Best hacking gadgets for security researchers
2021-2-28 13:36:30 Author: kalitut.com(查看原文) 阅读量:13 收藏

Unusual types of devices and hacking gadgets are not limited to special services and agents. Quite a few devices have been specially designed for the needs of hackers and security researchers. What are they? whats the best hacking gadgets? We decided to put together a real hacker’s suitcase.

Best hacking gadgets

The main weapon of a true hacker is his brain. But even the best brains won’t give up on these things. Here are the gadgets that every self-respecting hacker should have.

These hacking gadgets will be especially useful for beginners. Take a pen and write it down!

Mobile pentesting device

Anyone who is seriously involved in pentesting or hacking has probably at least once found themselves in conditions when literally one step was not enough for a successful attack. Kevin Mitnick’s book, The Art of Intrusion, details the story of a penetration test in which a well-configured firewall was an obstacle to inspectors. It would seem that there is no chance to get into the company’s internal network. But one of the team members found a working connector in the receiving area for connecting to the network and discreetly plugged in a miniature wireless access device (which no one paid attention to until the end of the test). Thus, the pentesters team gained direct access to the company’s internal network via WiFi. This is one of many examples to illustrate that you shouldn’t underestimate hacking gadgets or mobile pentesting device . That is why today we will consider the most interesting options that can be purchased on the Web.

The following tools are ideal for any aspiring hacker

Raspberry Pi 4 8GB

Raspberry Pi hacking gadgets

The Raspberry Pi is a credit card sized computer that fits easily in your pocket.

Raspberry Pi is one of the hacking gadgets.

The Raspberry PI 4 is a fourth-generation single-board computer. The gadget is slightly larger than a plastic card, but with a lot of ports available. Such as HDMI, DSI, USB 3.0. It is enough to connect a mouse, keyboard, SD card with the installed Linux distribution and supply power via Micro USB. Raspberry can replace the inexpensive office desktop that is often used for media centers and home servers, as well as in other projects ranging from musical instruments to robots. But we are interested in something else: Raspberry can be an ideal system for penetration testing in the field. And there are a great many ready-made cases, displays, batteries and other body kit for them. As well as the software that we can run on them.

  • processor Quad core Cortex-A72 (ARM v8) 64-bit SoC @ 1.5GHz
  • 2/4 / 8GB LPDDR4-3200 SDRAM memory
  • WiFi 2.4 / 5.0 GHz, Bluetooth 5.0, BLE
  • Gigabit Ethernet port
  • 2 USB 3.0 ports; 2 USB 2.0 ports.
  • support for 2 monitors, micro-HDMI connectors (up to 4kp60 resolution)
  • H.265 support (4kp60 decode), H264 (1080p60 decode, 1080p30 encode)

The price of this powerful hacker weapon is only $ 35. Its use is in its size. After all, you can take (or shove, for example) the Raspberry PI where you cannot carry your laptop.

There is also a much smaller variant of the Raspberry Pi called the Raspberry Pi Zero.
If you’re looking for a budget Raspberry Pi, then the Raspberry Pi 3B is still a great choice.

Proxmark3

proxmark3

Proxmark III kit is the second hacking gadgets on our list
Proxmark3 remains the best device for attacking contactless cards. It is available in several versions. There are several offers on the market, but the most common, cheapest and most affordable is RDV3. There are also Chinese clones of this device. There is one “but” – this tool is not for beginners. De facto, Proxmark III is an RFID research tool. There are others, but none of them even comes close in terms of prevalence or community support to PM3. The Proxmark III is capable of reading, writing, and even emulating most of the currently available RFID tags, including RFID-compliant payment cards. Do you doubt it? See the firmware on the forum

http://proxmark.org/forum/index.php

Keysy RFID Duplicator

Keysy RFID Duplicator

Keysy is an RFID duplicator that can quickly copy RFID key cards and key fobs.
Keysy allows you to copy up to 4 RFID credentials (125 kHz).
Then you can use the RFID credentials by placing the Keysy key fob in front of the tag reader.
Optional rewritable key fobs are sold separately.

