A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Driver-less Wireless Devices - Dominic Spill & Dragorn (Defcon Wireless Village 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)

Driver-less Wireless Devices - Dominic Spill & Dragorn

Setting up wireless devices on multiple platforms for penetration tests or research can be a minefield of driver issues. We propose a new implementation using cheap, widely available hardware to present a single, unified interface for tools to use, no matter on which platform they run. We will also attempt to take advantage of special classes of device to allow driver-less operation from userspace on multiple platforms such as Android, Windows, and OSX.

Bio: Dominic Spill has been building packet sniffers and researching wireless security since 2007. He has been the lead developer for Ubertooth for the past two years while also working on Daisho, FCC.io and now USBProxy.

Mike Kershaw, aka Dragorn, is the author of Kismet and other open-source wireless security tools, and is the Chief Architect at Blackphone.

Back to Defcon Wireless Village 2014 (Defcon 22) video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast