
mapped encrypted and unencrypted WiFi networks in the covered area in Oslo. generated repeated data points of specific devices that allowed the author to pinpoint movement patterns and habits of several device owners through Oslo, some with their full name on their devices. This report is the culmination of 5 000 000 logged data points from MAC addresses and WiFi Access Points, which in turn This report will show that it is possible to do not only tracking of a single individual but masstracking/surveillance of a large city as well, i.e Oslo. The author wants to show that these technologies are vulnerable to tracking/surveillance without the individual’s notice and online connection. With the ever-increasing use of WIFI and Bluetooth devices in the daily life of the average citizen, many will own at least one device, if not several, which can be used as tracking devices. location tracking from 3rd parties without the user’s knowledge. This report goes through the vulnerabilities of WIFI and Bluetooth in terms of privacy i.e. Highlight the differences at the end of each step, and discuss what do you find.SP1-Location-Tracking-of-WIFI-Access-Points-and-Bluetooth-Devices-redacted DownloadīSides Oslo 2022 Presentation of Location Tracking of Bluetooth Devices: Reboot your system, then repeat Steps 1 - 7 in Task A.
Task B - A Different Network Setting Change the VM network connection from NAT to the bridge mode (you will lose your Internet connection if you are connected to the ODU campus Wi-Fi network, but it is okay). Edit the same file you display in the previous step, set the system's hostname to your MIDAS ID permanently. Use the cat command to display the contents of the file that contains the DNS servers for this system. Use the cat command to display the contents of the file that contains the system's hostname. Use the host command to perform a DNS query on 6. (Use the correct option to send 10 ping requests only.) 5.
Use the ping command to determine if the system is accessible via the network. Use the netstat command to list current TCP connections. Use the correct route command to display the current routing table. Highlight your IP address, MAC address, and the network mask. Use the correct ifconfig command to display the current network configuration. Task A - Explore Network Configurations 1. You can use either Ubuntu VM or Kali Linux VM to complete the following tasks.