|
|
|
![]() |
|
|||||||
|
||||||||
![]() |
|
|
Thread Tools | Rate Thread | Display Modes |
|
|
|
#1
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Where the Metasploit bit gets really interesting is the ability to reboot systems without authentication. With the amount of stuff that uses vx-works to run it is a little worrying what could possibly be done if someone hacked into a network.
A few wikipedia examples: Robots BMW iDrive 787 and 747-8 Planes WRT54G Router Apache Longbow Attack Helicopter Lots of spacecraft. Someone with the wrong motives could add something to get into a network (say of an Apache) and reboot it putting its operators or others in danger. |
|
#2
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Have fun breaking WPA2 encryption in 3 days. (You can't.)
|
|
#3
|
||||
|
||||
|
Re: cRio + Metasploit = :D
You could, but first you have to prove P = NP.
|
|
#4
|
||||||
|
||||||
|
Re: cRio + Metasploit = :D
I think if someone was able to walk up to an Apache Helicopter and plug a network cable in, undetected, the Army has much bigger problems then a single Apache being rebooted in flight.
|
|
#5
|
|||||
|
|||||
|
Re: cRio + Metasploit = :D
Quote:
The Predator drone used an unencrypted communication protocol so ground troops could view the video on portable video receivers. They never counted on anyone else "flipping through the channels", and then googling how to fix a scrambled video feed. The lesson? NEVER rely on security through obscurity. |
|
#6
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Quote:
|
|
#7
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Quote:
If the insurgents are close enough to the apache, why aren't they dead? Anyways..... |
|
#8
|
||||
|
||||
|
Re: cRio + Metasploit = :D
Quote:
And I thought WPA could be broken rather quickly if you see the handshake between the client and the host. Or does that only apply to WPA(1) not WPA2? The Apache was just a random example, a disgruntled worker may be able to get into a cRio that would normally require authorization without it and cause a massive system to malfunction etc. With the number of things that run on it, anyone from a double agent to a disgruntled employee could cause issues. Last edited by Trent B : 28-08-2010 at 01:53. |
|
#9
|
|||||
|
|||||
|
Re: cRio + Metasploit = :D
It's true for WPA2 also, but neither of them are quickly. You'd either have to brute force or run a dictionary/wordlist attack.
|
![]() |
| Thread Tools | |
| Display Modes | Rate This Thread |
|
|
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| cRio | tomy | Kit & Additional Hardware | 7 | 09-12-2009 06:56 |
| Reimaging the cRio Issues there are no cRio devices on the subnet | Stuart | FRC Control System | 2 | 25-02-2009 23:41 |
| crio | andturn | FRC Control System | 4 | 06-02-2009 11:18 |
| cRIO buzzing | furiousgeorge | FRC Control System | 10 | 30-01-2009 00:15 |
| cRIO feedback | Maxpower57 | C/C++ | 2 | 08-01-2009 19:06 |