As a geek pursuing a career in Ethical Hacking. Hacking gadgets are love. We feel more powerful with them. Like in the Web Series Mr. Robot, Elliot’s hacks have made use of Raspberry Pi computers, DeepSounds discs, and DDoS attacks.
1. Raspberry Pi
It is a series of small single-board computers developed in the UK by the Raspberry Pi Foundation.
Hackers also called it RPI and Raspi.
It is a low-cost, credit-card-sized computer that you can plug into any computer or monitor, and it uses a standard keyboard and mouse.
The RPI model goes from Pi 1 to Pi 4 and the new generation is Pi 400.
It is capable of doing everything you’d expect a desktop computer to do, from playing HD videos to browsing the internet, playing games, and a lot of things.
Actually, there is a lot of things you can do.
What can you do with a RPI?
- Learn to code electronics for Physical Projects
- Create your own home Automation Projects
2. Wi-Fi Pineapple
The Pineapples are actually created by engineers at Hak5 to perform pen tests and help Network Administrators audit network security.
It is a portable device that allows cybercriminals to steal data that is shared on public Wi-Fi.
How it works?
This device firstly acts as a hotspot honeypot and then acts as the man in the middle. This device is visible to the users.
The user will actually connect to the honeypot instead of the actual wireless access.
The honeypot then broadcasts the Wi-Fi names(SSID) of the wireless location you are connected with and you think it is legitimate.
3. Rubber Ducky
Did you know?
The first USB Rubber Ducky was evolved out of laziness.
Hak5 founder Darren Kitchen was tired of typing the same commands to fix the printers and network shares repeatedly, so he invented Rubber Ducky.
It is a device similar to USB Pen Drive. It is used to inject keystrokes into a system, hack a system, steal the victim’s essential and credential data, and inject payload to the victim’s computer.
To implement an attack you have to physically put the flash drive into a computer or just take someone’s help to dot it for you.
4. LAN Turtle
The LAN Turtle is disguised as a typical USB-to-Ethernet adapter for desktop computers
It is managed through the Turtle Shell – a text-based, menu-based GUI accessible by SSH.
It is used to physically bypass Firewalls, create an unauthorized VPN endpoint and instantly gain remote access to a device with a reverse shell.
Some modern LAN Turtle devices have in-built network cards that allow remote connections as soon as they are connected to a network.
You can also install LAN without any experience in Cybersecurity software or Network Administration.
One of the oldest forms of cyber threat.
” Keyloggers are software programs that leverage algorithms that monitor keyboard strokes through pattern recognition and other techniques. “Tom Bain, vice president Of Security Strategy at Morphisec
Criminals use keyloggers to steal the personal information of the victim such as banking details.
Keyloggers can be hardware-based or software-based.
How they work?
Keyloggers works in such a way that they collect information of the victim then send it back to the third party.
Keyloggers collect information in two forms:
- In basic form the keyloggers only collect information typed into a single website or application.
- In advanced form, it collects everything you type no matter what application you are using.
Did you know?
The first keyloggers were used by The Soviet Union in the 1970s to monitor IBM electric typewriters.