Communications of the ACM - Spyware
Networking Recon: Network reconnaissance
Network Security
Attack Vectors to Metering Data in Smart Grids under Security Constraints
COMPSACW '12 Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops
Targeted Cyberattacks: A Superset of Advanced Persistent Threats
IEEE Security and Privacy
Hi-index | 0.00 |
The development of miniaturized, inexpensive, fully functional computers has opened up new opportunities for a pentester. A device approximately the length and width of a credit card and only a couple inches high, is capable of running a version of the GNU/Linux operating system, which makes the access to many tools such as network mappers and exploitation frameworks possible. Due to its size, the device can be hidden inside a building and attached to the network for as long as it has power, affording a great advantage to an attacker. In this paper, we attempt to explore different attack vectors facilitate by miniaturized computers and identify their feasibilities. We also make recommendations of countermeasures to the potential attacks launched through miniaturized computers.