Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 1 declined, 0 accepted (1 total, 0.00% accepted)

Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×
iMac

Submission + - iPhone as a Pentesting device

MajSh writes: "with all the hype arount it, I'm sure many of you have considered using the iphone as a pentesting device. Since this cute piece of hardware has a working kernel and a lot of BSD utilities ported to it, I guess it's only a matter of time. I know there were successful attempts at porting aircrack-ng, which is nice but doesn't really get you anywhere without the ability to gather information. The main idea I had was using the iphone just as a probing unit that will only collect data — using some passive and maybe active methods with aireply and such and process the information off-line later, or — pass the dump using the iphone EDGE ability to a remote server for processing and then receive the network key/vulnerability/assessment that fits machines on network or the network in general. Care to share your experience or thoughts on the matter ?"

Basic is a high level languish. APL is a high level anguish.

Working...