Supporting an Attack with Technology
Richard Ackroyd, Senior Security Engineer, RandomStorm Limited
Everybody loves a gadget, but aside from being fun toys, they can also be leveraged to provide another dimension to social engineering attacks. The old cliche is to drop a wireless access point into the corporate network and walk away, but is this practical and are there better tools available? This chapter will cover 3G dropboxes, wireless tools, and 3G KVM switches. We will walk through the process of building a 3G-enabled dropbox with full Virtual Private Network (VPN) support into your target network.
Keywords
RaspberryPi; 3G; dropbox; Raspbian; OpenVPN; reverse SSH
Information in this chapter
Attaching to the Network
Cable and Live ...
Get Social Engineering Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.