Wi-Fi Penetration Tester In Your Pocket 121
00*789*00 writes "ZDNet has a story about the public launch of Immunity's Silica, a portable hacking device that can search for and join 802.11 (Wi-Fi) access points, scan other connections for open ports, and automatically launch code execution exploits from a built-in exploit platform."
Ummm, yeah. (Score:4, Funny)
ob. mae west reference (Score:5, Funny)
Re:ob. mae west reference (Score:4, Funny)
Re: (Score:2)
And then they built the super collider.
Re:ob. mae west reference (Score:4, Funny)
But, to answer your question. Am I happy to see you? I don't know, are those a pair of boobs on your chest?
Re: (Score:2)
Re: (Score:2, Funny)
Re: (Score:1)
Re: (Score:1)
No, wait
Re: (Score:2)
Wow.
Re: (Score:3, Insightful)
Just secure it for him yourself. When he suddenly can't access it because you've enabled WPA, he'll understand the importance of security.
(And if he gets upset with you, tell him "just be glad I didn't download a bunch of kiddy pr0n and try to hack the NSA with it!")
Re: (Score:2)
I intend to do that just as soon as I finish downloading a bunch of kiddie pr0n and hacking the NSA.
[note to Carnivore technician: the above was a joke. I'm not really downloading kiddie pr0n.]
Re: (Score:2)
Maybe he just likes sharing his connection because he's paying for it 100% of the time but using it a very small percent of the time, and the chance that someone might be able to get some use out of it is something he likes?
You ever travel and not want to pay an insane amount for hotel internet? Or your internet connection dies/doesn't get payed for but you badly need to finish a download/check your email/etc? Wouldn't y
Re: (Score:3, Funny)
The neighbor was confused when told that his router now had a WEP key in place.
Re: (Score:2)
Honeypot Reverse Attack (Score:5, Funny)
Re: (Score:2, Informative)
Re:Honeypot Reverse Attack (Score:5, Funny)
Re: (Score:2)
Re: (Score:1, Funny)
Joking aside, a user account's
Re: (Score:1)
Re:Honeypot Reverse Attack (Score:4, Funny)
/usr/home/hax0r/My\ Super\ Secret\ Incriminating\ Documents\ Conveniently\ Zipped\ For\ You.MP5-R12.1.0.2.3.1.1-ALPHA.tar.gz
There. Fixed it for you.
Re:Honeypot Reverse Attack (Score:5, Funny)
Re: (Score:1, Redundant)
Yes I know I'm a bit late on this joke, but I don't think anyone else managed to work the honeypot in there. (Or vice versa, h0 h0 h0.)
The cost is too high, get a Zaurus (Score:4, Insightful)
http://www.irongeek.com/i.php?submenu=zaurus/zaur
Skip the Zaurus... (Score:3, Insightful)
Considering the new WebPads and all being available and supported (unlike the Zaurus...), I think I'll go with that instead...
Re:Skip the Zaurus... (Score:5, Insightful)
For half that money you could get a fully fledged laptop with builtin wireless and run any tools you liked.
From the summary I was expecting a $50 pocket device.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
I guess you could if you have one of those jackets with the big pocket on the back. Perfect for sliding a laptop into. Probably only doable in cold weather though, as the laptop will definitely keep you warm...
Re: (Score:1)
Huh?
While it's true that Sharp has neglected the Zaurus software-wise for ages now, it has been actively supported by a number of groups that have gone from tweaking the existing Sharp ROM to creating a full-blown replacement for the Sharp ROM.
So it is hardly unsupported, I would say that it is every bit as well supported as my PC is running SuSE.
And, no intended slight
Re: (Score:2)
Well, let's add it up...
Re: (Score:2)
Re: (Score:2)
The Zaurus would be nice if it was still in production. For use newbs, the Nokia series is attractive
Re: (Score:1)
They're careful who they will sell it to... (Score:1, Interesting)
Even so, it probably won't be long before this device is being used by hackers as well as law enforcement. Actually, after thinking about it a bit, I'm not sure which use bothers me more.
Re: (Score:2)
You're going to find that the black/grey hats will be buying a Nokia 770 or it's next generation,
buying one of the alterable PocketPC's, or a cheap laptop and running Metasploit or SPIKE/MOSDEF
on them- all of which are legit tools and available as LGPL or similar licensed code. And, in the
case of SPIKE/MOSDEF, you're using the underlying engine for CANVAS anyhow...
All this does is provide commercial support and exploit updates for a
What I like to do... (Score:5, Interesting)
The real network is hidden, strongly encrypted and using 802.11n. Beat that, hackers!
Re:What I like to do... (Score:5, Funny)
Re: (Score:1)
Damn, I just got rid of a couple of wireless access points, and I never thought of that. It might have been kind of fun to browse through the syslogs on those to see who is banging their heads against a brick wall...
Re: (Score:2)
Re: (Score:2)
Note that you're going to hurt your(and everyone near by)'s signal to noise ratio, and you're going to confuse real clients just as much as you will evil hax0rs-- Try sorting through a few dozen networks on a wifi enabled cellphone for example, probably not fun.
Re: (Score:2)
Exactly how breakable "WPA original" is? If you mean with "WPA" 802.11i draft 4 (as commonly meant), it supports both TKIP and AES encryptions (as does "WPA2", the final version of 802.11i). And neither is particularly weak - of course TKIP has not been scrutinized so much as AES.
Even WEP is not so vulnerable these days, since most equipment avoids the
Is that something in your pocket.... (Score:1)
I believe... (Score:4, Funny)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
White House (Score:1)
my nokia can do similar stunts. (Score:2)
All they did was put together an easy to use gui so anyone without any computer knolwledge at all can use it.
hmm.. that's against the hackers code!
