Do Jasager and the Interceptor count? Robin
On 17 May 2010 16:54, Adrian Crenshaw <[email protected]> wrote: > I'm thinking of doing a write up on malicious hardware (maltronics?), and > need ideas for other examples. Here are a few categories I can thing of off > the top of my head: > > 1. Hardware keyloggers > 2. PHUKD Devices > 3. Home routers modified as Pivots (I think Paul and Larry have done a lot > of work with this) > 4. Cloned routers from China? > 5. U3 Thumbdrives with "evil" autorun payloads. > > What other items can you think of? > > Thanks, > Adrian > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
