That's one I need to expand into "Home routers modified as Pivots". Or maybe
an new category, "Evil Twins".

Thanks,
Adrian

On Mon, May 17, 2010 at 2:31 PM, Robin Wood <[email protected]> wrote:

> Do Jasager and the Interceptor count?
>
> Robin
>
> On 17 May 2010 16:54, Adrian Crenshaw <[email protected]> wrote:
> > I'm thinking of doing a write up on malicious  hardware (maltronics?),
> and
> > need ideas for other examples. Here are a few categories I can thing of
> off
> > the top of my head:
> >
> > 1. Hardware keyloggers
> > 2. PHUKD Devices
> > 3. Home routers modified as Pivots (I think Paul and Larry have done a
> lot
> > of work with this)
> > 4. Cloned routers from China?
> > 5. U3 Thumbdrives with "evil" autorun payloads.
> >
> > What other items can you think of?
> >
> > Thanks,
> > Adrian
> >
> > _______________________________________________
> > Pauldotcom mailing list
> > [email protected]
> > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> > Main Web Site: http://pauldotcom.com
> >
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to