PaulDotCom mailing list archives
NSLU2 replacement?
From: jim.w.manley at lmco.com (Manley, Jim W)
Date: Thu, 05 Mar 2009 09:15:00 -0600
Have you looked at the Routerboard running something like the MikroTik RouterOS (http://www.mikrotik.com/)? Very selection of formats, with and without mini-pci slots for wireless cards, etc. The OS is Linux based and runs IPtables for a firewall functions. Very nice little piece of hardware. An ISP I know uses them as the basis for delivering ISP services via radio in an areas where DSL and cable don't exist. Jim 1st Immutable Law of Computer Security If a bad guy can persuade you to run his program on your computer, it's not your computer anymore.
-----Original Message----- From: pauldotcom-bounces at pdc-mail.pauldotcom.com [mailto:pauldotcom- bounces at pdc-mail.pauldotcom.com] On Behalf Of Paul Asadoorian Sent: Thursday, March 05, 2009 9:05 AM To: PaulDotCom Security Weekly Mailing List Subject: Re: [Pauldotcom] NSLU2 replacement? Hey Adrian, Can you define "drop box"? In other words, what are you requirements for the device that you would plant inside the target network? There is a chapter in our book on how to do this with a WRT, and I've spent some time thinking about these devices (as has Larry). Some of the functionality that we've discussed includes: - Reverse connecting shell (perhaps tunneled over DNS or HTTP) - Web proxy for attacking internal web applications - VPN connection to bridge the attacker's remote network to the network you are attacking (then run Nmap and other tools and let VPN do the work) - Sniff packets (on the wireless and the wired network) - This also depends on how it is deployed, will you use wireless to connect to it, or Ethernet and tunning back to a remote machine? This defines if you need one wireless card/Ethernet port or two. - Launch attacks directly from it - If you want to load something like Metasploit on a remote device you will need CPU, RAM, and Flash that can handle it, this drives up the cost. - Other protocols - Do you want to be able to analyze bluetooth, RFID, wireless spectrum, etc..? This determines if you need USB. - Architecture - Most embedded systems run MIPS or ARM, which somewhat limits the software and drivers that you can use (or forces you to do a lot of cross-compiling, which is doable, but a PITA sometimes), when compared against a small x86 platform. I've had a tough time finding a device with enough resources (mini-pci slots, wireless cards, USB ports, RAM, Flash, and CPU) for under $300. At the $300 pricepoint you can find something that ideally coul dbe battery powered and small enough to hide inside a remote network. Thing is, for a pen test, you may have to be willing to lose a few in the process and you will need to make sure you put some extra $$ in the budget to cover your losses. Let me know what you think, I am willing to work with you on this project. My suggestion is that we define the requirements, select the hardware, then select and configure the software. Cheers, Paul Adrian Crenshaw wrote:I'm thinking of doing some research into drop boxes (please let meknowif there is already a name for them), little computers you leave at a site that allow you to get into the network and pivot aroundfirewallsby shoveling a shell back to your host outside of the network. TheNSLU2is no longer being made, and my understanding is the nas200 is not as hackable. Any ideas on other good dropboxes (by the way, have Icoined anew term :) )? Adrian ------------------------------------------------------------------------_______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com-- Paul Asadoorian PaulDotCom Enterprises Web: http://pauldotcom.com Phone: 401.829.9552 _______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
-------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/x-pkcs7-signature Size: 10277 bytes Desc: not available Url : http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20090305/c6eb6761/attachment.bin
Current thread:
- NSLU2 replacement? Adrian Crenshaw (Mar 05)
- NSLU2 replacement? Paul Asadoorian (Mar 05)
- NSLU2 replacement? Manley, Jim W (Mar 05)
- NSLU2 replacement? Paul Asadoorian (Mar 05)
- NSLU2 replacement? Adrian Crenshaw (Mar 05)
- NSLU2 replacement? Manley, Jim W (Mar 05)
- NSLU2 replacement? Manley, Jim W (Mar 05)
- NSLU2 replacement? Paul Asadoorian (Mar 05)
- NSLU2 replacement? PJ McGarvey (Mar 05)
- NSLU2 replacement? Paul Asadoorian (Mar 05)
- NSLU2 replacement? John Fitzpatrick (Mar 05)
- NSLU2 replacement? Paul Asadoorian (Mar 05)
- <Possible follow-ups>
- NSLU2 replacement? Adrian Crenshaw (Mar 05)