Replicating NSA's gadgets using open source
by Zeljka Zorz - Managing Editor - Monday, 9 June 2014.
One peek at the leaked pages of NSA's ANT catalog made wireless security researcher Michael Ossmann's mind start spinning.

"Could we - could I - make the gadgets that the agency uses to monitor and locate mobile phones, tap USB and Ethernet connections, maintain persistent malware on PCs, communicate with malware across air gaps, and more, by just using open source software and hardware?" he asked himself.

So, he decide to look into the matter, and what he concluded is that it's definitely possible to replicate most of those tools and their functionalities.

In this podcast recorded at Hack In The Box Amsterdam 2014, he shares his insights on what to use - and how - to duplicate hardware devices found in the ANT catalog.

Press the play button below to listen to the podcast:



Note: While the podcast covers just a part of what he shared with the HITB conference crowd, his presentation slides will help you follow the conversation.

Michael Ossmann is a wireless security researcher who makes hardware for hackers. Best known for the open source HackRF, Ubertooth, and Daisho projects, he founded Great Scott Gadgets in an effort to put exciting, new tools into the hands of innovative people.

Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //