Главная
Study mode:
on
1
Intro
2
An Experiment
3
If anyone in the world knew...
4
Our Data on the Internet
5
Selling Our Data
6
It all started with some exercise
7
The issue is in the Numbers
8
Look at the page source
9
Responsible disclosure attempt
10
Strava Response
11
But how could I get the data?
12
Make 800,000+ requests for random activities
13
What could someone do with it?
14
OSINT in a Nutshell
15
Let's meet Sandra K. on Strava
16
Finding Sandra K.
17
What about other fitness sites?
18
Let's meet Janna on fitbit
19
Garmin's site
20
There is a Double Standard
21
Need to belong/be social
22
This is Trisha on fitbit
23
Trisha Recap
24
Putting it all together: Mind Map
25
Recon-ng: Profiler Module Search 190 sites per username x 3 names = 30secs
26
These apps aren't just for fitness!
27
What are these "patrols"?
28
Nature Preserve Patrol
29
Soft Drink Anyone?
30
The unexplainable
31
What is your OSINT profile?
32
Protect yourself.
Description:
Explore the intersection of web application security vulnerabilities and Open Source Intelligence (OSINT) in this BSides Boston 2015 conference talk. Delve into an experiment that reveals the potential risks of sharing personal data on fitness tracking platforms. Examine how seemingly innocuous information can be exploited through techniques like source code analysis and large-scale data requests. Follow along as the speaker demonstrates OSINT techniques to uncover detailed profiles of individuals using popular fitness apps. Investigate the double standards in data privacy and the social motivations behind oversharing. Learn how to use tools like Recon-ng for efficient OSINT gathering across multiple platforms. Discover unexpected uses of fitness apps beyond their intended purposes, including nature preserve patrols and soft drink promotions. Conclude with practical advice on protecting your online presence and understanding your own OSINT profile.

Running Away from Security - Web App Vulnerabilities and OSINT Collide

Add to list