your country code to change, because if you're not in the United States, then all of a
sudden, I mean, you could have a problem. You know that if you're in the United States, you should
have a 310, if it's not, then something, something else is going on. Um, the MNC, you're
network code shouldn't change. The cell tower, the unique identifier shouldn't change. The
area code shouldn't change. And the transmit power, that should also, that should also not
change. On other reflections and things and ways that can change, but overall, at a period of
time, it should just average out. Um, so ok, so how do you, so if if values deviate from
what you've expected, it can mean that there's some maintenance taking place. It's
not necessarily that, hey, all of a sudden transmit power went down or maybe a cell tower went
down. Uh, it could just mean that something has deviated. And it could just mean that changes
are being made to the network. Um, but that's the whole reason why I wanted to be able to go
find it, because if there's a new signal that's coming out, I want to go see, hey, is this a
cell tower that's messing up? Is this, you know, maybe they're adding some extra, you know
carriers to it. There could be something actually happening. So the ability to go out and find
it, is really crucial to knowing if something's actually happening. And really the way
that this works is it's like a ba-, it's like you're you're talking a baseline. And so
you're sitting there and you're watching the neighborhood, you're watching to see you know
what cars go in and out, um, you're just being familiar with what's in your airspace and if
something drastically different hops in your airspace, you know that, hey, maybe I should be
suspicious of this. Maybe I need to go check it out. So these are just some sample values. 310
again, United States. 026 is AT&T. The unique ID for the cell tower and the radio channel that
it's on. If any of those change or you if the tower goes completely away or a new tower
comes up in its place with a really strong signal strength, you know that it's something you
should probably look at. Alright, so how, so so let let's just do a quick example of this.
Um, if a new tower pops up with an unknown cell tower ID and high transmission power, you
know the mobile country code could mismatch, the frequency could mismatch. Um, and you
know, maybe the location area code could change too. These are all things to keep in mind, all
things to look for. They don't all need to change, but a couple of changes here and there are
enough o be suspicious of. And so obviously, why locate a tower? Well, you want to know if
it's a cell tower or if it's a van with a tower inside of it. And now, now let's talk about
actually locating them. So I'm going to combine all this unique cell phone tower, receive power
and location and and, uh, the easiest way that I've found is to combine all of that
information on one detector that can be moved around. If you just have a couple of detectors
spread out, you know say, throughout a neighborhood or something, um, you're not going
to get as great a data, is if you can just move around, because then you can take a
bunch of different points. And we'll talk about that later on. So this is an example heat map
that I made and this is just me driving around and I selected one tower and this is this is me
practicing on an actual tower. This isn't a rogue cell tower, this is just me driving around
and seeing like, hey, let's see if I can find a what an actual tower, kind of as a blind test.
And so when I plotted up the data, here, this is, you know you can see that red spot and
you can see that signal strength is highest. And that comes down to probably about a 20 30 meter
radius and that's enough to tell is there a tower poking up out of the ground that's a couple
hundred feet. Um, it's really easy to tell if there's nothing there or if there is something
there. Or maybe on top of a building there's some antennae that's um that's a good way of
telling. You know, does that look shady or is that, you know, a van parked outside my street
or some, you know hacker kid sitting in the back of a car. Um, so multiple detectors with
known locations allow for trilateration of suspected, you know, towers. Um and the
received power and distance are they're not inversely proportional. You'll some
regression formulas and they're required to calculate in order to fine tune the results. It's
less accurate, but it's still pretty good. And, uh, TDOA, or Time Distance of Arrival, this
is another way that I had thought, hey, maybe I can find a cell tower this way. But really,
I don't have an accurate enough time and if you're not familiar with what TDOA is, it's a way
to, um, you know, you're waiting for a signal to come in and you're measuring the speed or
the length of time that it takes. Uh, a light signal to come from that tower to wherever
you are. And measuring the time it's kind of like GPS, it works with, you know, the speed of
light is constant and so you can use that to kind of do some math. But you need a really
accurate clock and that's not something that I have and so I thought, ok well that's not
going to work. Alright, so now I'm going to talk about trilateration verse
triangulation. So a lot of people get mad at me when I inversely use these, um, and I
get it, but some people don't and when I was doing this presentation before, there's a
lot of questions about it. So I'm going to go over it real quick, um, if this is something
you already understand. Great. You get a refresher. And if you don't, hopefully you know the
difference. Alright, so like any good engineer, I have my north arrow for my free body diagram.
And so let's let's picture there is an explosion or a really loud sound. The way triangulation
works is if you're at home and your friends at the store, maybe your wife's at work, you all
hear the same big explosion, you're all going to look in the same, or you're all going to
look of the explosion. And so if you were to intersect all the lines of where you guys are
looking, you're going to see pretty much a pretty good representation of where the
explosion probably happened if you all call each other and say, hey, ya know, I'm at home, I'm
looking towards the southeast and if I'm at the store, I'm looking west and I'm at work
looking north, you can have a pretty good idea of kind of where it came from. Um and so
triangulation, the angle there from the north arrow, you know, to wherever direction you're
looking, that's the angle you're actually talking about. And a lot of people get that confused
with what trilateration is. Um, so with triangulation you have your known points of where you
are and you can use that to find, you know, the very center of that triangle. So this is
something that I've wanted to do. I've wanted to add this feature. I didn't have enough
time to do it before this, but if somebody wants to help me work on it, I'd love to take up
any helpers. Um, so conceptually this makes sense, but I haven't actually tried it out. And so
what I want to do is basically put like an RF shielded dome on top of my antennae and have it
spin around. And when it spins around, uh at some point, when it hits where it, when it lines
up where the cell tower is, it will have a high signal strength. So right now, if you
see this, uh, like this is a cross-section of it, if the cell tower is right in line with were
the slice is in it, you'll have a high signal strength reading as it spins around. And then you
can tell right here, the signal is being blocked because it's RF shielded and so you'll have a
lower signal. And so if you spin this all around, you'll have multiple detectors, you have
different able and when all those angles intersect, that's typically where it's gonna be.
So this is all just conceptual, I haven't done this one. This isn't how I normally do it, but
it's something I just threw out there. And so technically my detector uses trilateration. And
so this is kind of, this is, a good representation of what I mean by that. So trilateration
is just magnitude of what's being felt. So say you're 100 feet away from a cell tower,
you'll have full bar versus say you're 300 feet, you know, you maybe only have two bars, 1000
feet it drops off to single bar. So you know that your certain distance away based on your
signal, however, you don't know, um, what direction that's coming in. And so, uh, if you're 100
feet away, that cell tower, could be in a circle anywhere that's a 100 feet away from you.
And likewise, you know, if you have a weak signal strength, you know that you could be about
1000 feet away from that tower, um, but it could be anywhere on that big circle. So how do you
fix this? Well you add more detectors. And so say you have two detectors that are there.
And you know, they have the same power strength, then you're gonna have two cell towers, ya
know, possibly two cell towers, where those two circles intersect. And so how do you
determine if it's only or which one of those that it is. You add a third detector and then where
all three of those circles intersect, that's where your cell tower most likely is. Or in
and around that area. But that's a way that you can get rid of just knowing uh the power level
that it's at. Uh and so again, you do a lot of math. There are plenty of python scrips, plenty
of batch scripts, plenty of other ways that you can easily calculate this, when you know
where you are and the magnitudes that you're feeling. Um, so that's one of those things, if
you don't know how to do it, just Google it. There's plenty of information out there. Um, so
how do you actually locate that tower. Well, power, it's not, it's not linear. Um, you'll need
more data, you'll need more monitoring nodes and you'll need to do back the envelope math. So
what I mean to say is that you're not gonna directly find, ya know the, square, ya know one
foot by one foot area where this towers transmitting from, but it's good enough to get you in
the general vicinity of it. And cell towers they also have different sectors, so they're
not just a perfect omnidirectional antenna that radiates in all directions. So
that's why having multiple detectors helps you kind of work out the fuzzy math and help you
