On Fri, Feb 11, 2011 at 2:02 AM, Technomage Hawke < technomage.hawke@gmail.com> wrote: > lisa? > where was your response in here? I couldn't "see" it (either that or its > nested in a quote). > Or after I finish my show this Thursday, I can pass along what I used for notes since your program isn't til next month. Hey, I did a few demonstrations/presentations with Wireless WEP and WPA2 encroachment and MITM attacks using airmon-ng aircrack-ng and airreplay-ng (that I also used at work for LunchNLearn sessions to bring everyone in Corporate America out of Security Matrix) which are all available: http://www.aircrack-ng.org/ There's even aircrack-ng for iPhone debian now. Incredible, huh? The presentation is here (not sure of the quality of the format, however) from a Hackfest early last year at the Foundation for Blind Children: http://www.obnosis.com/Layer8Wireless.html Let me know if you would like for me to appear and run a few attack scripts (I script these presentations, since it's easier to run, after going through the presentation materials - don't have to sit and type laboriously). "All Trust is Misplaced" > > -Eric > > On Feb 11, 2011, at 1:05 AM, Lisa Kachold wrote: > > > > > > > On Wed, Feb 9, 2011 at 8:39 AM, James Finstrom have found these routers to be easy backup interweb sources. When I lived in > an apartment I had a server that simply sat there and acquired credentials. > Fortunately my Cox connection had awesome uptime and I never had t========= > m@rhinoequipment.com> wrote: > > Qwest always ships their routers with wephed need to use the data. 99hh > > > > Here is some observations, If you want free internet look for medical > offices. HIPPA requires security but not "smart security" Often the password > to access their wireless and often their servers is their office name, a > doctor in their office, or their specialty. Some think they are clever and > add encapsulate the name in exclamation marks. You can also often walk in > and ask a question and eagle eye the password off a post it note. > > > > I have several times offered to help secure offices that hold the medical > records of me and my family because frankly HIPPA is worthless > > > > > > --James > > > > > > > > > > On Tue, Feb 8, 2011 at 5:25 PM, Lisa Kachold > wrote: > > Hi Steve, > > > > On Mon, Feb 7, 2011 at 6:48 PM, Steve Holmes > wrote: > > I know you have been mentioning in several threads the need for some > > material. What I plan for my meeting spot is definitely > > demonstrations. I figure the demo activity will consume maybe 2/3rds > > of the time and the remaining be explanation, a bit of historical > > perspective and Q&A. I don't have it all plotted out yet but have a > > general idea of major topics in my head. I'll have more to come > > later. > > > > Or after I finish my show this Thursday, I can pass along what I used > > for notes since your program isn't til next month. > > > > Hey, I did a few demonstrations/presentations with Wireless WEP and WPA2 > encroachment and MITM attacks using airmon-ng aircrack-ng and airreplay-ng > (that I also used at work for LunchNLearn sessions to bring everyone in > Corporate America out of Security Matrix) which are all available: > > > > http://www.aircrack-ng.org/ > > > > There's even aircrack-ng for iPhone debian now. Incredible, huh? > > > > The presentation is here (not sure of the quality of the format, however) > from a Hackfest early last year at the Foundation for Blind Children: > > > > http://www.obnosis.com/Layer8Wireless.html > > > > Let me know if you would like for me to appear and run a few attack > scripts (I script these presentations, since it's easier to run, after going > through the presentation materials - don't have to sit and type > laboriously). > > > > "All Trust is Misplaced" > > > > > > On Sat, Feb 05, 2011 at 05:44:28PM -0700, Technomage Hawke wrote: > > > nice story, but the layout was confusing. they really need to be using > tables and frames on there. having to skim all the other "link" entries just > to read the story. Sorry folks, its being a long and painful day. > > > > > > btw, can I get a little help with a basic outline for linux and > accessibility technology, or should I just keep it simple and bring my > powerbook along to demonstrate some of it? > > > > > > -Eric > > > > > > On Feb 5, 2011, at 3:26 PM, keith smith wrote: > > > > > > > > > > > > > > > Some 32% of respondents to a recent national survey admitted > borrowing a neighbor's unencrypted Wi-Fi connection. > > > > > http://abcnews.go.com/Technology/survey-32-admit-mooching-neighbors-wi-fi/story?id=12837897 > > > > > > > > > > > > ------------------------ > > > > Keith Smith > > > > > > > > --------------------------------------------------- > > > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > > > > To subscribe, unsubscribe, or to change your mail settings: > > > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > > > > > > --------------------------------------------------- > > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > > > To subscribe, unsubscribe, or to change your mail settings: > > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > > --------------------------------------------------- > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > > To subscribe, unsubscribe, or to change your mail settings: > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > > > > > > > > -- > > > > (503) 754-4452 > > (623) 688-3392 > > > > http://www.obnosis.com > > Catch My MetaSploit & IP CAM Surveillence > > Presentations @ ABLEConf.com in April! > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > --------------------------------------------------- > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > > To subscribe, unsubscribe, or to change your mail settings: > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > > > > > > > > > > --------------------------------------------------- > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > > To subscribe, unsubscribe, or to change your mail settings: > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > > > > > > > > -- > > > > (503) 754-4452 > > (623) 688-3392 > > > > http://www.obnosis.com > > Catch My MetaSploit & IP CAM Surveillence > > Presentations @ ABLEConf.com in April! > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > --------------------------------------------------- > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > > To subscribe, unsubscribe, or to change your mail settings: > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > > --------------------------------------------------- > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > To subscribe, unsubscribe, or to change your mail settings: > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss > -- (503) 754-4452 (623) 688-3392 Next PLUG Security Team Saturday Noon - 15:00 Gangplankhq.com http://plug.phoenix.az.us Showcasing David Heurta's hayst.ac Browser History Obfuscation Firefox Plugin Behind the scenes: Cisco WPA2-Enterprise network setup, management VLAN/VPN; And planning for a) Hamachi Hackfest && b) LogMeIn Hackfest http://www.obnosis.com *Catch My MetaSploit & IP CAM Surveillance Presentations @ ABLEConf.com in April!*