From: Jimi Thompson (jimit@myrealbox.com)
Date: Thu Sep 11 2003 - 00:49:51 EDT
The sneakiest device I have seen is a Toshiba Libretto that was duck
taped to the bottom of a floor tile. Since these things hold full
size laptop hard drives, you wouldn't necessarily need to transmit
the data.
Many of the new wireless devices are capable of getting POE - power
over ethernet.
http://www.nycwireless.net/poe/
so your power outlet doesn't have to be near the wireless transmitter.
The absolute easiest way, assuming that you have physical access to
this device, would be to make a connection to your desktop by
installing a $30 hub from CompUSA, passively capture the traffic,
whack the unimportant stuff (NOTE: I am assuming an employee since
they usually have physical access to devices) and then burn CD's to
carry home. No wireless to sniff and unless the cabling is found,
no one the wiser.
1 - I'd be tracing this cable by hand to find out EXACTLY what it is
attached to
2 - I'd be locking that puppy up. The easiest way in the world to
get owned is grant physical access regardless of the device.
HTH,
Jimi
At 8:15 PM -0500 8/30/03, Bryan wrote:
>Hello all.
>
>I saw something today that got the wheels turning as a potential
>vulnerability in network deployment. Let's say a client company has some
>sort of proprietary device out in the open for anybody to use, and is
>connected to the internal network through a regular 100BaseT connection.
>But that cable is easily unplugged... and plugged into whatever you
>want. Should one want to connect to the network through that connection,
>wouldn't it be possible to attach a wired/wireless converter to the
>line, and connect to the network via wireless adapter on your machine
>from some distance away without anyone being any the wiser?
>
>I did some googling for such a device, and found a few products, but
>none that would suit the needs for this application. It should be small
>enough to hide, needing only one rj45 port, and maybe a wireless
>antenna. And it should also be battery powered as you most likely
>wouldn't have a power outlet nearby, much less one that could be
>stealthily utilized. Then just a little wireless sniffing should help
>you out from there, right?
>
>Any ideas? Thanks
>
>Bryan
>
>
>---------------------------------------------------------------------------
>FREE Trial!
>New for security consultants and in-house pros: FOUNDSTONE PROFESSIONAL
>and PROFESSIONAL TL software. Fast, reliable vulnerability assessment
>technology powered by the award-winning FoundScan engine. Try it
>free for 21 days at:
>http://www.securityfocus.com/sponsor/Foundstone_pen-test_030825
>----------------------------------------------------------------------------
---------------------------------------------------------------------------
FREE Trial!
New for security consultants and in-house pros: FOUNDSTONE PROFESSIONAL
and PROFESSIONAL TL software. Fast, reliable vulnerability assessment
technology powered by the award-winning FoundScan engine. Try it free for 21 days at: http://www.securityfocus.com/sponsor/Foundstone_pen-test_030825
----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:39 EDT