Forgot your password?
typodupeerror

Submission Summary: 0 pending, 1 declined, 0 accepted (1 total, 0.00% accepted)

iMac

+ - iPhone as a Pentesting device

Submitted by
MajSh
MajSh writes "with all the hype arount it, I'm sure many of you have considered using the iphone as a pentesting device. Since this cute piece of hardware has a working kernel and a lot of BSD utilities ported to it, I guess it's only a matter of time. I know there were successful attempts at porting aircrack-ng, which is nice but doesn't really get you anywhere without the ability to gather information. The main idea I had was using the iphone just as a probing unit that will only collect data — using some passive and maybe active methods with aireply and such and process the information off-line later, or — pass the dump using the iphone EDGE ability to a remote server for processing and then receive the network key/vulnerability/assessment that fits machines on network or the network in general. Care to share your experience or thoughts on the matter ?"

"Lead us in a few words of silent prayer." -- Bill Peterson, former Houston Oiler football coach

Working...