Re: (Score:1)
Nice
Recipe for bad humour (Score:5, Funny)
Actually... (Score:5, Funny)
"In Soviet Russia - Open Ports Penetrate You!"
or..."my back door is impenetrable YOU INSENSITIVE CLOD!!!"
or...perhaps a reference to a Beowulf cluster-f%@k
or...something ending in
then we all get sick of it.
Gotta wonder... (Score:4, Funny)
God, I love IT.
Automated intrusion software (Score:5, Funny)
Over the last year or so, I've considered writing an automated wireless network intrusion tool. It would:
You'd run it on a laptop that you'd carry in your backpack or in your car, on your way to/from work or just cruising around on a Sunday afternoon.
As such, it would be called the Transient Wireless Intrusion Tool, or TWIT. I just get a charge out of network security people writing about twits wandering around near the network.
Re:Automated intrusion software (Score:5, Funny)
TWAT (Score:2)
Even worse would be Transient Wireless Attack Tool...
That was my original working title, actually :)
Re: (Score:1)
"We can't have a bunch of twats runing around the office trying to capture senseless packets of the spring break pictures of your mother."
"is it me, or do we have a bunch of twats running around the office?"
"twat was his name?"
OSS version (Score:1)
Modified Nokia 770 (Score:1)
Legality? (Score:3, Interesting)
Now just combine that with OLPC (Score:5, Funny)
Automated intrusion (Score:1)
Re: (Score:1)
Dupe or Followup? (Score:4, Interesting)
I posted a theory about sending one to yourself through the mail activated and with a GPS so that the postal delivery vehicle does your wardriving for you. I called it warsmailing [slashdot.org]. So far no results on Google of anyone attempting it using that term.
(Why do I keep being prompted to save a download of comments.pl when I Submit?)
Re: (Score:1)
How did they know??? (Score:5, Funny)
Re: (Score:3, Funny)
Hey! I tease! Put that thing down!
one use.. (Score:1)
This doesn't change anything. (Score:2, Funny)
Penetration Tester in your Pocket 7333482 (Score:3, Funny)
but... (Score:1)
Excuse me Sir. (Score:1, Redundant)
Or are you just happy to see me?
egh (Score:1, Insightful)
the only thing the nokia 770 isnt really capable of already is packet injection, so does that mean they're charging that much money for a product sticker, an injection-capable wifi driver, and some easy front ends to already existing (and compiled for debian / arm / maemo) wifi software?
ill compile a driver for a capable usb wifi card or wait for a monitor mode / packet injection patch for the 770's wifi chipset to become freely available,
Why? (Score:1)
Re: (Score:1)
Is that a Penetration Tester In Your Pocket (Score:2)
Anyone familiar with pentest tools on the n800? (Score:1)
Penetration tester in pocket (Score:2)
The story is: Linux is great (Score:3, Funny)
Re: (Score:1)
I'll take all of that back if you can explain why LEOs need a *stealthy* wireless pentest capability and explain a few compelling scenarios where this is better than the vastly cheaper combination of a 770 running Kismet and a conventional laptop running conventional tools.
Untill y
Nokia 770 + Kismet (Score:2, Interesting)
Good margin!
What, no mention of Backtrack? (Score:2)
Re: (Score:1)
Wi-Fi Penetration Tester (Score:1)
Stupid! (Score:1)
Gimmick. (Score:2, Informative)
The number of applications this device provides that are both legitimate and useful are near zero.
If you are legitimately authorized to do scans, why not do it with proper equipment? I used to warwalk all the time with an open laptop in plain view, and if anyone stopped me, I had a letter from the CIO in my hand.
If you want to truly test security are you gonna hand an idiot-proof device to some intern and tell them to push the pretty red button and run around with it?
It expensive because... (Score:1)
not pocket size but damn powerful! - Janus miniitx (Score:2)
The "Janus Project" is the brainchild of Kyle Williams of the Janus Wireless Security Research Group in Portland, Oregon.
Mounted inside an epoxy and silicone-sealed watertight case lives a 1.5GHz C7 powered EPIA EN 15000G motherboard, 2 x four-port PCI to mini-PCI adapters, 8 x 802.11a/b/g mini-PCI WLAN Modules, 2 x 1W 2.4Ghz WLAN amplifiers, a keyboard and a 17in LCD screen. The system can scan up to 300 wireless networks simultaneously, storing and AES encrypting in real time a
slashmarketing (Score:1)
hmm, i think i am going to to to this conference with a notebook from the 80s and tell everyone it is my new secure noteb
$3600 device? (Score:2)
I'm actually somewhat surprised I haven't seen any stories along these lines yet. Load up a DS with wepcrack and some malware, power it on, flip it closed and mail to target. While it sits all morning in shipping/receiving, it's f
Oh c'mon you guys... (Score:1)
Get something like this [engadget.com] (hint: there's a much cheaper one with backlight that costs only about 50 bux), read this [maushammer.com], lean to program the MCU, add some Flash memory, learn to hack the BPU and get goin' already.
No wonder the military too are going COTS, they can't hack up anything themselves anymore unless millions of dollars are dumped into the project.
Heck, even the famous voting machine scanner from the Netherlands was in fact a hacked TomTom navigator (you can prolly find them by
Re: (Score:2)
It's both!
A 'penetration tester' that can scan other connections for open ports, and automatically launch code execution exploits. It has self replicating code, but the doctor says there is no viral payload.