Hide And Seek, Post-Exploitation Style

Presented at ShmooCon IX (2013), Unknown date/time (Unknown duration)

Geo-location allows us to translate the virtual location of an object to its physical location on Earth. For benign reasons, applications permit the use of different geo-location techniques. Some methods are transparent to users while others require explicit permission. Our talk briefly covers how geo-location works, discusses specific API Calls and available geo-location databases, and releases several new geo-location tools.


Presenters:

  • Tim Tomes / lanmaster53 as Tim Tomes
    Tim Tomes is a Senior Security Consultant for Black Hills Information Security with over 15 years' experience in information technology and application development. Tim spent three years as the Army Red Team Senior Team Leader and managed the Army's first Cyber Defense Training Program. Tim has presented at Hack3rCon, Colorado Springs ISSA, and DerbyCon.
  • TJ O'Connor
    Tim Tomes is a Senior Security Consultant for Black Hills Information Security with over 15 years' experience in information technology and application development. Tim spent three years as the Army Red Team Senior Team Leader and managed the Army's first Cyber Defense Training Program. Tim has presented at Hack3rCon, Colorado Springs ISSA, and DerbyCon.

Links:

Similar Presentations: