Er is wel wat aan vooraf gegaan, zoals een mislukte poging met een achtergelaten usb stick. Die wel gebruikt werd door een security guard, maar 'Darlene' had een simpele exploit gedownload ipv zelf geschreven wegens tijdgebrek. Ze word door Elliot dan ook voor 'script kiddie' uitgemaakt
Heb het even opgezocht:
"But while facing defeat, Elliot spots a new Bluetooth connection in the network when a patrol car drives up that is using a Bluetooth connected keyboard. Every Bluetooth device has a MAC address, which is a unique hardware identification number.
Elliot uses a variety of Linux application to learn the MAC address of the Bluetooth keyboard and he “spoofs” this ID to his own Bluetooth keyboard dongle. This allows him to transmit from his Bluetooth device to the laptop in the squad car and the laptop believes that the keystrokes are coming from the authorized keyboard that it had previously been paired with.
“The greater vulnerability in this scene is the patrol laptop,” said Bazzell. “In this scene, the laptop in the vehicle is not a stand-alone device used only for word processing. It is networked via static, always on, cellular data connection. This is almost always the case.”
This means that by gaining access to the laptop in the car with his Bluetooth keyboard, Elliot also gains access to the prison’s network. Once in control of the computer, Elliot opens a command prompt, connects to his FTP server that contains the exploit, and downloads the exploit to the patrol laptop, which starts an attack against the network that laptop is connected to."
Dat ie vervolgens doodleuk staat te wachten bij 't hek van de gevangenis, meh zou ik in het echt niet doen.
[Reactie gewijzigd door echtwaarisdatzo op 24 juli 2024 00:42]