Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 1 declined, 0 accepted (1 total, 0.00% accepted)

iMac

+ - iPhone as a Pentesting device

Submitted by
MajSh
MajSh writes: "with all the hype arount it, I'm sure many of you have considered using the iphone as a pentesting device. Since this cute piece of hardware has a working kernel and a lot of BSD utilities ported to it, I guess it's only a matter of time. I know there were successful attempts at porting aircrack-ng, which is nice but doesn't really get you anywhere without the ability to gather information. The main idea I had was using the iphone just as a probing unit that will only collect data — using some passive and maybe active methods with aireply and such and process the information off-line later, or — pass the dump using the iphone EDGE ability to a remote server for processing and then receive the network key/vulnerability/assessment that fits machines on network or the network in general. Care to share your experience or thoughts on the matter ?"

If God had a beard, he'd be a UNIX programmer.

Working...