Jump to content

GPD Pocket hack-top


OPS32

Recommended Posts

  • 2 months later...
On 1/9/2017 at 6:11 PM, OPS32 said:

The GPD pocket seems like a perfect hack-top for concealing and undercover pen testing

https://medium.com/@tomac/qpd-pocket-7-the-return-of-the-hacker-netbook-fe9be1b02ebf

There's a fully automated ansible playbook there for setting up Kali (since it's Debian based.)

https://github.com/cawilliamson/ansible-gpdpocket

 

Have you tested the ansible playbook yourself? Also, have a look here: https://forums.kali.org/showthread.php?38253-Kali-on-GPD-Pocket-7-the-world-s-smallest-full-featured-laptop&s=6f947c0e8b20c3ff23f6dc3a72cdbfca

Link to comment
Share on other sites

Why do people always insist on using devices that allow GUIs? Never understood that, it's skiddie stuff.

Take the time to set up scripts on a device like an RPi and simply call them from a mobile phone via SSH. Or use an SSH app on your phone if you require a command to be sent that isn't scripted.

GUIs are lovely in the lab, I wouldn't bother on the go. Besides, which fits in your pocket  and can be used un-noticed; an RPi or a laptop?

Link to comment
Share on other sites

1 hour ago, haze1434 said:

Why do people always insist on using devices that allow GUIs? Never understood that, it's skiddie stuff.

Take the time to set up scripts on a device like an RPi and simply call them from a mobile phone via SSH. Or use an SSH app on your phone if you require a command to be sent that isn't scripted.

GUIs are lovely in the lab, I wouldn't bother on the go. Besides, which fits in your pocket  and can be used un-noticed; an RPi or a laptop?

Wireshark is a pain in the ass without a gui.  This little laptop has a little more horsepower than a pi as well.

Link to comment
Share on other sites

12 hours ago, barry99705 said:

Wireshark is a pain in the ass without a gui.  This little laptop has a little more horsepower than a pi as well.

True that.

I personally feel that pentesting 'out in the field' should be a grab-n-go type endeavour.

Usually it's best to do some recon using some scripts that implement tshark/whatever you require and then go back to the lab and use this info to create some more scripts.

Then all one has to do is turn up, run a script or 2 in a few seconds/minutes and then make like a banana.

No one is going to suspect that the guy that just walked past is a pentester, compared with the guy that's sitting nearby with a little laptop, typing away frantically.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...