actually find out where it is. Um and so that's why I like the multi-point trilateration, so
you get a lot of points, you collect a lot of data. And it gives you a lot more accurate
results. And so obviously, I don't I don't have a rogue cell tower that I can just test it
with and I'm not going to make one and have the FCC get mad at me, so I uh, tested this on just
real towers and say, hey, maybe this is a cell tower or you know that's a rogue one. Let's
pretend like it's rogue and now when I go check it out. So that's that's kind of just drove
around town and saw what was out there. Um, so yeah, back to this slide again. You can tell,
there's probably a tower in this area and sure enough if I were to show you the Google Maps of
where this is, there's absolutely a tower there. Alright, so let's talk about the
actual build itself. I used a raspberry pi 3 power adapter and an SD card running the stock
raspi and all this stuff is really, um, you know, there's plenty of guides on how to set
this up. Then I bought a SIM900 GSM module, it's all available on Amazon. You can go there,
it's like 17 dollars. I'll post links to all this and stuff you'll see later on, um, there's
a serial GPS module, again 16 dollars off Amazon. Pretty cheap. And then a software
defined radio and now there's more cautionary tales about this, but I'll tell you about
that going on. and then it's also made of scrap wood and hot glue. I was gonna 3D print some
really nice case for this and then I figured, uh, we're at a hacker conference and this is
hacked together, so I'm not going to make it any better, 'cause it definitely works. So
brace yourself. This is quite literally a hack. If it shows up. There we go. [applause]
Alright so let's break this down now actually and see what's there. Uh, ok, so on top you
have the GPS module, 'cause that extra 7 inches, you know, really gives it the height that it
needs to get a clear view of the sky. Um, the SIM900 cell module also goes up on top, 'cause hey
you want the best reception possible. Um, mind you this is in my passenger seat, so, uh
then there is, on both sides of this, to connect the the Bluetooth and the GPS module
together. There's a serial to USB adapter there. And so that basically just gives you serial
data and that's why I liked using the Raspberry Pi, 'cause it gives you four USBs, so it's
pretty easy, um, to connect it all up and and set it going so you don't have to burn your CPU
on added GPIO pins. Um, so again, scrap wood and hot glue. That's pretty much what I always
use. And then uh there's a software defined radio, it's a USB TV tuner, it's called an
RTLSTR, uh, we'll talk more about that. So how much does it actually cost. Well, if you want
to do this with Raspberry Pi 0 and really keep costs down, Raspberry Pi 0 is about 10
dollars and when you include shipping with it, uh, 5 dollar wireless adapter off Amazon, you
know, 5 dollar USB hub, 5 dollar SD card. You can shop around and find all of this a lot cheaper
or you know you might just have it sitting somewhere in your bedroom. Um and then the the
real piece that you probably don't have lying around is the 27 dollar uh SIM900 module and
you can just buy this off Amazon. You know, it's FCC regulated has all its FCC IDs,
um, and then there's also the 16 dollar serial GPS module and if you want to get a little bit
nicer one, I got the adafruit model. It's about 40 dollars, but it gets the job done a lot
nicer, it's a lot quicker to fix positions. So in total it's oooo, in total it's 52 dollars.
Um and again you can make it cheaper than that depending on where you source some of your
materials from. So let's talk about the SIM900 module. Um so it it will give you uh a whole
list of commands and this is the typical modem AT commands that I didn't know anything about um
and so I had to dig into. And there there guide that they have online has a ton of different
commands. You can just read through it and one of the ones that I found is this engineering
mode. So when you toss the SIM900, when you give it the AT commands, which I'll go through
in a little bit, um, it'll show you, hey, ok, it's good to go. And it'll give you 7 towers with
the highest information. Um and there's a ton of information and it's all via serial connections.
So if if you know how to use serial, it's all exactly the same. And what's even better is
there's no SIM card required just to put in engineering mode and I just also want to stress
this, that does not sniff any traffic. This is FCC regulated, this is not doing anything bad.