PlunderBug

PlunderBug

Plunder Bug by Hak5 is a pocket-sized LAN Tap that allows you to detect errors in Ethernet connections using a USB-C type connection.
It combines with cross-platform scripting and has its own rooted Android app.
The Plunder Bug is an intelligent network sniffer that is great for passive recording and active scanning of networks.
It’s small and inconspicuous!

SharkJack hacking gadgets

SharkJack hacking gadgets

SharkJack is a portable out-of-the-box network attack tool armed with ultra-fast payloads that provide quick and easy reconnaissance.
SharkJack is ideal for social engineering attacks.
It contains a simple scripting language that makes it easy to load payloads
Shark Jack is ideal for wired network auditing.

HackRF Radio hacking gadgets

HackRF Radio hacking gadgets

The HackRF One is a broadband, software-defined half-duplex radio transmitter with an operating frequency from 1 MHz to 6 GHz. Up to 20 million samples per second.

The HackRF is a unique device designed for the radio enthusiast and hobbyist who is keen on learning about radio signals and everything related to it. At the moment, there are more advanced devices, but HackRF One is one of the best, is the optimal price solution for beginners who want to understand what SDR is.

The device allows not only receiving but also transmitting radio signals in the 1MHz-6GHz range with a bandwidth of up to 20MHz. Unfortunately, HackRF is not a full-fledged radio station, its power is too low and amounts to about 20mW, and the efficiency of a standard antenna is less than 1%.

AURSINC WiFi Deauther Wristband

WiFi Deauther

Aursinc WiFi Deauther is a wristband that has the latest ESP8266 Deauther software installed.
With this software, you can perform various security tests on your Wi-Fi networks.
NOTE: ESP8266 only supports 2.4GHz.
Extensibility: You can also use it to develop your own software.
It is truly an ESP8266 development board, easy to operate.
LONG-TERM WORKING TIME: built-in 600mAh battery, working time up to 7 hours.
Comes with OLED display and snap action 3 position slide switch.

WIFI Pineapple

WIFI Pineapple

This is a set for MITM attacks on wireless networks perfected. WiFi Pineapple is a real harvester that was invented by cunning Americans, who modified the OpenWRT firmware specifically for it and literally stuffed it with a variety of utilities and programs for hacking and intercepting information in wireless networks. The capabilities of the device are really impressive.

Ubertooth one

Ubertooth one

Ubertooth One is a 2.4GHz wireless research platform for Bluetooth experimentation. Thanks to the powerful LPC175x ARM Cortex-M3 processor, the capabilities of the device significantly exceed the capabilities of a conventional adapter, allowing you to intercept and monitor, jam, or even change the signal from other devices. It is a fully open source platform with a mature ecosystem.

LAN Turtle

LAN Turtle

The LAN Turtle is a tiny network penetration implant disguised as a USB to Ethernet adapter. Easy configuration with built-in graphical shell and deployment of payloads such as DNS poisoning attacks, MITM attacks, network scanning, VPN tunneling, and more. Oh yes, it all works remotely, directly over 3G.

Yard Stick one car hacking gadgets

Yard Stick one

If you have tried to unlock your car by repeating the unlock signal, you will probably appreciate this device. The Yard Stick One allows you to send and receive traffic on popular frequencies (up to 1 GHz). Its distinguishing feature is the use of the CC1111 chip, which allows hardware demodulation or modulation of the signal, which improves the quality of reception and transmission. To work with the Yard Stick, you need to install the free RFCat utility . Still in doubt? In 2018, researchers showed how they hijack a Tesla Model S using the Raspeberry PI, Yard Stick One, and Proxmark III. Even if you can’t open it, you can always drown it.

WiFi hacking gadgets

Which WiFi adapter is suitable for hacking?
In general, it is capable of switching to monitoring mode and performing network packet injection. Whether it is or not depends on the chip on which the adapter is built and its driver. For the best monitor mode wifi adapter check this list: Kali Linux wifi adapter


文章来源: https://kalitut.com/best-hacking-gadgets/
如有侵权请联系:admin#unsafe.sh