Shared publicly  - 
I remember the first time I saw those power plug Linux boxes and imagined using one for hacking -- the difference is, this guy did it, very successfully:
Daniel Devine's profile photoMichael Babcock's profile photo
This is kinda cool. What bugs me is that the only thing someone would need to do to protect against something like this is to use mac filtering or shut off the port until a device is necessary. If it's the type of jack that requires multiple, potentially different devices, then it's inherently insecure to begin with; and by nature, knowing what the the jack is for, renders pen testing pointless.

The point is, hire guys who know how to secure a network and build it right, right from the beginning. I would only use this device as a toy.
Out here in the real world of business networks, companies are loathe to even pay for the hardware that can't do MAC filtering. Actual network security is rare.
Add a comment...