This is everything that your phone can see, that you can see on your phone. Um and I'll go
over how you can actually see this on your phone, to some degree, not nearly as good as
this, but um, let's move on. So there's something called field test mode, which most phones
have. Uh if you have an iPhone, if you just pretend to dial a number and you put in star 3001,
you know pound 12345, pound star, uh that will bring in field test mode and I'm not
trolling you, that actually will do it. Um and this is a good way to see a lot of information
about, uh, what's around you. Now it's a little bit hard to navigate and if you want you can
Google and there are plenty of guides that show you how to use this field test mode. Um, with
Android the, it can, vary from phone to phone. So just Google it, you can find it. And there's
also plenty of other apps since Android is much more open that you can see. Um, so here's
here's a quick example of what the SIM900 readout is. So AT did it's check if it's ok, um and
then that setting in engineering mode and then, uh, after that you check, hey engineering mode,
you know, what do you have for me? And then it will relay a bunch of data and at first I
looked at this and I was like, I have absolutely no idea what this means. So let's dig into
it. Um and so basically you have your channel number, your receive level, you have your,
uh, you have your base station identifier code, your cell ID, your MCC and your MNC and your
LAC. These are all things that we talked about. Um and so for, so this is the GPS serial that I
got. This is a little bit nicer than the one you can get online, but uh the cheaper one will
definitely do. This is the adafruit model and it fixes, the reason that I picked it is
because it fixes the position very quickly and have great indoor reception and it works
exactly like you would expect it to work. Um, it just, you plug it in and it just starts dumping
data. And when I say dumping data, this is exactly what I saw when I first plugged it in and
this scrolls so fast that to take the screenshot it was hard not to get it to blur. Umm, so
you can get idea, you know, I looked at this, I like, I don't even know what this means.
Luckily, you know, there's plenty of information online on how to handle this data. And so
you break it down, you really only care about this type of a line. Uh and this line you know
we translate it out and dump it and the SQL database that I have it setup to go into, you get
your latitude, your longitude, the number of satellites that you have, the GPS quality, the
altitude and the units of that altitude. Uh the GPS quality too goes zero one two. Zero is if
you don't have a fix and it doesn't know here you are. One if it's not that accurate, but
it will still do and two if it's locked on and you have a good positioning. Um, so next up is
Raspberry Pi 3, pretty straight forward. Um runs stock Raspbian is the operating system. And it
has enough power to run the software to find radio. So I use this uh Raspberry Pi to do other
software defined radio stuff and it's setup to use it. Um and so I just, you know, I just
repurpose that, I didn't want to have to get something else. and it also has 4 USB ports, which
is really nice. 'Cause you can plug in as many serial adapters as you want with a hub and it
works, it works a lot better than trying to use any GPIO pins as a serial adapter. And it's
also really easily powered by USB battery pack. You can get one of these battery packs
online for say 5-10 dollars. Um and you can run it all day off of this 'cause it's so low
power. So now next I wanna talk to you guys about the the I guess semi-controversial part of
this. So there's the TV tuner. It's, so this is designed so you get a USB and you can, uh,
basically you plug this in and you can you know, watch, uh, TV on your phone, any of the
broadcast, or not TV on your phone, TV on your laptop. And of the broadcast channels that are
out there. Um it has a wide range of frequencies and is typically used by a lot of
hackers to do really cheap software defined radio. 'Cause it's 20 dollars. Um, however
depending on where you are, this could be definitely against the law to listen to the GSM
traffic. So I don't want to encourage this at all if this is not legal where you are. Um, but
there are plenty of GitHub repositories out there that will let you listen into unencrypted
traffic and not to break it. We're not breaking any GSM traffic. Um and it's not
necessary at all to locating the towers, it just gives you some deeper insights if that's
something that you're interested in. Uh, and trying out and if you do, just let me know how it
works, 'cause I'd be really interested in hearing it. Um, so basically everything dumps to a
SQL like database. It's it's pretty simple when you when you look at this because I just
basically went through and the Python script and it just goes through goes, you know, every
couple seconds and it will snag all the data that's out there. And it dumps it and it lets you
do a lot of queries on it, so you know you can, you have your time of where you are, your
time, where you are, you have your latitude, longitude, you know, all the information that
we just talked about all in one nice and neat place. And uh you know, after you take a drive,
you don't wanna have to go through and look through, you know, hundreds of thousands of
lines of cell of cell data, I mean, it's gonna suck and there's no way to really divine
anything meaningful out of that. Um, so that's why, uh, you wanna make it pretty. You wanna make
it really easy to look at. You wanna make it so that you can show a picture to your wife,
mom, cat and then you know say, hey, this is what I did and they're like, oh, that's not
just numbers on a screen. Um and so, when I was in civil engineering, I used a ton of GIS
software, but it's real expensive. And so that's when I came across QGIS. It's
completely free. Open source. Um and basically what this does is kind of like Google maps, you
can place points and you can do math between those points. Um and it's it's a really extensive
program, so I could do a full talk on just how to use QGIS and all the stuff to learn. But some
of the things you're gonna want QGIS, you're gonna want IDW or Inverse Distance Weighting.
