قالب وردپرس درنا توس
Home / Tips and Tricks / 10 Important Gadgets Each Hacker Should Try "Null Byte :: WonderHowTo

10 Important Gadgets Each Hacker Should Try "Null Byte :: WonderHowTo



If you've been bored by the daily hacking and need a new toy to experiment with, we've compiled a list of gadgets that help you take password shutdown and wireless hacking to the next level. If you are not a white hat or pentester yourself, but have a shopping, whether they're birthday, christmas gift or other gift, these also give great gift ideas.

Some articles presented in this article may not appeal to any penetration tests. As a hacker, we develop all our own areas of expertise and interests.

Wi-Fi enthusiasts can appreciate the antenna below because it is capable of capturing keystrokes over air similar to how WPA2 handles are taken. Others interested in quadcopters can enjoy the selected drones for their ability to fly 1

-2 miles away without losing a signal and carrying attached hardware like Wi Fi pineapple and Raspberry Pi.

first Mousejacking Exploit Antenna

In 2016, the Security Bureau made Bastille headlines when it reported its research on wireless keyboard and mouse problems. Double mousehacking allows these vulnerabilities an attacker (up to 300m away) to control a target computer without having physical access. These attacks allow remote key injections by allowing penetration testers to anonymously connect their device to a target computer using popular wireless keyboard cards (below).

Image of Bastille / YouTube

This attack is possible due to the fact that keyboard operators (Logitech and Dell) fail to encrypt data transfers between the keyboard and USB adapter or fail with properly verifying devices communicating with the adapter. It has been over two years since the vulnerabilities were revealed, but apparently over one billion affected devices worldwide, because Logitech and Dell are extremely popular wireless keyboard manufacturers.

More information about this attack can be found on the official website of the Bastille for a list of affected devices and technical details.

"Crazyradio USB Dongle" used in these attacks is a 2.4 GHz bi-directional transmitter that can send and receive radio telemetry.

  • Crazyradio USB Dongle – MSRP $ 44.99 (Amazon)
Image of Bastille / YouTube

2. Password Cracking GPUs

A Graphics Processor (GPU) is a chip, usually embedded in an internal graphics card that is connected to the computer's motherboard, designed to efficiently process images and change memory in smartphones, personal computers, and game consoles. GPUs are responsible for all image and image reproduction on our electronic devices.

Hackers reuse GPU technology and build dedicated "cracking rigs" to improve the brute-force attacks with Hashcat. This type of usage is demonstrated in Tokyoneon's "Hack 200 Online User Accounts in Less Than 2 Hours" article where he compromised hundreds of Twitter, Facebook and Reddit accounts using a GPU to crack hash in a leaked password database. [19659002] GeForce graphics card is a good starting point for hackers who are considering building their own brute-force machine. With only $ 189, the GeForce GTX 1050 Ti is a good starter GPU.

ZOTAC GTX 1050 Ti Mini and MSI GTX 1050 Ti OC. Image of Linus Tech Tips / YouTube

To take cracks more seriously, develop a cluster of GPUs to multiply brute-force power with the GTX 1080 Ti. The GTX 1080 will be able to crack tens of millions more hash per second and may therefore be a better investment.

  • EVGA GeForce GTX 1080 Ti – $ 899.99 & Up (Amazon)
Nvidia GEFORCE GTX 1080 Ti Founder's Edition. Image of Linus Tech Tips / YouTube

3. The world's smallest laptops

The GPD pocket has been called the world's smallest laptop, which is an interesting option for white hats and pennants, always on the go. It contains Intel Atom X7, 1920 x 1080 resolution and 8GB of RAM, packed in a small laptop that is just a bit bigger than most modern smartphones (shown below).

Image of Chigz Tech Reviews / YouTube

Pocket-sized computers grow in popularity because of its small size, physical keyboard, ability to handle high performance Games and Intel Processors Superior Available in Raspberry Pis and Smartphones.

Pentecosts can easily install a variety of Linux operating systems on this device, including Ubuntu, Kali Linux and BlackArch instead of Standard Windows 10.

