Combining OSINT and SIGINT to
Enumerate IRL Threat Actors
OVERVIEW
Can your organization’s security posture be strengthened by monitoring WiFi Probe Requests? What about Bluetooth Low Energy Beacons? Can identifying names and device information sent in cleartext help you authenticate who you’re talking to? Location data of wireless networks people have previously connected to combined with current location can be used to validate identity.
Insecure wireless settings can leak information such as names, travel patterns, places of work, language preferences and even types of cars driven. Imagine a potential candidate at a job fair beaconing in the language of a nation-state threat actor, or a potential business partner with probe requests correlating to a competitor’s office, or even being notified of a Flipper Zero close enough to clone your RFID badge.
This talk is about real-time application of intelligence gained from passively monitoring wireless transmissions from common mobile devices. I will demonstrate an unobtrusive method of collecting and displaying this information. Findings from analyzing large data sets will be presented, demonstrating that this method can be applied to enumerate potential threat actors within a given proximity.
Finally, mitigation techniques and the importance of securing your network preferences will be discussed.