Page 1 of 1

A Different Approach

Posted: Sun Nov 25, 2018 7:26 am
by Brierblood
Utilizing War-driving logs and Mac Addresses to Identify Possible Threats or Stalkers

So I'm having a little bit of a problem connecting the last part of what I thought was a good idea to a successful set up that can help show on screen results and warnings if I wanted to track possible "tails" throughout the day by "recognizing/being notified" when duplicate mobile wireless-probes are scanned and logged...

Let me explain this another way...

I currently use a wardriving application to log all access points in my area. I'm the only one doing that in this town so far. While doing so I realized I was also getting the Mac address of the devices I was picking up as well.
A few months prior to this I had explored the idea of using wireless probe requests from nearby cellphones to find out how far certain mac addresses were coming from my house whenever I was not home by using probemon.
But I hit a few snags whenever my mind couldn't wrap-around a way to not only just log these but to connect the ideas completely and keep individual track of the Mac addresses that I had felt were becoming a problem to begin with.

War-driving app gives me live scans of the area.
I want to be able to lock in a mac Address from a mobile wifi probe and if it shows up again at another destination, I can decide at that point to what extent it's relevance is based on the situation.

I want to track someone if they are tracking me...

I'm making it harder than it should be, I'm sure of it.

Any ideas as to what I could try?

I can go in to more depth with my process or train of thought if anyone actually is interested.

I might just have to get with someone that knows how to create something that combines these things all together.

Anyway, thanks in advance for any help,

~Brierblood

Re: A Different Approach

Posted: Mon Nov 26, 2018 12:49 am
by arkasha
not sure if I understand your methodology yet, but I will warn you that MAC addresses in probe requests are often (and intentionally) unreliable:

https://source.android.com/devices/tech ... domization
https://www.theregister.co.uk/2017/03/ ... omization/
https://securityintelligence.com/news/m ... clobbered/

Re: A Different Approach

Posted: Tue May 28, 2019 9:37 pm
by mpeg4ever
Very sorry but I don't get the meaning of what OP is asking. Can you explain it better please ? I suppose nobody (almost) answered because the question was not clear. Explain and we'll try. ciao