If you're looking for a bit more power in a smarter laptop, the latest GPD pocket 2 has better hardware specifications and is 50% thinner than the previous model.

Picture of Liliputing / YouTube

4. The latest Raspberry Pi

Raspberry Pi 3 Model B + released this year with a slightly faster CPU, upgraded Wi-Fi and Ethernet modules and can run without a traditional AC adapter with the Ethernet port (with a PoE HAT) .

Null Byte has covered how to build a hacking Raspberry Pi, use VNC to access it and create a portable pentry Pi box, just to name a few tutorials.

  • With Power Supply – MSRP $ 47.95 (Amazon)
  • With the help of a Raspberry Pi as a hacking tool, it has been covered in length so I go further. ] With power supply and case – MSRP $ 54.99 (Amazon)
  • With power supply, bag, 16GB SD card, etc. – MSRP $ 74.95 (Amazon)
  • With power supply, bag, 32GB SD card , etc. – MSRP $ 79.95 (Amazon)
  • With power supply, bag, 32GB SD card, cables etc. – MSRP $ 94.95 (Amazon)

6. VPS subscription

A Virtual Private Server (VPS) is a computer that we can control remotely from any internet connection anywhere in the world. Adding a reliable VPS subscription to your arsenal is important for all penetration testers and professional security researchers. From a distant VPS, penetration testers:

Our favorite for white hats and pendants is BulletShield because it does not require or request any personal information when registering or paying, offering offshore solutions and having a peat-friendly website including things. Check out the full guide to selecting the right VPN below for more info.

7th Hak5 Gear

Hak5 is an award-winning podcast that offers comprehensive information security training and a well-known penetration testing tool. Below are some of the excellent tools Hak5 has to offer.

USB Rubber Ducky

USB Rubber Ducky is Hak5's USB Keyboard Utility that can perform payload at over 1000 words per minute. It can be used to hack a macOS device in less than 5 seconds, disable antivirus software or social engineer to connect it to its computer.

  • USB Rubber Ducky – MSPR $ 44.99 (Hak5)
Image of SADMIN / Null Byte

Bash Bunny

Bash Bunny is a multifunctional USB attack tool similar to USB Rubber Ducky. However, Bash Bunny is a complete Linux operating system that provides a number of advantages over USB Rubber Ducky, which carries several advanced payloads, emulates a combination of devices and performs many advanced attacks.

  • Bash Bunny – MSRP $ 99.99 (Hak5)
Image of Hak5 / YouTube

Package Correl

Package Correl Package Squirrel is a medium-sized operating tool in pocket format designed for secret packet capture and secure remote access to target networks. Ports on this small network implant include a USB and Ethernet.

  • Packet Corridor – MSRP $ 59.99 (Hak5)
Image via Hak5

LAN Turtle

LAN Turtle is a secret penetration tool that is perfect for networking, advanced monitoring and man-in-center attacks, all available through a graphic shell. It is equipped with SIM features (3G) and a modular frame that allows hackers to easily perform and automate advanced network attacks.

  • LAN Turtle – MSRP $ 59.99 (Hak5)
Picture of Hak5 / YouTube

WiFi Pineapple

Wi-Fi Pineapple and WiFi Pineapple Nano is excellent rogue access point and Wi-Fi editing devices. Their suite of Wi-Fi editing tools is designed to make reconnaissance, man-in-mid attacks and hacking wireless networks quickly and painlessly. Best of all, all of these features can be accessed with a phone or browser through the easy-to-use graphical interface.

  • WiFi Pineapple Tetra Basic – MSRP $ 199.99 (Hak5)
  • WiFi Pineapple Nano – MSRP $ 99.99 (Hak5)
  • WiFi Pineapple Terta Tactical – MSRP $ 299.99 (Hak5)
  • WiFi Pineapple Nano Tactical – MSRP $ 129.99 (Hak5)
  • Picture of Hak5 / YouTube [19659014] 8. Standard Wi-Fi Hacking Adapter

    Wi-Fi hacking is a popular topic among penetration testers. Our ability to easily compromise on wireless networks is an important skill. So a wireless adapter is something you can not without, preferably one that is Kali compatible. Some choices worth watching are:

    • ALFA AWUS036NHA – $ 39.99 (Amazon)
    • ALFA AWHUS036NH – $ 34.99 (Amazon)
    • ALFA AWUS036NEH – $ 31.45 (Amazon)
    • Panda PAU05 – 19659037 ] TP-Link TL-WN722N v1 – $ 9.99 (Amazon)

    For more information, see our Null Change Guide to select a wireless network adapter to see more options available for your specific needs. ] Hacking Gear: 10 Essential Gadgets Each Hacker should try ” width=”532″ height=”532″ style=”max-width:532px;height:auto;”/>

    ALFA AWHUS036NH. Image of SADMIN / Null Byte

    9. Long-range Wi-Fi Hacking Antenna

    If standard Wi-Fi hacking antennas do not get the job done, the increase in signal coverage and the range of a larger antenna will allow us to compromise the routers far further away.

    The Tupavco TP512 Yagi Wi-Fi Directional Antenna has customer reviews reporting up to 300 feet of the range. Some reports are made online up to 1 mile from the area where an unlimited viewpoint to the destination router is allowed. There are other vendors selling similar Yagi products and bundles. For example, the ALFA Yagi antenna contains an ALFA hacking chip and the necessary cable adapter.

    • Tupavco TP512 Yagi – $ 25 (Amazon)
    • ALFA Yagi Antenna – $ 91 (Amazon)
    Picture of ALFA / Amazon [19659014] 10th Hacking with Drones

    With drone racing growing in popularity in recent years, these small quadcopters quickly become the self-adhesive choice of choices.

    Project Cuckoo is Watch Dogs-inspired pentesting drone, created by the hacker called "Glytch". This 3D Printed Dronning has a connected WiFi Pineapple Nano that enables man-in-center attacks and inject malicious JavaScript into Wi-Fi hotspots as well as sniffing Wi-Fi activity without connecting to the router. [19659110] In future Null Byte articles, we will talk about building our own affordable hacking drone and displaying all the unique scenarios that penetration testers can use with such devices.

    Amazon Amazon printer (decent quality) starts at about $ 299. Add the price of materials, individual drone components and a remote control – it's well over 500 dollars spent building a hacking drone from the beginning. If you are looking for a faster solution or are reluctant to deal with the technical efforts in 3D printing and drones, there are options.

    DJI Spark Drone is a small, lightweight drone that includes a remote control for a total of $ 399. With up to 15 minutes flight time, up to 1.2 miles and an attached 12 MP 1080p camcorder, this is perhaps the best and the most affordable little drones that are currently on the market.

    If your budget allows a wider range of drones, "DJI Mavic Drone" may be a better option. It has a higher resolution camera, up to 2.4 miles of range, 8GB of internal storage (for video capture), 3-axis mechanical gimbal (for enhanced stability) and over 20 minutes of flight time.

    DJI Spark Drone.

    Image of Brendan Miranda / YouTube

    Bonus: eBooks and Study Materials

    While ebooks are not physical gadgets, I thought it worth mentioning because each penetration test should have a healthy supply of resources at their disposal .

    Null Byte is an excellent store for learning how to use Metasploit and how to hack macOS and Windows 10. But e-books and certification exams preparatory cookbooks contain large amounts of information. These materials are often created by veteran pests with more than a decade of practical professional experience. Beginners hackers who have prepared for some form of ethical hacking exam will tell you how valuable these teaching materials can be.

    A variety of teaching materials can sometimes be found free on websites like "All IT eBooks." While some of these eBooks are years old, they still contain relevant and useful information. Other (non-free) titles include:

    What are your choices for Essential Hacking Gear?

    We tried to compile a varied list of hacking tools and gadgets between penetration testers can appreciate. If you want to explore weapon-based hackdrivers, extend the range of your Wi-Fi router hacks or dive deeper into password cracking, the equipped gadgets should provide a good starting point.

    This list of hacker accessories may not appeal to anyone, however. Did we miss any remarkable or new gizmos hackers should know about? Be sure to leave a comment below with your choices for the essential gadgets that hackers should try!

    Cover Image via Brendan Miranda / YouTube

    Source link