Researchers develop Y-Peep drone that can ‘see through walls’

Researchers develop Y-Peep drone that can ‘see through walls’

Researchers develop Y-Peep drone that can ‘see through walls’

Images for article titled Researchers Spin Up Terrifying Hacker Drone That Can 'See Through Walls';  with wifi

screenshot, Lucas Ropek/Ali Abedi and Deepak Vasisht

Researchers at the University of Waterloo in Ontario have effectively built an airplane using a $20 off-the-shelf drone Scanning device that can triangulate the location of every WiFi-connected device in your home. Oh.

Researchers Ali Abedi and Deepak Vashist, who recently presented their findings 28th Annual International Conference on Mobile Computing and Networking, call this contraption “Y-Peep,” which is a deceptively cute name for a project with such horrifying effects. Wi-Peep involves what the researchers call a “location-revealing privacy attack” that can manipulate data in WiFi networks and use it to “see through walls”, or rather, through stealth scanning. Can estimate the location of the equipment from

How does the attack work?

The researchers say their device exploits security loopholes in IEEE 802.11—a long-standing wireless protocol for local access networks that includes a history of problems With data interception and eavesdropping. program is known as one that deploystime of flightTechnique (TOF), which uses data manipulation tricks to measure the physical distance between the signal and the object.

This is all possible because of security “flaws” in most WiFi networks, which researchers have dubbed “submissive WiFi”. In short, all smart devices are primed to automatically respond to “contact attempts” from other devices in their area, even when the network is protected via password protection. To manipulate this vulnerability, Wi-Peep emits a ToF signal that attempts to make contact with local devices and subsequently seeks “secret localization” of specific WiFi-powered devices within a particular building or area. allows. The nature of the device can be assessed through information derived from its MAC address – the unique identifier given to devices within a particular network. Obviously, this means that items like your smart TV, Amazon Echo, cell phone, laptop, or any other “smart” device will be secretly visible to the little spy.

Researchers have imagined some terrifying scenarios involving the secret collection of Y-Peep’s data. Abedi and Vashisht worry that a hacker armed with this device could potentially “Detect the location of home occupants, security cameras and even home intruder sensors.

Taking it a step further, they imagine an intruder:

A thief can use this information to locate valuables such as laptops and to identify ideal occasions when people are either not at home or away from a specific area (for example, everyone in the basement). happens) by tracking your smartphone or smartwatch.

During his presentation, Abedi further hypothesized that the device could be used to “track the movements of security guards inside the bank by following the location of their phones or smartwatches. Similarly, a burglar might enter the home.” Can identify the location and type of smart devices, including security cameras, laptops and smart TVs, to make it a good candidate for break-in. In addition, the operation of the device via a drone means that the user can be traced Without it, it can be used quickly and remotely.”

Abedi and Vashisht say they hope their research will lead to the development of better security for WiFi protocols, so that future iterations are not as likely to be attacked as existing ones. “We hope that our work will inform the design of the next generation of protocols,” write the researchers.

#Researchers #develop #YPeep #drone #walls

مقالات ذات صلة

اترك تعليقاً

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *

زر الذهاب إلى الأعلى
سيتات آورج 2022 سيتات آورج 2022