2. |EH (Certified Ethical Hacker)
NSA-IAMIEM (NSA Information Assurance Methodology)
Other Security Related Stuff:
Contributor: The Ethical Hacker. Net
Contributor:Hakin9 Magazine
Contributor: Penetration Testing Execution Standard
Information Security Mentors Project (Mentor)
3. David Crenshaw Irongeek
Darren Kitchen Hak5
Robin Wood
David Kennedy (ReLik) SET Toolkit
http://www.irongeek.com/i.php?page=security/programmable-hid-usb-keystroke-
dongle
4. USB-based microcontroller development system
AVR Processor, 16 MHz
Single push button programming
Small Size
Works with Mac OS X, Linux & Windows
Flash Memory 32256
5. USB-based microcontroller development system
AVR Processor, 20 MHz
Single push button programming
Small Size
Works with Mac OS X, Linux & Windows
Flash Memory 130048
6. Allows for keystroke programming
Not dependent on U3 auto run
Can provide you a shell and kill antivirus faster than you can!
Cheap Economy is bad and you need to spend less! ($16 $24)
Easily Implantable (More on This Later)
7. Teensy Device
Teensy Loader Software
Arduino Software
Teensy Duino Software
Serial Install
Mini B USB Cable
Computer
Your Brain and some good ideas
8. Can be programmed in C or Arduino Language
http://www.pjrc.com/teensy
9. Limited Scope
Limited Attack Vectors
You only get 5 hardened IP addresses
Be Finished by Tomorrow!!!!
Laughing CISO’s “What you not in yet?”
18. Target needs to be logged in!
Limited to the access rights of the logged on user!
Lots of things can and sometimes do go wrong!
If you try to drop shell right away you will be caught