The 9 Coolest Hacks Of 2009
Digital faces, missile defenses, iPod Touches, and even texting teens all were the subject of extreme hacks
You'd never suspect the iPod Touch in the office as being the intruder. That's why the music player with browser and email access makes a handy covert hacking tool.
Thomas Wilhelm, associate professor of information system security at Colorado Technical University, outfitted the an iPod Touch with Metasploit penetration testing software for exploiting vulnerabilities, a password-cracking app, and a Web app hacking application he downloaded onto the device.
More Security Insights
- The 12 Critical Questions You Need To Ask When Choosing an AD Bridge Solution
- A New Set of Network Security Challenges
"Because of its size and ability to connect back to a more robust attack platform, the iPod Touch can go anywhere and get [penetration testers] into areas where we couldn't before," Wilhelm says. "If I walked into a bank with a laptop, people would be suspicious. If I were to walk in with something like an iPhone, people would accept it. I could hack for hours in a bank or coffee shop, and no one would [suspect]."
Willhelm demonstrated his rigged iPhone Touch at Defcon this summer. He says it's cheaper to use an iPod Touch as a portable hacker than the iPhone because there's no monthly subscription fees attached, and it lets the hacker control which network the device connects to, which is not really possible with the iPhone.