SlideShare uma empresa Scribd logo
1 de 27
Poor Man's Guide To Network Espionage Gear Shawn Merdinger Independent Security Researcher CRT-9 Computer Security Institute  NetSec 2006 2006.06.14
British Spy Rock
First-Gen Spy Rock?
Obligatory Speaker Slide ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Warnings and Stuff ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Objectives ,[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Got bad soup? ,[object Object]
Attacker Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attack Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NEDs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NED Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NED Characteristics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NED OS & Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Linksys WRT54G ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FairuzaUS for Linksys ,[object Object],Treo 650 SSH into FairuzaUS  into compromised Windows box  Command line interface over SSH
Nokia 770 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Gumstix ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PicoTux ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spooky: Device Enclosures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spooky: 0wn3d Mesh Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spooky: In-Transit “Marketing” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spooky: Long-distance, the next best thing to being there ,[object Object],[object Object],[object Object]
How far?  802.11b over 125 miles
Countermeasures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Looking Forward ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st SessionBeginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st Sessionveerababu penugonda(Mr-IoT)
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Sina Manavi
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosOuthai SAIOUDOM
 


huertanix
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)Priyanka Aash
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSamip Shah
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Samwed Jain
 
Software-Defined Radio Presentation
Software-Defined Radio PresentationSoftware-Defined Radio Presentation
Software-Defined Radio PresentationGeorge Lambadas
 

Mais procurados (18)

Data security
Data securityData security
Data security
 
Session Slide
Session SlideSession Slide
Session Slide
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Firmware analysis 101
Firmware analysis 101Firmware analysis 101
Firmware analysis 101
 
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st SessionBeginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
 
How to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laosHow to be come a hacker slide for 2600 laos
How to be come a hacker slide for 2600 laos
 



 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)
 
Cy - Firewall
Cy - FirewallCy - Firewall
Cy - Firewall
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 
Steganography
SteganographySteganography
Steganography
 
Software-Defined Radio Presentation
Software-Defined Radio PresentationSoftware-Defined Radio Presentation
Software-Defined Radio Presentation
 

Destaque

Business intelligence versus competitive intelligence
Business intelligence versus competitive intelligenceBusiness intelligence versus competitive intelligence
Business intelligence versus competitive intelligenceMartin Brunet
 
Bi market research tata tcs 2010 08
Bi market research tata tcs 2010 08Bi market research tata tcs 2010 08
Bi market research tata tcs 2010 08OKTOPUS Consulting
 
Got Oil? - War Room Slides
Got Oil? - War Room SlidesGot Oil? - War Room Slides
Got Oil? - War Room Slideshiddenlevers
 
20111216 La réputation de votre entreprise en danger sur le net
20111216 La réputation de votre entreprise en danger sur le net20111216 La réputation de votre entreprise en danger sur le net
20111216 La réputation de votre entreprise en danger sur le netLuc Beirens
 
Immigration + US election - June 2016 War Room
Immigration + US election  - June 2016 War RoomImmigration + US election  - June 2016 War Room
Immigration + US election - June 2016 War Roomrajudeshi
 
Intelligence de marché, outils et principes
Intelligence de marché, outils et principesIntelligence de marché, outils et principes
Intelligence de marché, outils et principesJean-Francois Pelley
 
Fed Up Fed War Room Slides
Fed Up Fed War Room SlidesFed Up Fed War Room Slides
Fed Up Fed War Room Slideshiddenlevers
 
BRICS Hitting Bricks War Room Slides
BRICS Hitting Bricks War Room SlidesBRICS Hitting Bricks War Room Slides
BRICS Hitting Bricks War Room Slideshiddenlevers
 
Future of the USD War Room Slides
Future of the USD War Room SlidesFuture of the USD War Room Slides
Future of the USD War Room Slideshiddenlevers
 
Pôle d'intelligence d'entreprise - Université de Sherbrooke
Pôle d'intelligence d'entreprise - Université de SherbrookePôle d'intelligence d'entreprise - Université de Sherbrooke
Pôle d'intelligence d'entreprise - Université de SherbrookeSherbrooke Innopole
 
La veille, c'est quoi ? Intro
La veille, c'est quoi ? IntroLa veille, c'est quoi ? Intro
La veille, c'est quoi ? Introanne.wiener
 
How to Spy on Your Competition
How to Spy on Your CompetitionHow to Spy on Your Competition
How to Spy on Your CompetitionTim Matthews
 
Tech Boom - Beginning or End War Room Slides
Tech Boom - Beginning or End War Room SlidesTech Boom - Beginning or End War Room Slides
Tech Boom - Beginning or End War Room Slideshiddenlevers
 
US Decouples War Room Slides
US Decouples War Room SlidesUS Decouples War Room Slides
US Decouples War Room Slideshiddenlevers
 
Obamacare 1y Anniversary War Room Slides
Obamacare 1y Anniversary War Room SlidesObamacare 1y Anniversary War Room Slides
Obamacare 1y Anniversary War Room Slideshiddenlevers
 
Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!
Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!
Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!VINCIT SPRL - STRATEGY
 
Got Income War Room Slides
Got Income War Room SlidesGot Income War Room Slides
Got Income War Room Slideshiddenlevers
 

Destaque (20)

Business intelligence versus competitive intelligence
Business intelligence versus competitive intelligenceBusiness intelligence versus competitive intelligence
Business intelligence versus competitive intelligence
 
Bi market research tata tcs 2010 08
Bi market research tata tcs 2010 08Bi market research tata tcs 2010 08
Bi market research tata tcs 2010 08
 
Got Oil? - War Room Slides
Got Oil? - War Room SlidesGot Oil? - War Room Slides
Got Oil? - War Room Slides
 
20111216 La réputation de votre entreprise en danger sur le net
20111216 La réputation de votre entreprise en danger sur le net20111216 La réputation de votre entreprise en danger sur le net
20111216 La réputation de votre entreprise en danger sur le net
 
Immigration + US election - June 2016 War Room
Immigration + US election  - June 2016 War RoomImmigration + US election  - June 2016 War Room
Immigration + US election - June 2016 War Room
 
Intelligence de marché, outils et principes
Intelligence de marché, outils et principesIntelligence de marché, outils et principes
Intelligence de marché, outils et principes
 
War Room
War RoomWar Room
War Room
 
Fed Up Fed War Room Slides
Fed Up Fed War Room SlidesFed Up Fed War Room Slides
Fed Up Fed War Room Slides
 
BRICS Hitting Bricks War Room Slides
BRICS Hitting Bricks War Room SlidesBRICS Hitting Bricks War Room Slides
BRICS Hitting Bricks War Room Slides
 
Future of the USD War Room Slides
Future of the USD War Room SlidesFuture of the USD War Room Slides
Future of the USD War Room Slides
 
Pôle d'intelligence d'entreprise - Université de Sherbrooke
Pôle d'intelligence d'entreprise - Université de SherbrookePôle d'intelligence d'entreprise - Université de Sherbrooke
Pôle d'intelligence d'entreprise - Université de Sherbrooke
 
La veille, c'est quoi ? Intro
La veille, c'est quoi ? IntroLa veille, c'est quoi ? Intro
La veille, c'est quoi ? Intro
 
How to Spy on Your Competition
How to Spy on Your CompetitionHow to Spy on Your Competition
How to Spy on Your Competition
 
Tech Boom - Beginning or End War Room Slides
Tech Boom - Beginning or End War Room SlidesTech Boom - Beginning or End War Room Slides
Tech Boom - Beginning or End War Room Slides
 
US Decouples War Room Slides
US Decouples War Room SlidesUS Decouples War Room Slides
US Decouples War Room Slides
 
Corporate espionage
Corporate espionageCorporate espionage
Corporate espionage
 
Obamacare 1y Anniversary War Room Slides
Obamacare 1y Anniversary War Room SlidesObamacare 1y Anniversary War Room Slides
Obamacare 1y Anniversary War Room Slides
 
Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!
Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!
Utilisez intelligemment Google Trends pour VOTRE Market Intelligence!
 
Présentation - atelier War Room
Présentation - atelier War RoomPrésentation - atelier War Room
Présentation - atelier War Room
 
Got Income War Room Slides
Got Income War Room SlidesGot Income War Room Slides
Got Income War Room Slides
 

Semelhante a Csi Netsec 2006 Poor Mans Guide Merdinger

Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
ALA Tech Seminar
ALA Tech SeminarALA Tech Seminar
ALA Tech Seminarmshufeldt
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsB.A.
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networkingtsmithnasd
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011warezjoe
 
Defcon 18 "Hacking Electronic Door Access Controllers"
Defcon 18  "Hacking Electronic Door Access Controllers" Defcon 18  "Hacking Electronic Door Access Controllers"
Defcon 18 "Hacking Electronic Door Access Controllers" shawn_merdinger
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Sergey Gordeychik
 
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Defcon 23 -  Chris Sistrunk - nsm 101 for ics Defcon 23 -  Chris Sistrunk - nsm 101 for ics
Defcon 23 - Chris Sistrunk - nsm 101 for ics Felipe Prado
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Module7 wireless security-b
Module7 wireless security-bModule7 wireless security-b
Module7 wireless security-bBbAOC
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...Felipe Prado
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 

Semelhante a Csi Netsec 2006 Poor Mans Guide Merdinger (20)

Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
ALA Tech Seminar
ALA Tech SeminarALA Tech Seminar
ALA Tech Seminar
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security Solutions
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Introduction To Networking
Introduction To NetworkingIntroduction To Networking
Introduction To Networking
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Day4
Day4Day4
Day4
 
Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011Microcontroller mayhem - ECTF & USSS 2011
Microcontroller mayhem - ECTF & USSS 2011
 
Defcon 18 "Hacking Electronic Door Access Controllers"
Defcon 18  "Hacking Electronic Door Access Controllers" Defcon 18  "Hacking Electronic Door Access Controllers"
Defcon 18 "Hacking Electronic Door Access Controllers"
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
 
Defcon 23 - Chris Sistrunk - nsm 101 for ics
Defcon 23 -  Chris Sistrunk - nsm 101 for ics Defcon 23 -  Chris Sistrunk - nsm 101 for ics
Defcon 23 - Chris Sistrunk - nsm 101 for ics
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Module7 wireless security-b
Module7 wireless security-bModule7 wireless security-b
Module7 wireless security-b
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Csi Netsec 2006 Poor Mans Guide Merdinger

  • 1. Poor Man's Guide To Network Espionage Gear Shawn Merdinger Independent Security Researcher CRT-9 Computer Security Institute NetSec 2006 2006.06.14
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. How far? 802.11b over 125 miles
  • 25.
  • 26.
  • 27.