plourde
|
2014-12-18
, 18:28
|
Posts: 69 |
Thanked: 50 times |
Joined on Mar 2012
|
#1
|
The Following User Says Thank You to plourde For This Useful Post: | ||
|
2014-12-19
, 15:40
|
Posts: 1,163 |
Thanked: 1,873 times |
Joined on Feb 2011
@ The Netherlands
|
#3
|
|
2014-12-19
, 16:00
|
Posts: 1,808 |
Thanked: 4,272 times |
Joined on Feb 2011
@ Germany
|
#5
|
|
2014-12-19
, 16:16
|
Posts: 69 |
Thanked: 50 times |
Joined on Mar 2012
|
#6
|
|
2014-12-19
, 19:58
|
Posts: 1,808 |
Thanked: 4,272 times |
Joined on Feb 2011
@ Germany
|
#7
|
Thanks for your reply. I have tried to figure this out. Hence on why I am asking in here. I tried to do my homework. I am a journeyman carpenter who enjoys computers not a tech or an ethical hacker. I am not lazy I'm just not smart at this......
|
2014-12-20
, 17:00
|
Posts: 69 |
Thanked: 50 times |
Joined on Mar 2012
|
#8
|
Sorry for the unhelpful answer
I happen to be compiling a kernel right now (for my laptop, not for the N900), so I spotted the CONFIG_USB_OTG (USB on-the-go) option. I imagine that's where the protocol takes place. Meaning that at least there one would be able to manipulate how the N900 presents itself to a USB host.
I suffer severe lack of time but I'll add this to my list. I just have to find the damned list first
Good luck!
The Following User Says Thank You to plourde For This Useful Post: | ||
|
2014-12-20
, 20:37
|
Posts: 1,808 |
Thanked: 4,272 times |
Joined on Feb 2011
@ Germany
|
#9
|
The Following User Says Thank You to reinob For This Useful Post: | ||
|
2015-01-05
, 01:05
|
Posts: 69 |
Thanked: 50 times |
Joined on Mar 2012
|
#10
|
The Following User Says Thank You to plourde For This Useful Post: | ||
Tags |
attack, maemo, n900!, nethunter, pentesting |
|