The Little Phone That Could Ch-Ch-Chroot

06/17/2019
by   Jack Whitter-Jones, et al.
0

Security testing has been a career path that many are beginning to take. In doing so, security testing can hit the realms of many different types of engagements, ranging from web, infrastructure and social engineering. With the risk of sabotage, corporate espionage it has been seen that many organisations are beginning to develop a tactical capability. In doing so, the term 'Red Team' has been coined to market such engagements. Red Teaming is the method of having almost free reign towards a target. By doing such an engagement a target will be able to fully understand the breadth of vulnerabilities facing their organisation. However, Red Teaming can be an expensive and resource intensive task. Through this paper, it is discussed that it is possible to make a covert disposable phone to help aide Red Teamer's with the reconnaissance phase without drawing attention to themselves within a day to day task.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/25/2020

HARMer: Cyber-attacks Automation and Evaluation

With the increasing growth of cyber-attack incidences, it is important t...
research
08/08/2023

FLIRT: Feedback Loop In-context Red Teaming

Warning: this paper contains content that may be inappropriate or offens...
research
08/23/2022

Red Teaming Language Models to Reduce Harms: Methods, Scaling Behaviors, and Lessons Learned

We describe our early efforts to red team language models in order to si...
research
11/24/2012

Modeling problems of identity in Little Red Riding Hood

This paper argues that the problem of identity is a critical challenge i...
research
07/30/2022

'PeriHack': Designing a Serious Game for Cybersecurity Awareness

This paper describes the design process for the cybersecurity serious ga...
research
03/11/2020

Passlab: A Password Security Tool for the Blue Team

If we wish to compromise some password-protected system as an attacker (...
research
10/20/2020

A Benchmark for Lease Contract Review

Extracting entities and other useful information from legal contracts is...

Please sign up or login with your details

Forgot password? Click here to reset