You'll want the openlayers plugin. This will give you maps and GIS data. And you also want,
or it also gives you Python Command Line automation. And it's it's super easy, once you
visualize it and it and it let's you just you know actually get your hands on the data and make
sense of it. Now, what I really really like about this is that, uh, once you've done everything
the right way. Once you're comfortable with how to do this in the GUI, it has a full
command line set, so you can know exactly what you're doing and then script it all up, so
you can just run a cron job and have it, you know, pump out nice looking images all the time. Um
and with that with the Python script, then you can have it say, hey, you know, this doesn't
look right. I wanna send an alert out. I'll talk more about alerts here in a little bit. But
basically this is just a sample of like, hey, how am I going to import data and get the x y and
power information and stuff like that into it. And so this is just a sample of just of me just
making some random points kind of, uh, in the program itself. And you can see that you can
overlay maps to it, you can have street data, you can even have satellite data. Um, this is a
great program if you're just looking for anything GIS related. And you just want to
get started in GIS 'cause it's a very similar to ArcGIS. So if you're looking to get into maybe
some professional tools, check this out first. Good for a lot of other things, not just
finding rogue cell towers. Alright, so the next part of this is, ok, so you detected
that there's a disturbance in the force. You see that, ok, my my maps are showing that there
might be a new tower somewhere. You know, I'm getting these notifications, so you know what
the heck do you do. How do you actually get this information to you. You know, so you're at the
grocery store and you know that there's something outside or maybe there's you know a new
cell tower popping up. How do you know, how do you get that information to yourself? There's
a couple of ways, um, you can, if depending on what your favorite scripting language is,
you can go in there and have it just send you a straight e-mail. A lot of people check their
e-mail, you know, very frequently, so you maybe you want to have it setup with
Twilio and have it send you a text message. Uh, Twilio is about 20 dollars a year if you
just want to send a couple text messages. It's really great, they have a great documentation.
I recommend using them and if you're a little bit more technical and you just want to
send push notifications to your phone. I use an app called, uh, Pushover. And it allows you to
send, just like it says, push notification that's really great, gives you ton of
different settings. So now, here's the problem that I have. Uh, when you're detector goes
off, what the heck do you do? Um, well, you turn off your phone. I mean if you're not
really sure and you're actually nervous about your privacy being infringed upon, turn off your
phone. Um, that's that's really the only thing you can do. Uh and then you can start looking
at the data. You can take what I, you know, the maps that I've showed you how to make and you
can look at it and say, uh, where is this? Let's go take a look at it. And then maybe you
go on a road trip. Well with this, you can just go out there and you can, um, you know, you
can go see, hey is there anything out there. Um, am I nervous, you know, that
something's you know, gonna be where it's not, it shouldn't be. Or you could just say, hey,
looks like they're doing some maintenance on a tower somewhere. Um, so this allows
you the opportunity to go drive around and see what's actually out there. And with that, I
think that's it. Um, if you guys want, just send me an email to this email address and I'll
answer any questions. [applause] And I'll be posting the slides by Friday, to this website,
Raging Security dot Ninjas, so feel free to go check it out and, yeah, I really encourage
you guys to shoot me an e-mail. [applause]
Không có nhận xét nào:
Đăng nhận xét