{"id":3803,"date":"2014-10-03T22:44:26","date_gmt":"2014-10-03T14:44:26","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3803"},"modified":"2014-10-03T22:44:34","modified_gmt":"2014-10-03T14:44:34","slug":"isniff-gps-passive-wifi-sniffing-tool-location-data","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2014\/10\/isniff-gps-passive-wifi-sniffing-tool-location-data\/","title":{"rendered":"iSniff-GPS – Passive Wifi Sniffing Tool With Location Data"},"content":{"rendered":"

iSniff GPS is a passive wifi sniffing tool which sniffs for SSID probes, ARPs and MDNS (Bonjour) packets broadcast by nearby iPhones, iPads and other wireless devices. The aim is to collect data which can be used to identify each device and determine previous geographical locations, based solely on information each device discloses about previously joined WiFi networks.<\/p>\n

\"iSniff-GPS<\/p>\n

iOS devices transmit ARPs which sometimes contain MAC addresses (BSSIDs) of previously joined WiFi networks, as described in here: Anatomy of a leak: how iPhones spill the ID of networks they access<\/a>. iSniff GPS captures these ARPs and submits MAC addresses to Apple’s WiFi location service (masquerading as an iOS device) to obtain GPS coordinates for a given BSSID. If only SSID probes have been captured for a particular device, iSniff GPS can query network names on wigle.net and visualise possible locations.<\/p>\n

By geo-locating multiple SSIDs and WiFi router MAC addresses, it is possible to determine where a device (and by implication its owner) is likely to have been.<\/p>\n

Components<\/strong><\/p>\n

iSniff GPS contains 2 major components and further python modules:<\/p>\n