During my normal, everyday, perusal of information security topics I happened to come across some of David Maynor’s previous research when he used to work for ISS:
“You Are The Trojan” – Toorcon 2005 – Presentation Link
In the above presentation David show us how you can take advantage of reverse DMA mapping to execute exploits via the USB bus. At a more recent conference, Shmoocon 2006, this concept was further explored in:
“Cardbus Bus-Mastering: 0wning the Laptop ” by David Hulton (Unfortunately, no presentation or video has been posted).
I won’t speculate, okay so maybe I will. Could they be using similar techniques to achieve 0wnage with wireless drivers? If so, how do you prevent this?
It also looks as though Johnny “cache” has done some very interesting research as well:
“802.11 Wireless VLANs” – Toorcon 2005 – Presentation Link
It most likely is unrelated, but is interesting none the less.

About the author

Paul Asadoorian is the Founder & CEO of Security Weekly, where the flagship show recently re-titled "Paul's Security Weekly" has been airing for over 8 years. By day he is the Product Evangelist for Tenable Network Security. Paul produces and hosts the various shows here at Security Weekly, all dedicated to providing the latest security news, interviews with the industries finest and technical how-to segments. Paul is also the founder and host of "The Stogie Geeks Show", featuring cigar reviews for cigar enthusiasts.