How about backdoored network cards? http://www.eecs.ucf.edu/~czou/research/Chipset%20Backdoor-AsiaCCS09.pdf
On Mon, May 17, 2010 at 8:54 AM, Adrian Crenshaw <[email protected]>wrote: > I'm thinking of doing a write up on malicious hardware (maltronics?), and > need ideas for other examples. Here are a few categories I can thing of off > the top of my head: > > 1. Hardware keyloggers > 2. PHUKD Devices > 3. Home routers modified as Pivots (I think Paul and Larry have done a lot > of work with this) > 4. Cloned routers from China? > 5. U3 Thumbdrives with "evil" autorun payloads. > > What other items can you think of? > > Thanks, > Adrian > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > --
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
