After seeing some guys at Shmoocon 2010 with a neat Jasager BackTrack setup I thought I would go about creating a Mind Map on how to set this up.
So, I sat down with Robin Wood aka DigiNinja, the creator of Jasager for the day to go through how to set this up.
If you are new to Jasager be sure to read the original project pages to see what it can do.
Also, check out a recent Hak5 episode that shows Darren from Hak5 doing the Airport WiFi challenge.
This Mind Map takes you through how to create a cool Man in the Middle WiFi solution using a default install of both Jasager and BackTrack 4.
The Jasager responds to all WiFi probe requests and then the BackTrack 4 device allocates an IP address from its DHCP server and enables onwards routing to the Internet via a 3G modem or WiFi connection.
I built my solution using a Fon+ and an EeePC 900 running BackTrack 4. I have used both my 3G card and also my MiFi to provide onwards Internet. The solution works great and I have been able to do some fantastic demonstrations with this set up.
Click Here to Download the Mind Map and please let me now if you have any comments, good or bad.
It has been far too long since I last posted a Mind Map.
I have recently started the Pentesting with Backtrack (PWB) online course from Offensive Security and I plan to sit the associated exam.
Therefore I thought it would be a great idea to create some more Mind Maps for some of the security tools covered on the PWB course.
So, here is my first of many Mind Maps.
This Mind Map is covering NetCat http://sverigeapotek.se/. NetCat is sometimes referred to as a network swiss army tool. It allows you to listen and redirect input and output to TCP and UDP ports.
Take a look at the Mind Map but the best way to learn this tool is to get a few machines hooked together and play.
Apologies for been away too long and I will ensure that I get some more Mind Maps online as they are created.
We have just uploaded the next Mind Map in our CEH series of Mind Maps.
This is the Mind Map covering Module 6 of the Certified Ethical Hacker, Trojans and BackDoors.
In This Mind Map we cover what Trojans are, how they propagate and also the most common types of Trojans that make up part of the CEH syllabus.
Trojans are a key topic to understand as part of your CEH study or general security knowledge. They have been a major issue in the security arena for quite a few years and have caused a lot of financial security breaches as well as mischief on industry.
Follow this link to download the Mind Map and please comment on this post to let me know any suggestions you may have on how to improve these Mind Maps.
Just returned from my holiday and just completed the next installment for the CISSP Mind Maps.
This Mind Map is for the CISSP Law, Investigation, and Ethics module of the CISSP common body of knowledge. This covers the mainly US laws that are tested on the exam as well as the ISC2 code of ethics that you do get asked about and as a CISSP, are expected to withhold.
Download the Mind Map directly from here and as usual, please comment on this post and let me know your thoughts..