Wednesday, October 23, 2013

The hard part is (almost) done!

The good news is, after I cooked a Pi, I was able to get a new one overnighted, and began work on that.  The changes that took place in the interim were small, yet drastic.  I moved the vulnerability scanner over to a virtual machine, no longer on the Pi, and I switched from OpenVAS to Nessus for the sake of simplicity.  Once the new Pi came in, everything began working very well.  The upgrade to 512mb of RAM seems to helping substantially.

All of my scripts are written, and all seem functional at least on some level.  There is still some fine-tuning left to go, but the hard work is mostly behind me, thanks to a 24 hour over 3 day scripting session.  I am still planning on adding in SSLStrip, and possibly encryption on the SD card.  Encrypting the SD card will make the device painfully slow, but it will also make it almost completely untouchable from the forensic point of view.  Ironically, the only non-functional script is my menu that calls my other scripts, I'm still in the process of troubleshooting that one.  Finally, I am planning to add in a program that was suggested by the guys at PWNie Express, zram.  Zram apparently effectively triples your RAM through some intense, high speed usage of swap space.

My final paper has been started, and will be worked on throughout the next few weeks, as I have a rough draft due in about two weeks.  From here on out, it should be just some smooth sailing and some basic script work until this project will be completed, and likely completely available on github.

Thanks
-DJ

No comments:

Post a Comment