| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
There are many great “Do It Yourself” security testing hardware projects
out there. The problem for most people is the time and expertise it
takes to construct and operate them. I will be introducing The Glitch as
a simple to use, plug-and-play, open source, security testing hardware
platform. With this project there is no need to solder or write code,
unless that’s your thing. To make things easy, all user configuration
is done on a Micro SD card. Users can select from multiple
pre-configured modules using a small DIP switch. Have it set to target
a Windows system, flip a switch, and instead run your OSX attack module.
That’s great and all, but what does it do? I will be demonstrating a
few projects currently available for The Glitch. You will see how to
use keystroke injection to do things like set up a reverse SSH connection off a live cd, record keystrokes and replay them with the keylogger setup, embed the hardware into USB attached devices, and expand The Glitch to work with technologies like Bluetooth, RFID/NFC,
and more.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast