With the power of the tablets coming out now, and the open platform that Linux provides, there is a great opportunity for hacking from an easily hidden, Trojan style device with lots of power to allow us to do many different wireless attacks.
1. ARP spoofing
2. Ssl stripping
3. Session hijacking
4. Vuln scanning
5. Port and service scams
These are just a few features available in a tool called
. Using the application you can select all kinds of attack vectors, you can capture packets in a pcap dump for reading in Whitehall later.
It works well in a small networks and labs, but my next task is to blow up a public network and see what I’m able to find. If the located information is enough, I will approach face to face with data, and options on how to fix their problems.
Other WiFi tools in my toolbox include, droidsheep, ding (network scanner), connectbot, and sshdroid.
I will be writing a follow up on how to use the tools, and talk about the other tools.