Hi Steve,
On Mon, Feb 7, 2011 at 6:48 PM, Steve Holmes <
steve@holmesgrown.com> wrote:
> I know you have been mentioning in several threads the need for some
> material. What I plan for my meeting spot is definitely
> demonstrations. I figure the demo activity will consume maybe 2/3rds
> of the time and the remaining be explanation, a bit of historical
> perspective and Q&A. I don't have it all plotted out yet but have a
> general idea of major topics in my head. I'll have more to come
> later.
>
> Or after I finish my show this Thursday, I can pass along what I used
> for notes since your program isn't til next month.
>
Hey, I did a few demonstrations/presentations with Wireless WEP and WPA2
encroachment and MITM attacks using airmon-ng aircrack-ng and airreplay-ng
(that I also used at work for LunchNLearn sessions to bring everyone in
Corporate America out of Security Matrix) which are all available:
http://www.aircrack-ng.org/
There's even aircrack-ng for iPhone debian now. Incredible, huh?
The presentation is here (not sure of the quality of the format, however)
from a Hackfest early last year at the Foundation for Blind Children:
http://www.obnosis.com/Layer8Wireless.html
Let me know if you would like for me to appear and run a few attack scripts
(I script these presentations, since it's easier to run, after going through
the presentation materials - don't have to sit and type laboriously).
"All Trust is Misplaced"
> On Sat, Feb 05, 2011 at 05:44:28PM -0700, Technomage Hawke wrote:
> > nice story, but the layout was confusing. they really need to be using
> tables and frames on there. having to skim all the other "link" entries just
> to read the story. Sorry folks, its being a long and painful day.
> >
> > btw, can I get a little help with a basic outline for linux and
> accessibility technology, or should I just keep it simple and bring my
> powerbook along to demonstrate some of it?
> >
> > -Eric
> >
> > On Feb 5, 2011, at 3:26 PM, keith smith wrote:
> >
> > >
> > >
> > > Some 32% of respondents to a recent national survey admitted borrowing
> a neighbor's unencrypted Wi-Fi connection.
> > >
> http://abcnews.go.com/Technology/survey-32-admit-mooching-neighbors-wi-fi/story?id=12837897
> > >
> > >
> > > ------------------------
> > > Keith Smith
> > >
> > > ---------------------------------------------------
> > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> > > To subscribe, unsubscribe, or to change your mail settings:
> > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> >
> > ---------------------------------------------------
> > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> > To subscribe, unsubscribe, or to change your mail settings:
> > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>
--
(503) 754-4452
(623) 688-3392
http://www.obnosis.com
*Catch My MetaSploit & IP CAM Surveillence
Presentations @ ABLEConf.com in April!*
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss