![]() |
2007-09-05
, 20:03
|
Posts: 3,401 |
Thanked: 1,255 times |
Joined on Nov 2005
@ London, UK
|
#2
|
![]() |
2007-09-05
, 20:46
|
|
Posts: 729 |
Thanked: 19 times |
Joined on Mar 2007
|
#3
|
The Following User Says Thank You to iball For This Useful Post: | ||
![]() |
2007-09-05
, 21:10
|
|
Posts: 641 |
Thanked: 27 times |
Joined on Apr 2007
|
#4
|
Old news. Again. I think we all know that all this "CANVAS" thing happens to be is a GUI frontend to a slew of command-line utilities (nmap, aircrack/airsnort, Metaspolit framework, etc.).
And it's nothing compared to the ~$25,000 monster from Fluke.
I used to have one of those at work and it was GREAT at network troubleshooting, be it wired, wireless (a/b/g/n), or fiber.
Real network admins use Fluke devices and a Linux box.
![]() |
2007-09-06
, 16:31
|
|
Posts: 14 |
Thanked: 2 times |
Joined on Aug 2007
@ Virginia
|
#5
|
Old news. Again. I think we all know that all this "CANVAS" thing happens to be is a GUI frontend to a slew of command-line utilities (nmap, aircrack/airsnort, Metaspolit framework, etc.).
And it's nothing compared to the ~$25,000 monster from Fluke.
I used to have one of those at work and it was GREAT at network troubleshooting, be it wired, wireless (a/b/g/n), or fiber.
Real network admins use Fluke devices and a Linux box.
As if we didn't have enough cause to be paranoid about WiFi hacking, Justine Aitel has worked out a way to do it completely automatically -- your ports will never be safe again. Justine's Immunity Inc. has developed a tool it calls Silica, which runs a custom version of CANVAS, Immunity's point-and-click attack tool, on a Nokia 770:
http://www.engadget.com/2007/02/09/s...od-at-its-job/