If you've been bored by the daily hacking and need a new toy to experiment with, we've compiled a list of gadgets that help you take password shutdown and wireless hacking to the next level. If you are not a white hat or pentester yourself, but have a shopping, whether they're birthday, christmas gift or other gift, these also give great gift ideas.
Some articles presented in this article may not appeal to any penetration tests. As a hacker, we develop all our own areas of expertise and interests.
Wi-Fi enthusiasts can appreciate the antenna below because it is capable of capturing keystrokes over air similar to how WPA2 handles are taken. Others interested in quadcopters can enjoy the selected drones for their ability to fly 1
first Mousejacking Exploit Antenna
In 2016, the Security Bureau made Bastille headlines when it reported its research on wireless keyboard and mouse problems. Double mousehacking allows these vulnerabilities an attacker (up to 300m away) to control a target computer without having physical access. These attacks allow remote key injections by allowing penetration testers to anonymously connect their device to a target computer using popular wireless keyboard cards (below).
This attack is possible due to the fact that keyboard operators (Logitech and Dell) fail to encrypt data transfers between the keyboard and USB adapter or fail with properly verifying devices communicating with the adapter. It has been over two years since the vulnerabilities were revealed, but apparently over one billion affected devices worldwide, because Logitech and Dell are extremely popular wireless keyboard manufacturers.
More information about this attack can be found on the official website of the Bastille for a list of affected devices and technical details.
"Crazyradio USB Dongle" used in these attacks is a 2.4 GHz bi-directional transmitter that can send and receive radio telemetry.
- Crazyradio USB Dongle – MSRP $ 44.99 (Amazon)
2. Password Cracking GPUs
A Graphics Processor (GPU) is a chip, usually embedded in an internal graphics card that is connected to the computer's motherboard, designed to efficiently process images and change memory in smartphones, personal computers, and game consoles. GPUs are responsible for all image and image reproduction on our electronic devices.
Hackers reuse GPU technology and build dedicated "cracking rigs" to improve the brute-force attacks with Hashcat. This type of usage is demonstrated in Tokyoneon's "Hack 200 Online User Accounts in Less Than 2 Hours" article where he compromised hundreds of Twitter, Facebook and Reddit accounts using a GPU to crack hash in a leaked password database.  GeForce graphics card is a good starting point for hackers who are considering building their own brute-force machine. With only $ 189, the GeForce GTX 1050 Ti is a good starter GPU.
To take cracks more seriously, develop a cluster of GPUs to multiply brute-force power with the GTX 1080 Ti. The GTX 1080 will be able to crack tens of millions more hash per second and may therefore be a better investment.
- EVGA GeForce GTX 1080 Ti – $ 899.99 & Up (Amazon)
3. The world's smallest laptops
The GPD pocket has been called the world's smallest laptop, which is an interesting option for white hats and pennants, always on the go. It contains Intel Atom X7, 1920 x 1080 resolution and 8GB of RAM, packed in a small laptop that is just a bit bigger than most modern smartphones (shown below).
Pocket-sized computers grow in popularity because of its small size, physical keyboard, ability to handle high performance Games and Intel Processors Superior Available in Raspberry Pis and Smartphones.
Pentecosts can easily install a variety of Linux operating systems on this device, including Ubuntu, Kali Linux and BlackArch instead of Standard Windows 10.
If you're looking for a bit more power in a smarter laptop, the latest GPD pocket 2 has better hardware specifications and is 50% thinner than the previous model.
4. The latest Raspberry Pi
Raspberry Pi 3 Model B + released this year with a slightly faster CPU, upgraded Wi-Fi and Ethernet modules and can run without a traditional AC adapter with the Ethernet port (with a PoE HAT) .
Null Byte has covered how to build a hacking Raspberry Pi, use VNC to access it and create a portable pentry Pi box, just to name a few tutorials.
- With Power Supply – MSRP $ 47.95 (Amazon)
- With the help of a Raspberry Pi as a hacking tool, it has been covered in length so I go further. ] With power supply and case – MSRP $ 54.99 (Amazon)
- With power supply, bag, 16GB SD card, etc. – MSRP $ 74.95 (Amazon)
- With power supply, bag, 32GB SD card , etc. – MSRP $ 79.95 (Amazon)
- With power supply, bag, 32GB SD card, cables etc. – MSRP $ 94.95 (Amazon)
9. Long-range Wi-Fi Hacking Antenna
If standard Wi-Fi hacking antennas do not get the job done, the increase in signal coverage and the range of a larger antenna will allow us to compromise the routers far further away.
The Tupavco TP512 Yagi Wi-Fi Directional Antenna has customer reviews reporting up to 300 feet of the range. Some reports are made online up to 1 mile from the area where an unlimited viewpoint to the destination router is allowed. There are other vendors selling similar Yagi products and bundles. For example, the ALFA Yagi antenna contains an ALFA hacking chip and the necessary cable adapter.
- Tupavco TP512 Yagi – $ 25 (Amazon)
- ALFA Yagi Antenna – $ 91 (Amazon)
Image of Brendan Miranda / YouTube
Bonus: eBooks and Study Materials
While ebooks are not physical gadgets, I thought it worth mentioning because each penetration test should have a healthy supply of resources at their disposal .
Null Byte is an excellent store for learning how to use Metasploit and how to hack macOS and Windows 10. But e-books and certification exams preparatory cookbooks contain large amounts of information. These materials are often created by veteran pests with more than a decade of practical professional experience. Beginners hackers who have prepared for some form of ethical hacking exam will tell you how valuable these teaching materials can be.
A variety of teaching materials can sometimes be found free on websites like "All IT eBooks." While some of these eBooks are years old, they still contain relevant and useful information. Other (non-free) titles include:
What are your choices for Essential Hacking Gear?
We tried to compile a varied list of hacking tools and gadgets between penetration testers can appreciate. If you want to explore weapon-based hackdrivers, extend the range of your Wi-Fi router hacks or dive deeper into password cracking, the equipped gadgets should provide a good starting point.
This list of hacker accessories may not appeal to anyone, however. Did we miss any remarkable or new gizmos hackers should know about? Be sure to leave a comment below with your choices for the essential gadgets that hackers should try!