Everybody loves a gadget, but aside from being fun toys, they can also be leveraged to provide another dimension to social engineering attacks. The old cliche is to drop a wireless access point into the corporate network and walk away, but is this practical and are there better tools available? This chapter will cover 3G dropboxes, wireless tools, and 3G KVM switches. We will walk through the process of building a 3G-enabled dropbox with full Virtual Private Network (VPN) support into your target network.
RaspberryPi; 3G; dropbox; Raspbian; OpenVPN; reverse SSH
Information in this chapter
Attaching to the Network
Cable and Live ...