Jump to content

Search the Community

Showing results for tags 'gps location data collection'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 2 results

  1. I am working on a Alpine Linux based OS, and bettercap is being used to communicate with raspbery Pi devices. Im taking in readings for WiFi signals and their Access Points, as well as GPS Coordinates. I wanted to ask how, if possible, to obtain readings of the gps.show commands to be outputted on to the my own AWS servers, or maybe just a log file that can be accessed and read (from there I could be extracted and outputted to wherever needed). I seen the event sessions go file and the wifi events being created, and noticed there was nothing for GPS, and was wondering if there was a way to input GPS Event sessions, so that gps coordiantes would be displayed there in intervals (via ticker). Any help would be greatly appreciated
  2. I was recording my network during the time of the mass alert text message. What I found is my current gps location, contacts list and phone operating system version and other device information was sent to a server with insecure plain text protocol. This was a proof of concept alert(hello world) test. Direct code injection on a mass scale. Ill post my findings on github.
×
×
  • Create New...