MajSh writes "with all the hype arount it, I'm sure many of you have considered using the iphone as a pentesting device. Since this cute piece of hardware has a working kernel and a lot of BSD utilities ported to it, I guess it's only a matter of time. I know there were successful attempts at porting aircrack-ng, which is nice but doesn't really get you anywhere without the ability to gather information. The main idea I had was using the iphone just as a probing unit that will only collect data — using some passive and maybe active methods with aireply and such and process the information off-line later, or — pass the dump using the iphone EDGE ability to a remote server for processing and then receive the network key/vulnerability/assessment that fits machines on network or the network in general. Care to share your experience or thoughts on the matter ?"