Re: device connection hijacking

From: Jordan Wiens (jwiens@nersp.nerdc.ufl.edu)
Date: Tue Sep 02 2003 - 10:38:34 EDT


Also, I just saw this on slashdot the other day:
http://www.actiontec.com/products/modems/dual_pcmodem/dpm_overview.html

Apparently, it's running embedded linux:
http://www.clevelandlug.net/modules.php?op=modload&name=News&file=article&sid=26&mode=thread&order=0&thold=0

That's just practically BEGGING to be made into something fun along those
lines. For example, password sniff in-line, and have the modem accept
calls and upload the results. Not quite as untraceable as wireless, but
in some ways, less noisy. Many companies that do wireless walkthroughs
wouldn't be as likely to catch a stray analog out line.

Plus, the form factor is absolutely wonderful for hiding in an office
environment. And it looks a little less suspicious than a networked
potted plant in case someone notices the network connection. ;-)

-- 
Jordan Wiens, CISSP
UF Network Incident Response Team
(352)392-2061
On Mon, 1 Sep 2003, Kurt Seifried wrote:
> Take a wireless router (linksys, whatever) gut the case, add batteries
> (which lets you ditch the power converter possibly) and voila. Alternatively
> take a single board PC (PC-104 form factor) and go to town. If you hide it
> in say a fake potted plant this eases delivery (who on earth is going to
> question some guy in overalls dropping off a fake potted plant and
> "installing" it) and allows you a lot of space for the device.
---------------------------------------------------------------------------
FREE Trial!
New for security consultants and in-house pros: FOUNDSTONE PROFESSIONAL 
and PROFESSIONAL TL software. Fast, reliable vulnerability assessment 
technology powered by the award-winning FoundScan engine. Try it free for  21 days at: http://www.securityfocus.com/sponsor/Foundstone_pen-test_030825
----------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:39 EDT