26
Location Based Services Exploiting Vulnerabilities

Exploiting vulnerabilities in location based commerce

Embed Size (px)

DESCRIPTION

This ppt discusses in detail about how to Exploit Vulnerabilities in #MobileApplications which are using user Location to filter data or to provide location specific content and Commercial Offers. The session showcased live examples by exploiting vulnerabilities in some famous applications used by mobile users worldwide. The last part of session includes prospective solutions to secure application from these vulnerabilities.

Citation preview

Page 1: Exploiting vulnerabilities in location based commerce

Location Based Services → Exploiting Vulnerabilities

   

   

Page 2: Exploiting vulnerabilities in location based commerce

+

Netherlands | USA | India | France | UK

SOFTWARE DEVELOPMENT DONE RIGHT

www.xebia.in; Blog :http://.xebee.xebia.in

Page 3: Exploiting vulnerabilities in location based commerce

What are Location Based Services ? → A service that depends on the network knowing your location

 LBS allow consumers to receive services and advertising based on their geographic location.

Page 4: Exploiting vulnerabilities in location based commerce

Location Based Services  Location Based Services Can be basically divided into 4 Broad

Categories1. Location Based Search Information

2. Location Based Commerce

3. Navigation Services

4. Tracking Applications

Page 5: Exploiting vulnerabilities in location based commerce

Location Based Information

Page 6: Exploiting vulnerabilities in location based commerce

Location Based Commerce

Page 7: Exploiting vulnerabilities in location based commerce

Location Based Navigation    

       

Page 8: Exploiting vulnerabilities in location based commerce

Location Based Tracking    

       

Page 9: Exploiting vulnerabilities in location based commerce

Loca&on  and  Constella&ons    

Page 10: Exploiting vulnerabilities in location based commerce

Loca&on  and  Constella&ons    

Page 11: Exploiting vulnerabilities in location based commerce

A  New  Man  Made  Constella&on  

Page 12: Exploiting vulnerabilities in location based commerce

Loca&on  Acquisi&on  Methods  

1.GPS

2.Assisted GPS

3.Cell Towers

4.Cell-ID

5. WiFi Hotspots

6. IP Address

Page 13: Exploiting vulnerabilities in location based commerce

Loca&on  Accuracy  and  Usage                        Precise  Loca+on  Acquisi+on  

GPS (Global Positioning System) •  24 satellites in orbit. Typically 5 to 8 are

visible from any one place •  Distance calculated by time it takes for signal

to travel from satellite to receiver. Calculating the time it takes from 4 satellites provides an accurate fix.

Page 14: Exploiting vulnerabilities in location based commerce

Loca&on  Accuracy  and  Usage                        Precise  Loca+on  Acquisi+on  

Assisted -GPS •  GPS has a slow time to

fix unless it is permanently tracking satellites

•  Assisted GPS is based

upon providing GPS satellite information to the handset, via the cellular network

•  Assisted GPS gives

improvements in Time to First Fix

Page 15: Exploiting vulnerabilities in location based commerce

NO  Loca+on  Verifica+on  

•  99 % of Applications Providing Location Based Services lack Location Verification Mechanism.

         This  Leaves  all  these  Applica+ons            Vulnerable  to  Loca+on  Spoofing  A=acks  

Page 16: Exploiting vulnerabilities in location based commerce

Loca+on  Spoofing  

   

                     Injec+ng  Fake  Loca+ons  

Page 17: Exploiting vulnerabilities in location based commerce

Loca+on  Spoofers  

Page 18: Exploiting vulnerabilities in location based commerce

Results  of  Loca+on  Spoofing  

   

•  Commercial  applica+ons  can  be  fooled  by  Checking  in  with  spoofed  Loca+ons.  

 •  Rewards,  Offers,  

Deals  on  Specific  Loca+ons  Can  be  Availed  ☺  

Page 19: Exploiting vulnerabilities in location based commerce

Results  of  Loca+on  Spoofing  

    •  Tracking  Applica+ons  

can  be  fooled  by  fixing  a  fake  loca+on  or  Randomly  changing    Loca+on.  

 •  Incase  of  Con+nuous    

Fleet  tracking,  Pre-­‐Designed  Routes  can  be  Simulated  to  spoof  con+nuous  Loca+on  

Page 20: Exploiting vulnerabilities in location based commerce

Solu+ons  to  Loca+on  Spoofing  

   

 Client  side  valida+ons    •  Hourly  loca+on  •  Cell  towers  triangula+on    

Server  side  Valida+ons  •  Date  of  Registra+on  •  RapidFire  Check-­‐ins  •  Previous  Check-­‐ins,  History    •  Distance  Algorithims  •  Traffic  updates.  •  Speed  and  stops  •  Loca+ons  in  other  Applica+ons    

Page 21: Exploiting vulnerabilities in location based commerce

Spoofing  GPS  Constella+on  

Page 22: Exploiting vulnerabilities in location based commerce

Spoofing  GPS  Constella+on  

GPS Signal Simulators / Signal Spoofer

Page 23: Exploiting vulnerabilities in location based commerce

Spoofing  GPS  Constella+on  

Possible Solutions ????????????

Page 24: Exploiting vulnerabilities in location based commerce

Spoofing  GPS  Constella+on  

Thank You Thank You !

Happy Spoofing :)

Page 25: Exploiting vulnerabilities in location based commerce

Knowledge Sharing: Speakers in national and international conferences

Functional automation Tools: Selenium/Webdriver, AUTO IT, SoapUI, QTP

Language Proficiencies: Java, Ruby, Groovy, Python

ATDD Tools: Cucumber, Fitnesse, JBehave, Geb

Performance Testing Tools: JMeter, LoadUI

Mobile Testing: Appium, Calabash

Agile Testing

Automation Frameworks in place -  Selenium/Webdriver keyword driven -  SoapUI

Current Competencies

Page 26: Exploiting vulnerabilities in location based commerce

Contact us @

Xebia India [email protected]

Websites www.xebia.in www.xebia.com www.xebia.fr

Thought Leadership Htto://xebee.xebia.in http://blog.xebia.com http://podcast.xebia.com