View Single Post
  #1   Spotlight this post!  
Unread 28-08-2010, 01:50
Trent B Trent B is offline
College Mentor
AKA: Trent Borman
no team (Surviving Grad School)
Team Role: Alumni
 
Join Date: Dec 2008
Rookie Year: 2008
Location: Ames, IA
Posts: 479
Trent B is a splendid one to beholdTrent B is a splendid one to beholdTrent B is a splendid one to beholdTrent B is a splendid one to beholdTrent B is a splendid one to beholdTrent B is a splendid one to beholdTrent B is a splendid one to beholdTrent B is a splendid one to behold
Send a message via AIM to Trent B Send a message via Yahoo to Trent B
Re: cRio + Metasploit = :D

Quote:
Originally Posted by Joe Ross View Post
I think if someone was able to walk up to an Apache Helicopter and plug a network cable in, undetected, the Army has much bigger problems then a single Apache being rebooted in flight.
I am not saying that someone walks in off the street into a base. What if someone in the assembly line or a mechanic for the army is really a double agent. I guess there are bigger problems to worry about at that point but it could still be costly.

And I thought WPA could be broken rather quickly if you see the handshake between the client and the host. Or does that only apply to WPA(1) not WPA2?

The Apache was just a random example, a disgruntled worker may be able to get into a cRio that would normally require authorization without it and cause a massive system to malfunction etc. With the number of things that run on it, anyone from a double agent to a disgruntled employee could cause issues.
__________________
Former 2502 (Talon) Captain and 3928 (Neutrino) Mentor, currently teamless and attending Penn State for graduate school.
Have questions about Iowa State University or Penn State University? Feel free to email or PM me

Last edited by Trent B : 28-08-2010 at 01:53.