As always its just the mater of finding the time, but I've been working on the OS detection, disabling UAC and firewall side of things first and made good progress, after that it's a walk in the park.
Haha, simple answer, get your hands on another AP, plug into Ethernet and detach the antenna of the Netgear.
You could use airdrop-ng, ettercap, ip/port forwarding etc to do all kinds of things, but sometimes the simplest answer is the best.
I've been thinking about this also, is it as simple as hitting the left arrow key and enter?
I'm not personally fussed about what happens on screen at this stage, but the more stealth the better!
One of the things I'm going to look at later.
Later on down the line I think we should come up with some form of standard LED payload notification, maybe something along the lines of:
Green blinking: working
Solid green: payload executed
Solid red: payload failed (write to log)
If anyone else can think of any other states please add to this and I'll get the ball rolling.
How we go about this is another mater, I've a few ideas.
I've been working on several ideas on identifying the OS, killing the firewall, AV (if possible) and installing persistent reverse metasploit payloads (especially -x msfencoded ones) from a remote server using the teensy.
I'm just waiting to get my teensy as I'm in the UK and will post more on the wiki once I have fully tested my code.
If anyone else has been working on something similar please let me know!
That'll get caught by the firewall on Vista/7 machines, we need a way to disable the firewall and try to kill AV first, the metasploit script getcountermeasure is a good place to start.
Dell Studio XPS 16. I had one up until a month or so ago and it was great. I only sold it due to the Alienware m11x coming out and I did not need a large screen any more.
The only issue for you is that it has ATI 4670 graphics.