All Posts Tagged Tag: ‘Hardware Backdoor’

  • Kali Iso Of Doom2

    Kali Linux ISO of Doom

    In our last blog post, we provided an example of running an unattended network installation of Kali Linux. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment using OpenVAS and the Metasploit Framework.

    Read More →
  • Peensy Post

    Advanced Teensy Penetration Testing Payloads

    In one of our recent engagements, we had the opportunity to test the physical security of an organization. This assessment presented an excellent scenario for a USB HID attack, where an attacker would stealthily sneak into a server room, and connect a malicious USB device to a server with logged on console, thus compromising it. From here, the “Peensy” (Penetration Testing Teensy?) was born.

    Read More →