Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A penetration tester has turned his motorcycle into a wifi war-bike.
His custom Yamaha TRX 850 has been outfitted with wireless sniffing and attack tools, routers, a laptop, Raspberry Pi and even a heads up display (HUD) integrated within the bike helmet.
Denis Andzakovic, a consultant with Security-Assessment.com and co-founder of Auckland-based Stray Rats Custom Motorcycles, modified his wheels to make wardriving a more nimble sport.
"I wanted to combine two things that I really love: Building and riding motorcycles and trashing wireless networks," Andzakovic told delegates at Kiwicon 6.
"The lack of subtlety with [wardriving] is something that really bothered me … you can't exactly park your SUV on the footpath in the middle of the CBD."
Two satchels on both sides of the bike house Mikrotick routerboards, which perform sniffing and attacking functions, hitting both sides of the road as the bike passes.
Each ran OpenWRT and Kismet drones that sniffed packets and sent them to BikeMind, a server running on a Sony Vaio netbook.
A $45 GPS unit plugged into BikeMind and used GISKismet to plot access points on Google Maps.
Dedicated attack and sniffing interfaces allow the two operations to run in tandem, making up for the lack of a keyboard.
On the offensive side, processing scripts on Bikemind communicated with the routerboards. A dedicated attack interface used Python script to operate rogue access points and complicated attacks that could not be easily automated on the routerboards.
Onboard, wireless was used as an access point for easy network administration via Hostapd and dhcp3-server.
A Raspberry Pi, dubbed BikePi, was powered by the netbook and ran a tweaked Kismet into the helmet's HUD which itself ran within modified video glasses.
The rider looking at the HUD saw a packet and data graph which indicated wifi-dense areas ripe for attack.
The entire customised and sleek unit ran off a separate power supply that prevented the bike from running flat.
Andzakovic said the system was designed to be easily adaptable to new software, was cheap to build, and had a long battery life.
SC filmed the presentation below.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.