How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
How to Get and Set Up a Free Windows VM for Malware Analysis #full with pictures β€οΈππ»
Forwarded from UNDERCODE NEWS
Microsoft has fixed a vulnerability of 0-day Windows file signature that exists since 2018
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Auto Scanning to SSL Vulnerability :
HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc
A. Support Vulnerability
- CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME(SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A. Download(clone) & Unpack A2SV
1) $ git clone https://github.com/hahwul/a2sv.git
2) $ cd a2sv
B. Install Python Package / OpenSSL
3) $ pip install argparse
4) $ pip install netaddr
5) $ apt-get install openssl
C. Run A2SV
6) $ python a2sv.py -h
π¦How to Use?
usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
[-d DISPLAY] [-u] [-v]
β GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Auto Scanning to SSL Vulnerability :
HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc
A. Support Vulnerability
- CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME(SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A. Download(clone) & Unpack A2SV
1) $ git clone https://github.com/hahwul/a2sv.git
2) $ cd a2sv
B. Install Python Package / OpenSSL
3) $ pip install argparse
4) $ pip install netaddr
5) $ apt-get install openssl
C. Run A2SV
6) $ python a2sv.py -h
π¦How to Use?
usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
[-d DISPLAY] [-u] [-v]
β GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - hahwul/a2sv: Auto Scanning to SSL Vulnerability
Auto Scanning to SSL Vulnerability. Contribute to hahwul/a2sv development by creating an account on GitHub.
osif.png
47.5 KB
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FACEBOOK info gathering :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ pkg update upgrade
2) $ pkg install git python2
3) $ git clone https://github.com/ciku370/OSIF
4) $ cd OSIF
5) $ pip2 install -r requirements.txt
6) $ python2 osif.py
7) if you are confused how to use it, please type 'help' to display the help menu
8) [Warn] please turn off your VPN before using this program !!!
9) [Tips] do not overuse this program !!!
β git topic/verified
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FACEBOOK info gathering :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ pkg update upgrade
2) $ pkg install git python2
3) $ git clone https://github.com/ciku370/OSIF
4) $ cd OSIF
5) $ pip2 install -r requirements.txt
6) $ python2 osif.py
7) if you are confused how to use it, please type 'help' to display the help menu
8) [Warn] please turn off your VPN before using this program !!!
9) [Tips] do not overuse this program !!!
β git topic/verified
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE SECURITY
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Hacking tool For Hackers:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/Z4nzu/hackingtool.git
2) chmod -R 755 hackingtool
3) cd hackingtool
4) sudo pip3 install -r requirement.txt
5) bash install.sh
6) sudo hackingtool
β git topic
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Hacking tool For Hackers:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/Z4nzu/hackingtool.git
2) chmod -R 755 hackingtool
3) cd hackingtool
4) sudo pip3 install -r requirement.txt
5) bash install.sh
6) sudo hackingtool
β git topic
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Nine practical methods to break through the IDS intrusion detection system
The first trick: "/./" string insertion method
In view of the special role of "./", we can insert it into the URL to achieve URL transformation. For example, for /msadc/msadcs.dll, we can rewrite it as /././msadc/./. /msadcs.dll, /./msadc/.//./msadcs.dll and other forms to disrupt IDS The identification mark analysis engine realizes the purpose of deceiving IDS. Moreover, the URL after the rewrite is equivalent to the unmodified URL. The author has shown through experiments that this method can bypass IDS such as Snort.
The second trick: "00" ASCII code
Some time ago, the Internet upload vulnerability was used to exploit this feature, and everyone must be familiar with it. Its principle is that the computer automatically truncates the character string at ASCII code 00 when it is processed. We can rewrite /msadc/msadcs .dll to /msadc/msadcs.dll Iloveheikefangxian, use Winhex to change the space between .dll and Ilove to the ASCII code of 00, save it, and then submit it with NC and pipe. In this way, in the view of some IDS, /msadc/msadcs.dll Iloveheikefangxian is not the same as the string with the attack intent specified in its rule set file, so it will be indifferent to the attacker's behavior.Look! How extensive is the application of the principle of "automatically truncating at ASCII code 00 when the computer processes a character string"! Philosophically speaking, there is a connection between things, we should think more and dig out the internal laws, so There will be new discoveries.
The third trick: use the path separator "\"
For Web servers like Microsoft's IIS, "\" can also be used as a path separator like "/". Some IDS did not consider the non-standard path separator "\" when setting up the rule set file. If we rewrite /msadc /msadcs.dll to \msadc\ msadcs.dll, we can escape snort, because there is no identification mark of \msadc\ msadcs.dll in the snort rule set file. It is worth mentioning that the path separator "\" also has a magical effect, which is the "%5c" violent library method mentioned in the "Hacker Line of Defense" some time ago. "%5c" is the hexadecimal representation of "\".
Fourth trick: hexadecimal encoding
For a character, we can use the escape symbol "%" plus its hexadecimal ASCII code to represent it. For example, the first character "/" in /msadc/msadcs.dll can be expressed as %2F, and the following characters can be expressed by their corresponding hexadecimal ASCII code combined with "%". The URL encoded by this method It is no longer what it was before, and there may be no encoded string in the IDS rule set file, so IDS can be bypassed. But this method is invalid for IDS that uses HTTP preprocessing technology.
The fifth trick. Illegal Unicode encoding
UTF-8 encoding allows the character set to contain more than 256 characters, so it also allows more than 8 bits of encoding. The hexadecimal ASCII code of the "/" character is 2F, and the binary number is 00101111. The standard way to represent 2F in UTF-8 format is still 2F, but multi-byte UTF-8 can also be used to represent 2F. The character "/" can be represented by single-byte, double-byte, and three-byte UTF-8 encoding as shown in the following table:
"/" character representation binary hexadecimal
Single byte 0xxxxxxx 00101111 2F
Double byte 110xxxxx 10xxxxxx 11000000 10101111 C0 AF
Three bytes 1110xxxx 10xxxxxx 10xxxxxx 11100000 10000000 10101111 E0 80 AF
According to this method, we can encode the entire string accordingly. Although the resources that the encoded URLs ultimately point to are the same, their expressions are different, and the filter string may not exist in the IDS rule set file, thus achieving the goal of breaking through the IDS.
Sixth trick: redundant coding method
π¦Nine practical methods to break through the IDS intrusion detection system
The first trick: "/./" string insertion method
In view of the special role of "./", we can insert it into the URL to achieve URL transformation. For example, for /msadc/msadcs.dll, we can rewrite it as /././msadc/./. /msadcs.dll, /./msadc/.//./msadcs.dll and other forms to disrupt IDS The identification mark analysis engine realizes the purpose of deceiving IDS. Moreover, the URL after the rewrite is equivalent to the unmodified URL. The author has shown through experiments that this method can bypass IDS such as Snort.
The second trick: "00" ASCII code
Some time ago, the Internet upload vulnerability was used to exploit this feature, and everyone must be familiar with it. Its principle is that the computer automatically truncates the character string at ASCII code 00 when it is processed. We can rewrite /msadc/msadcs .dll to /msadc/msadcs.dll Iloveheikefangxian, use Winhex to change the space between .dll and Ilove to the ASCII code of 00, save it, and then submit it with NC and pipe. In this way, in the view of some IDS, /msadc/msadcs.dll Iloveheikefangxian is not the same as the string with the attack intent specified in its rule set file, so it will be indifferent to the attacker's behavior.Look! How extensive is the application of the principle of "automatically truncating at ASCII code 00 when the computer processes a character string"! Philosophically speaking, there is a connection between things, we should think more and dig out the internal laws, so There will be new discoveries.
The third trick: use the path separator "\"
For Web servers like Microsoft's IIS, "\" can also be used as a path separator like "/". Some IDS did not consider the non-standard path separator "\" when setting up the rule set file. If we rewrite /msadc /msadcs.dll to \msadc\ msadcs.dll, we can escape snort, because there is no identification mark of \msadc\ msadcs.dll in the snort rule set file. It is worth mentioning that the path separator "\" also has a magical effect, which is the "%5c" violent library method mentioned in the "Hacker Line of Defense" some time ago. "%5c" is the hexadecimal representation of "\".
Fourth trick: hexadecimal encoding
For a character, we can use the escape symbol "%" plus its hexadecimal ASCII code to represent it. For example, the first character "/" in /msadc/msadcs.dll can be expressed as %2F, and the following characters can be expressed by their corresponding hexadecimal ASCII code combined with "%". The URL encoded by this method It is no longer what it was before, and there may be no encoded string in the IDS rule set file, so IDS can be bypassed. But this method is invalid for IDS that uses HTTP preprocessing technology.
The fifth trick. Illegal Unicode encoding
UTF-8 encoding allows the character set to contain more than 256 characters, so it also allows more than 8 bits of encoding. The hexadecimal ASCII code of the "/" character is 2F, and the binary number is 00101111. The standard way to represent 2F in UTF-8 format is still 2F, but multi-byte UTF-8 can also be used to represent 2F. The character "/" can be represented by single-byte, double-byte, and three-byte UTF-8 encoding as shown in the following table:
"/" character representation binary hexadecimal
Single byte 0xxxxxxx 00101111 2F
Double byte 110xxxxx 10xxxxxx 11000000 10101111 C0 AF
Three bytes 1110xxxx 10xxxxxx 10xxxxxx 11100000 10000000 10101111 E0 80 AF
According to this method, we can encode the entire string accordingly. Although the resources that the encoded URLs ultimately point to are the same, their expressions are different, and the filter string may not exist in the IDS rule set file, thus achieving the goal of breaking through the IDS.
Sixth trick: redundant coding method
The redundant coding is also called double decoding. I still remember that the Unicode decoding vulnerabilities and the double decoding vulnerabilities of IIS in 2000-2001 were making a lot of noise. At that time, many friends were confused and thought that the Unicode decoding vulnerabilities were double decoding vulnerabilities. In fact, they are two different things. Is described in "Illegal Unicode Encoding". The redundant encoding refers to encoding a character multiple times.For example, the "/" character can be represented by %2f, and the "%", "2", and "f" characters in "%2f" can be represented by its ASCII code hexadecimal. According to the mathematical According to the knowledge of permutation and combination, the encoding form is 2 to the 3rd power, so "%2f" can be rewritten as: "%25%32%66", "%252f" and so on to realize the polymorphism of URL. After encoding, The string may not be collected in the IDS rule set file, which can fool some IDS.
Seventh trick. Add false paths
After adding the string "../" to the URL, the directory after the string has no meaning and becomes invalid. Therefore, the use of the "../" string can achieve the effect of disrupting the identification mark analysis engine and breaking through the IDS!
Eighth trick: insert multiple slashes
We can use multiple "/" instead of a single "/". The replaced URL will still work as before. For example, the request for /msadc/msadcs.dll can be changed to ////msadc////msadcs.dll. After the author has experimented, this method can bypass some IDS.
Ninth trick: Comprehensive polymorphic coding
Smart, you will know it when you read this subtitle.
ENJOY β€οΈππ»
writtenby
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Seventh trick. Add false paths
After adding the string "../" to the URL, the directory after the string has no meaning and becomes invalid. Therefore, the use of the "../" string can achieve the effect of disrupting the identification mark analysis engine and breaking through the IDS!
Eighth trick: insert multiple slashes
We can use multiple "/" instead of a single "/". The replaced URL will still work as before. For example, the request for /msadc/msadcs.dll can be changed to ////msadc////msadcs.dll. After the author has experimented, this method can bypass some IDS.
Ninth trick: Comprehensive polymorphic coding
Smart, you will know it when you read this subtitle.
ENJOY β€οΈππ»
writtenby
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Nine practical methods to break through the IDS intrusion detection system
π¦JavaScript email attachments may carry malicious code/ example coded @UndercodeTesting
https://pastebin.com/49GMLJ3X
https://pastebin.com/49GMLJ3X
Pastebin
JavaScript email attachments may carry malicious code - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦New Features & update for phishing script hiddeneye :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½:
Work's on any linux/termux root
git clone https://github.com/DarkSecDevelopers/HiddenEye.git
3) chmod 777 HiddenEye
4) sudo apt install python3-pip
5) cd HiddenEye
6) sudo pip3 install -r requirements.txt
7) python3 HiddenEye.py
OR
./HiddenEye.py
ENJOY β€οΈππ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦New Features & update for phishing script hiddeneye :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½:
Work's on any linux/termux root
git clone https://github.com/DarkSecDevelopers/HiddenEye.git
3) chmod 777 HiddenEye
4) sudo apt install python3-pip
5) cd HiddenEye
6) sudo pip3 install -r requirements.txt
7) python3 HiddenEye.py
OR
./HiddenEye.py
ENJOY β€οΈππ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦10 ways smartphones can get your location :
1. The GPS
global positioning system was developed by the US Department of Defense and first appeared in mobile phones in the 1990s. It is still The most well-known method for outdoor positioning. GPS sends location and time data directly to the user's mobile phone via satellite. If the mobile phone can obtain the signals of three satellites, it can display the user's position on the flat map, and if it is four satellites, it can also display your altitude.
Other countries have also developed systems similar to GPS, but they do not conflict with GPS. In fact, these systems can make outdoor positioning easier. Russia's GLONASS has been put into use, and China's Compass is also in the trial phase. Galileo in Europe and Quasi-Zenith satellite systems in Japan are also under development. Mobile phone chip manufacturers are developing processors that can use multiple satellites to obtain positioning information faster.
2. Assisted GPS technology
Although GPS works well, it may take a long time, and you will not be able to accurately locate when you are indoors or in buildings that reflect satellite signals. AssistedGPS is a combination of tools to help solve this problem. One of the reasons for the longer GPS waiting time is that when a satellite is found, the mobile phone needs to download the satellite's position information in the next four hours to track the satellite.
After the information reaches the mobile phone, the complete GPS service will be activated. Operators can now send these data via cellular or wireless networks, which is much faster than satellite links. Positioning technology company RXNetworks CEO Guylain Roy-Mac Habee said that this can help shorten the GPS startup time from 45 seconds to 15 seconds or less, which is currently unpredictable.
3. Synthetic GPS The
above-mentioned assisted GPS technology still needs an available data network and time to transmit satellite information. Synthetic GPS uses computing power to predict satellite positioning days or weeks in advance. Through the cached satellite data, Want Want Mobile can identify the satellite position within two seconds.
4. Cell ID
However, the aforementioned GPS acceleration technology still needs to find three satellites to locate. Operators already know how to locate mobile phones without GPS. Operators use a technology called CellID to determine the Cell base station users are using and the distance between them and neighboring base stations. After determining the base station that the mobile phone is using, using the base station identification number and location database, the operator can know the location of the mobile phone. This technology is more suitable for urban areas with wide coverage of base stations.
5.Wi-Fi
Wi-Fi and CellID positioning technology are somewhat similar, but more accurate, because Wi-Fi access points cover a smaller area. There are actually two ways to determine the location through Wi-Fi. The most common method is RSSI (Signal Strength Indication), which uses the signal detected by the userβs mobile phone from a nearby access point and reflects it to the Wi-Fi network database. The signal strength is used to determine the distance, and the RSSI uses the distance of the known access point to determine the user distance.
