Dailydave mailing list archives

Re: Slashback!


From: Kurt Grutzmacher <grutz () jingojango net>
Date: Mon, 16 Jan 2006 08:45:08 -0800

I was under the impression that the Shmoo variant was a Linksys router rather than a laptop with modified MadWIFI drivers. If true, that's a cool hack.

We've been using Karma ever since I saw it at CanSec last year but I guess nobody can do media hype like Shmoo can!


H D Moore wrote:

The short story: Simple Nomad worked on this independently of Dino/K2 and didn't realize they covered the same area. KARMA was covered at Dave's thing, Bluehat, CanSec, and PacSec prior to the SN's Shmoocon talk, but apparently most "security" folks didn't pick up on this (most people I have mentioned it to seemed unaware at least). SN did give credit in his presentation, but the media coverage seems to ignore this point.
-HD


On Sunday 15 January 2006 08:49, Dave Aitel wrote:
How does this: http://it.slashdot.org/it/06/01/15/0815207.shtml An anonymous reader writes *"Washingtonpost.com is reporting from the
2nd annual Shmoocon hacker conference about the release of a previously
undocumented vulnerability in...

Differ from this:
KARMA is a set of tools for assessing the security of wireless clients
at multiple layers. Wireless sniffing tools discover clients and their
preferred/trusted networks by passively listening for 802.11 Probe
Request frames.


Current thread: