From Security Weekly Wiki
Jump to navigationJump to search
379 bytes added ,  20:53, 4 April 2007
no edit summary
[ NAC ATTACK!] - ''Researchers in Germany today demonstrated a tool that allows an unauthorized PC to disguise itself as a legitimate client in a Cisco Network Admission Control (NAC) environment, effectively circumventing the networking giant's end-point security strategy.''
= WRT54G Wireless Monitor =
Using a WRTSL54GS we have hacked it to:
* Sniff wireless packets while channel hopping using kismet_drone
* Monitor bluetooth devices using the bluez stack and a hacked Linksys BT100 Class 1 device with an external antenna connector
* Remotely monitor the 2.4Ghz spectrum with Wi-Spy and a specially ported remote agent called LINUXSpy
Live Demo!
= Stories For Discussion =


Navigation menu