Unusual types of devices and hacking gadgets are not limited to special services and agents. Quite a few devices have been specially designed for the needs of hackers and security researchers. What are they? whats the best hacking gadgets? We decided to put together a real hacker’s suitcase.
The main weapon of a true hacker is his brain. But even the best brains won’t give up on these things. Here are the gadgets that every self-respecting hacker should have.
These hacking gadgets will be especially useful for beginners. Take a pen and write it down!
Mobile pentesting device
Anyone who is seriously involved in pentesting or hacking has probably at least once found themselves in conditions when literally one step was not enough for a successful attack. Kevin Mitnick’s book, The Art of Intrusion, details the story of a penetration test in which a well-configured firewall was an obstacle to inspectors. It would seem that there is no chance to get into the company’s internal network. But one of the team members found a working connector in the receiving area for connecting to the network and discreetly plugged in a miniature wireless access device (which no one paid attention to until the end of the test). Thus, the pentesters team gained direct access to the company’s internal network via WiFi. This is one of many examples to illustrate that you shouldn’t underestimate hacking gadgets or mobile pentesting device . That is why today we will consider the most interesting options that can be purchased on the Web.
The following tools are ideal for any aspiring hacker
Raspberry Pi 4 8GB
The Raspberry Pi is a credit card sized computer that fits easily in your pocket.
Raspberry Pi is one of the hacking gadgets.
The Raspberry PI 4 is a fourth-generation single-board computer. The gadget is slightly larger than a plastic card, but with a lot of ports available. Such as HDMI, DSI, USB 3.0. It is enough to connect a mouse, keyboard, SD card with the installed Linux distribution and supply power via Micro USB. Raspberry can replace the inexpensive office desktop that is often used for media centers and home servers, as well as in other projects ranging from musical instruments to robots. But we are interested in something else: Raspberry can be an ideal system for penetration testing in the field. And there are a great many ready-made cases, displays, batteries and other body kit for them. As well as the software that we can run on them.
- processor Quad core Cortex-A72 (ARM v8) 64-bit SoC @ 1.5GHz
- 2/4 / 8GB LPDDR4-3200 SDRAM memory
- WiFi 2.4 / 5.0 GHz, Bluetooth 5.0, BLE
- Gigabit Ethernet port
- 2 USB 3.0 ports; 2 USB 2.0 ports.
- support for 2 monitors, micro-HDMI connectors (up to 4kp60 resolution)
- H.265 support (4kp60 decode), H264 (1080p60 decode, 1080p30 encode)
The price of this powerful hacker weapon is only $ 35. Its use is in its size. After all, you can take (or shove, for example) the Raspberry PI where you cannot carry your laptop.
There is also a much smaller variant of the Raspberry Pi called the Raspberry Pi Zero.
If you’re looking for a budget Raspberry Pi, then the Raspberry Pi 3B is still a great choice.
Proxmark3
Proxmark III kit is the second hacking gadgets on our list
Proxmark3 remains the best device for attacking contactless cards. It is available in several versions. There are several offers on the market, but the most common, cheapest and most affordable is RDV3. There are also Chinese clones of this device. There is one “but” – this tool is not for beginners. De facto, Proxmark III is an RFID research tool. There are others, but none of them even comes close in terms of prevalence or community support to PM3. The Proxmark III is capable of reading, writing, and even emulating most of the currently available RFID tags, including RFID-compliant payment cards. Do you doubt it? See the firmware on the forum
http://proxmark.org/forum/index.php
Keysy RFID Duplicator
Keysy is an RFID duplicator that can quickly copy RFID key cards and key fobs.
Keysy allows you to copy up to 4 RFID credentials (125 kHz).
Then you can use the RFID credentials by placing the Keysy key fob in front of the tag reader.
Optional rewritable key fobs are sold separately.
PlunderBug
Plunder Bug by Hak5 is a pocket-sized LAN Tap that allows you to detect errors in Ethernet connections using a USB-C type connection.
It combines with cross-platform scripting and has its own rooted Android app.
The Plunder Bug is an intelligent network sniffer that is great for passive recording and active scanning of networks.
It’s small and inconspicuous!
SharkJack hacking gadgets
SharkJack is a portable out-of-the-box network attack tool armed with ultra-fast payloads that provide quick and easy reconnaissance.
SharkJack is ideal for social engineering attacks.
It contains a simple scripting language that makes it easy to load payloads
Shark Jack is ideal for wired network auditing.
HackRF Radio hacking gadgets
The HackRF One is a broadband, software-defined half-duplex radio transmitter with an operating frequency from 1 MHz to 6 GHz. Up to 20 million samples per second.
The HackRF is a unique device designed for the radio enthusiast and hobbyist who is keen on learning about radio signals and everything related to it. At the moment, there are more advanced devices, but HackRF One is one of the best, is the optimal price solution for beginners who want to understand what SDR is.
The device allows not only receiving but also transmitting radio signals in the 1MHz-6GHz range with a bandwidth of up to 20MHz. Unfortunately, HackRF is not a full-fledged radio station, its power is too low and amounts to about 20mW, and the efficiency of a standard antenna is less than 1%.
AURSINC WiFi Deauther Wristband
Aursinc WiFi Deauther is a wristband that has the latest ESP8266 Deauther software installed.
With this software, you can perform various security tests on your Wi-Fi networks.
NOTE: ESP8266 only supports 2.4GHz.
Extensibility: You can also use it to develop your own software.
It is truly an ESP8266 development board, easy to operate.
LONG-TERM WORKING TIME: built-in 600mAh battery, working time up to 7 hours.
Comes with OLED display and snap action 3 position slide switch.
WIFI Pineapple
This is a set for MITM attacks on wireless networks perfected. WiFi Pineapple is a real harvester that was invented by cunning Americans, who modified the OpenWRT firmware specifically for it and literally stuffed it with a variety of utilities and programs for hacking and intercepting information in wireless networks. The capabilities of the device are really impressive.
Ubertooth one
Ubertooth One is a 2.4GHz wireless research platform for Bluetooth experimentation. Thanks to the powerful LPC175x ARM Cortex-M3 processor, the capabilities of the device significantly exceed the capabilities of a conventional adapter, allowing you to intercept and monitor, jam, or even change the signal from other devices. It is a fully open source platform with a mature ecosystem.
LAN Turtle
The LAN Turtle is a tiny network penetration implant disguised as a USB to Ethernet adapter. Easy configuration with built-in graphical shell and deployment of payloads such as DNS poisoning attacks, MITM attacks, network scanning, VPN tunneling, and more. Oh yes, it all works remotely, directly over 3G.
Yard Stick one car hacking gadgets
If you have tried to unlock your car by repeating the unlock signal, you will probably appreciate this device. The Yard Stick One allows you to send and receive traffic on popular frequencies (up to 1 GHz). Its distinguishing feature is the use of the CC1111 chip, which allows hardware demodulation or modulation of the signal, which improves the quality of reception and transmission. To work with the Yard Stick, you need to install the free RFCat utility . Still in doubt? In 2018, researchers showed how they hijack a Tesla Model S using the Raspeberry PI, Yard Stick One, and Proxmark III. Even if you can’t open it, you can always drown it.
WiFi hacking gadgets
Which WiFi adapter is suitable for hacking?
In general, it is capable of switching to monitoring mode and performing network packet injection. Whether it is or not depends on the chip on which the adapter is built and its driver. For the best monitor mode wifi adapter check this list: Kali Linux wifi adapter