[LINK] The Power Pwn Powerboard
stephen at melbpc.org.au
stephen at melbpc.org.au
Sat Jul 28 22:34:18 AEST 2012
Care to buy a well-disguised DARPA 'network tester'..
http://pwnieexpress.com/products/power-pwn
"Power Strip's a Penetration Testing Tool in Disguise"
Advanced penetration testing product maker Pwnie Express has unveiled a
new tester that looks just like a power strip. (Pwnie Express is funded
by DARPA, http://www.darpa.mil)
By Richard Adhikari
LinuxInsider 07/24/12 5:00 AM PT
http://www.linuxinsider.com/rsstory/75706.html
The Power Pwn is a fully integrated enterprise-class device that can be
used over Ethernet, wireless or Bluetooth connections.
It is priced at US$1,300 and is currently available for pre-order.
The Power Pwn "is similar to a 1.2 GHz ARM-based processor running
Linux," M. Anthony Hughes, customer development manager, told
LinuxInsider. It runs well-known open source tools including MetaSploit.
Pwnie Express is funded by DARPA, but Hughes declined to disclose further
details of its funding because it's a private company.
My Little Pwnie
The Power Pwn has fully functional 120/240v AC sockets. It comes with 16
GB of internal disk storage and onboard dual-Ethernet ports. It can be
used with high-gain 802.11b/g/n wireless services or with high-gain
Bluetooth, the latter at a range of up to 1,000 feet.
It also has a fully automated NAC/802.1x RADIUS bypass; out-of-band SSH
access over 3G and GSM cell networks; and an unlocked external 3G/ GSM
adapter. The 3G/GSM adapter is compatible with SIM cards from AT&T,
Vodafone, Orange and GSM carriers in more than 160 countries.
Users can text in Bash commands through SMS.
The Power Pwn maintains persistent, covert, encrypted SSN access to
target networks.
It tunnels through application-aware firewalls and intrusion-prevention
systems. It supports HTTP proxies and SSH-VPN. It is said to be
unpingable, and it has no listening ports in stealth mode.
The Power Pwn comes preloaded with Debian 6, Metasploit, SET, Fast-Track,
Aircrack and other tools.
"The tools on it are all open source, well known tools," Pwnie Express'
Hughes said.
The Power Pwn has a graphical user interface (GUI) that's used to
configure it to a qualified domain name or a public IP address on a
receiver station, either over Ethernet or wireless or 3G. It can be
managed over the UI or through a command line, Hughes said.
A Double-Edged Sword
Once the Power Pwn is deployed, if it engages network access control and
runs in stealth mode, it is essentially undetectable, "but we would hope
that people would be able to walk around, look around, and question
things in the environment," said Hughes. User education is key.
That difficulty of detection makes the Power Pwn a two-edged sword and
has raised fears about its being a useful tool for hackers.
"It is a tool meant for legitimate pen testers, obviously," Bob Walder,
chief research officer at NSS Labs, told LinuxInsider. But if it's
surreptitiously installed for malicious purposes, it "could provide
access to the corporate network from outside the building."
"The comment about the product getting in the wrong hands or someone
using it for malicious purposes is something we hear a lot," Hughes
sighed.
On the other hand, "virtually any technology that can be used for good
can be used for bad," Randy Abrams, research director at NSS Labs,
pointed out. "The device is not the threat -- the existing
vulnerabilities are the threat."
Tracking the Pwnie
While clever installation will minimize the risk that the Power Pwn will
be discovered, it's not quite invisible, NSS Labs' Walder said. "Good
monitoring or SIEM tools will provide an indication that something bad's
happening on the corporate network and allow detection or blocking or
remediation of its actions."
At the very least, "a high-gain Bluetooth signal will stick out like a
sore thumb if you monitor for such things," NSS Labs' Abrams told
LinuxInsider.
Still, if the use of the tool should become widespread, "companies would
theoretically be able to identify and plug vulnerabilities," Abrams
said. "This would make the hacker's job more difficult, but not
impossible. Security is risk management, not risk
elimination."
Message sent using MelbPC WebMail Server
More information about the Link
mailing list