6. The inertial sensor
if you are in a place where there is no Wi-Fi, inertial sensors can still track your location. Most smartphones currently have three inertial sensors: a compass (or magnetometer) to determine the direction; an accelerometer to report your speed in that direction; and a gyroscope to determine the steering action. These sensors can determine your location without external data, but only for a limited time, such as a few minutes.
The classic example is when driving into a tunnel: if your mobile phone knows where you are before entering the tunnel, it can judge your location based on your speed and direction. These tools are usually combined with other positioning systems.
7. barometer
π¦10 ways smartphones can get your location :
1. The GPS
global positioning system was developed by the US Department of Defense and first appeared in mobile phones in the 1990s. It is still The most well-known method for outdoor positioning. GPS sends location and time data directly to the user's mobile phone via satellite. If the mobile phone can obtain the signals of three satellites, it can display the user's position on the flat map, and if it is four satellites, it can also display your altitude.
Other countries have also developed systems similar to GPS, but they do not conflict with GPS. In fact, these systems can make outdoor positioning easier. Russia's GLONASS has been put into use, and China's Compass is also in the trial phase. Galileo in Europe and Quasi-Zenith satellite systems in Japan are also under development. Mobile phone chip manufacturers are developing processors that can use multiple satellites to obtain positioning information faster.
2. Assisted GPS technology
Although GPS works well, it may take a long time, and you will not be able to accurately locate when you are indoors or in buildings that reflect satellite signals. AssistedGPS is a combination of tools to help solve this problem. One of the reasons for the longer GPS waiting time is that when a satellite is found, the mobile phone needs to download the satellite's position information in the next four hours to track the satellite.
After the information reaches the mobile phone, the complete GPS service will be activated. Operators can now send these data via cellular or wireless networks, which is much faster than satellite links. Positioning technology company RXNetworks CEO Guylain Roy-Mac Habee said that this can help shorten the GPS startup time from 45 seconds to 15 seconds or less, which is currently unpredictable.
3. Synthetic GPS The
above-mentioned assisted GPS technology still needs an available data network and time to transmit satellite information. Synthetic GPS uses computing power to predict satellite positioning days or weeks in advance. Through the cached satellite data, Want Want Mobile can identify the satellite position within two seconds.
4. Cell ID
However, the aforementioned GPS acceleration technology still needs to find three satellites to locate. Operators already know how to locate mobile phones without GPS. Operators use a technology called CellID to determine the Cell base station users are using and the distance between them and neighboring base stations. After determining the base station that the mobile phone is using, using the base station identification number and location database, the operator can know the location of the mobile phone. This technology is more suitable for urban areas with wide coverage of base stations.
5.Wi-Fi
Wi-Fi and CellID positioning technology are somewhat similar, but more accurate, because Wi-Fi access points cover a smaller area. There are actually two ways to determine the location through Wi-Fi. The most common method is RSSI (Signal Strength Indication), which uses the signal detected by the userβs mobile phone from a nearby access point and reflects it to the Wi-Fi network database. The signal strength is used to determine the distance, and the RSSI uses the distance of the known access point to determine the user distance.
6. The inertial sensor
if you are in a place where there is no Wi-Fi, inertial sensors can still track your location. Most smartphones currently have three inertial sensors: a compass (or magnetometer) to determine the direction; an accelerometer to report your speed in that direction; and a gyroscope to determine the steering action. These sensors can determine your location without external data, but only for a limited time, such as a few minutes.
The classic example is when driving into a tunnel: if your mobile phone knows where you are before entering the tunnel, it can judge your location based on your speed and direction. These tools are usually combined with other positioning systems.
7. barometer
on the sidewalk or street outdoor navigation is either straight, either turn left or turn right. But for indoors, GPS is difficult to make correct positioning. One of the methods to determine altitude is the barometer, which uses the principle that the higher the altitude, the thinner the air.
Some smart phones already have a chip that can detect air pressure. However, to use the air pressure function, the phone needs to download local weather data as a reference number for measuring air pressure, and the air conditioning flow in the building will also affect the accuracy of the sensor. The barometer is best used in combination with other tools, such as GPS, Wi-Fi, and short-range systems.
The ultrasonic
sometimes detect whether a person enters a certain area can explain what they are doing. This can be achieved by short-range wireless systems, such as RFID (Radio Frequency Identification). NFC (Near Field Communication) began to appear in mobile phones and can be used for checkpoints, but the main purpose of manufacturers installing NFC is to pay.
Shopkick, a customer loyalty company, has begun to use a short-distance system to determine whether a customer walks into a store. Instead of using radio frequency, Shopkick uses an ultrasonic device inside the store door. If the customer is running the Shopkick application, when they enter the store door, the application will tell Shopkick. After a shopper enters the store, the phone will immediately show that they can earn points, redeem gift cards and other prizes.
9. Bluetooth signal
using a beacon signal sent by the Bluetooth in a particular region (e.g. at a retail store) can achieve very precise positioning. These beacons, which are smaller than mobile phones, are placed every few meters and can communicate with all mobile devices equipped with Bluetooth 4.0 (the latest version).
Broadcom's Abraham said that venue owners can use signals from a dense network of transmitters to determine the location of the space. For example, a store can determine that a customer is close to a specific product on a shelf and offer discounts.
10. ground transmitter
Australian startup Locata is trying to GPS brought to the surface to overcome the limitations of GPS. The company made a positioning transmitter with the same principles as GPS, but installed on buildings and base station towers. Because this kind of transmitter is fixed and provides a stronger signal than satellites, Locata can provide very accurate positioning. The companyβs CEO Nunzio Gambale said that the Locata network is also more reliable than GPS.
ENJOY β€οΈππ»
WRITTEN BY
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Some smart phones already have a chip that can detect air pressure. However, to use the air pressure function, the phone needs to download local weather data as a reference number for measuring air pressure, and the air conditioning flow in the building will also affect the accuracy of the sensor. The barometer is best used in combination with other tools, such as GPS, Wi-Fi, and short-range systems.
The ultrasonic
sometimes detect whether a person enters a certain area can explain what they are doing. This can be achieved by short-range wireless systems, such as RFID (Radio Frequency Identification). NFC (Near Field Communication) began to appear in mobile phones and can be used for checkpoints, but the main purpose of manufacturers installing NFC is to pay.
Shopkick, a customer loyalty company, has begun to use a short-distance system to determine whether a customer walks into a store. Instead of using radio frequency, Shopkick uses an ultrasonic device inside the store door. If the customer is running the Shopkick application, when they enter the store door, the application will tell Shopkick. After a shopper enters the store, the phone will immediately show that they can earn points, redeem gift cards and other prizes.
9. Bluetooth signal
using a beacon signal sent by the Bluetooth in a particular region (e.g. at a retail store) can achieve very precise positioning. These beacons, which are smaller than mobile phones, are placed every few meters and can communicate with all mobile devices equipped with Bluetooth 4.0 (the latest version).
Broadcom's Abraham said that venue owners can use signals from a dense network of transmitters to determine the location of the space. For example, a store can determine that a customer is close to a specific product on a shelf and offer discounts.
10. ground transmitter
Australian startup Locata is trying to GPS brought to the surface to overcome the limitations of GPS. The company made a positioning transmitter with the same principles as GPS, but installed on buildings and base station towers. Because this kind of transmitter is fixed and provides a stronger signal than satellites, Locata can provide very accurate positioning. The companyβs CEO Nunzio Gambale said that the Locata network is also more reliable than GPS.
ENJOY β€οΈππ»
WRITTEN BY
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
UNDERCODE COMMUNITY
on the sidewalk or street outdoor navigation is either straight, either turn left or turn right. But for indoors, GPS is difficult to make correct positioning. One of the methods to determine altitude is the barometer, which uses the principle that the higherβ¦
π¦10 ways smartphones can get your location