O'Reilly logo

Social Engineering Penetration Testing by Richard Ackroyd, Andrew Mason, Gavin Watson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12

Supporting an Attack with Technology

Richard Ackroyd,    Senior Security Engineer, RandomStorm Limited

Everybody loves a gadget, but aside from being fun toys, they can also be leveraged to provide another dimension to social engineering attacks. The old cliche is to drop a wireless access point into the corporate network and walk away, but is this practical and are there better tools available? This chapter will cover 3G dropboxes, wireless tools, and 3G KVM switches. We will walk through the process of building a 3G-enabled dropbox with full Virtual Private Network (VPN) support into your target network.

Keywords

RaspberryPi; 3G; dropbox; Raspbian; OpenVPN; reverse SSH

Information in this chapter

Attaching to the Network

Cable and Live ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required