Chapter 12

Supporting an Attack with Technology

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

Everybody loves a gadget, but aside from being fun toys, they can also be leveraged to provide another dimension to social engineering attacks. The old cliche is to drop a wireless access point into the corporate network and walk away, but is this practical and are there better tools available? This chapter will cover 3G dropboxes, wireless tools, and 3G KVM switches. We will walk through the process of building a 3G-enabled dropbox with full Virtual Private Network (VPN) support into your target network.

Keywords

RaspberryPi; 3G; dropbox; Raspbian; OpenVPN; reverse SSH

Information in this chapter

Attaching to the Network

Cable and Live ...

Get Social Engineering Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.