On Fri, Feb 11, 2011 at 2:02 AM, Technomage Hawke <
technomage.hawke@gmail.com> wrote:
> lisa?
> where was your response in here? I couldn't "see" it (either that or its
> nested in a quote).
>
Or after I finish my show this Thursday, I can pass along what I used
for notes since your program isn't til next month.
Hey, I did a few demonstrations/presentations with Wireless WEP and WPA2
encroachment and MITM attacks using airmon-ng aircrack-ng and airreplay-ng
(that I also used at work for LunchNLearn sessions to bring everyone in
Corporate America out of Security Matrix) which are all available:
http://www.aircrack-ng.org/
There's even aircrack-ng for iPhone debian now. Incredible, huh?
The presentation is here (not sure of the quality of the format, however)
from a Hackfest early last year at the Foundation for Blind Children:
http://www.obnosis.com/Layer8Wireless.html
Let me know if you would like for me to appear and run a few attack scripts
(I script these presentations, since it's easier to run, after going through
the presentation materials - don't have to sit and type laboriously).
"All Trust is Misplaced"
>
> -Eric
>
> On Feb 11, 2011, at 1:05 AM, Lisa Kachold wrote:
>
> >
> >
> > On Wed, Feb 9, 2011 at 8:39 AM, James Finstrom <jfinstro on by default. I
> have found these routers to be easy backup interweb sources. When I lived in
> an apartment I had a server that simply sat there and acquired credentials.
> Fortunately my Cox connection had awesome uptime and I never had t=========
> m@rhinoequipment.com> wrote:
> > Qwest always ships their routers with wephed need to use the data. 99hh
> >
> > Here is some observations, If you want free internet look for medical
> offices. HIPPA requires security but not "smart security" Often the password
> to access their wireless and often their servers is their office name, a
> doctor in their office, or their specialty. Some think they are clever and
> add encapsulate the name in exclamation marks. You can also often walk in
> and ask a question and eagle eye the password off a post it note.
> >
> > I have several times offered to help secure offices that hold the medical
> records of me and my family because frankly HIPPA is worthless
> >
> >
> > --James
> >
> >
> >
> >
> > On Tue, Feb 8, 2011 at 5:25 PM, Lisa Kachold <lisakachold@obnosis.com>
> wrote:
> > Hi Steve,
> >
> > On Mon, Feb 7, 2011 at 6:48 PM, Steve Holmes <steve@holmesgrown.com>
> wrote:
> > I know you have been mentioning in several threads the need for some
> > material. What I plan for my meeting spot is definitely
> > demonstrations. I figure the demo activity will consume maybe 2/3rds
> > of the time and the remaining be explanation, a bit of historical
> > perspective and Q&A. I don't have it all plotted out yet but have a
> > general idea of major topics in my head. I'll have more to come
> > later.
> >
> > Or after I finish my show this Thursday, I can pass along what I used
> > for notes since your program isn't til next month.
> >
> > Hey, I did a few demonstrations/presentations with Wireless WEP and WPA2
> encroachment and MITM attacks using airmon-ng aircrack-ng and airreplay-ng
> (that I also used at work for LunchNLearn sessions to bring everyone in
> Corporate America out of Security Matrix) which are all available:
> >
> > http://www.aircrack-ng.org/
> >
> > There's even aircrack-ng for iPhone debian now. Incredible, huh?
> >
> > The presentation is here (not sure of the quality of the format, however)
> from a Hackfest early last year at the Foundation for Blind Children:
> >
> > http://www.obnosis.com/Layer8Wireless.html
> >
> > Let me know if you would like for me to appear and run a few attack
> scripts (I script these presentations, since it's easier to run, after going
> through the presentation materials - don't have to sit and type
> laboriously).
> >
> > "All Trust is Misplaced"
> >
> >
> > On Sat, Feb 05, 2011 at 05:44:28PM -0700, Technomage Hawke wrote:
> > > nice story, but the layout was confusing. they really need to be using
> tables and frames on there. having to skim all the other "link" entries just
> to read the story. Sorry folks, its being a long and painful day.
> > >
> > > btw, can I get a little help with a basic outline for linux and
> accessibility technology, or should I just keep it simple and bring my
> powerbook along to demonstrate some of it?
> > >
> > > -Eric
> > >
> > > On Feb 5, 2011, at 3:26 PM, keith smith wrote:
> > >
> > > >
> > > >
> > > > Some 32% of respondents to a recent national survey admitted
> borrowing a neighbor's unencrypted Wi-Fi connection.
> > > >
> http://abcnews.go.com/Technology/survey-32-admit-mooching-neighbors-wi-fi/story?id=12837897
> > > >
> > > >
> > > > ------------------------
> > > > Keith Smith
> > > >
> > > > ---------------------------------------------------
> > > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> > > > To subscribe, unsubscribe, or to change your mail settings:
> > > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> > >
> > > ---------------------------------------------------
> > > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> > > To subscribe, unsubscribe, or to change your mail settings:
> > > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> > ---------------------------------------------------
> > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> > To subscribe, unsubscribe, or to change your mail settings:
> > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> >
> >
> >
> > --
> >
> > (503) 754-4452
> > (623) 688-3392
> >
> > http://www.obnosis.com
> > Catch My MetaSploit & IP CAM Surveillence
> > Presentations @ ABLEConf.com in April!
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> > ---------------------------------------------------
> > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> > To subscribe, unsubscribe, or to change your mail settings:
> > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> >
> >
> >
> >
> > ---------------------------------------------------
> > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> > To subscribe, unsubscribe, or to change your mail settings:
> > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
> >
> >
> >
> > --
> >
> > (503) 754-4452
> > (623) 688-3392
> >
> > http://www.obnosis.com
> > Catch My MetaSploit & IP CAM Surveillence
> > Presentations @ ABLEConf.com in April!
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >
> > ---------------------------------------------------
> > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> > To subscribe, unsubscribe, or to change your mail settings:
> > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
>
--
(503) 754-4452
(623) 688-3392
Next PLUG Security Team Saturday Noon - 15:00 Gangplankhq.com
http://plug.phoenix.az.us
Showcasing David Heurta's hayst.ac Browser History Obfuscation Firefox
Plugin
Behind the scenes: Cisco WPA2-Enterprise network setup, management VLAN/VPN;
And planning for a) Hamachi Hackfest && b) LogMeIn Hackfest
http://www.obnosis.com
*Catch My MetaSploit & IP CAM Surveillance
Presentations @ ABLEConf.com in April!*
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss