Sooner or later if you are IT guy, interested in security and
hacking, you will start reading about various technologies, devices and
electronics used by ethical hackers or penetration testers. I call it
toys for boys. I have a few of them and plan to buy more, as you can
easily guess, my wife is not very happy about it. These toys are not
cheap and you should buy it only when you know you will use it. In any
other case, it will be more of a curiosity and just a gadget instead of a
work tool. However, with each of them, you will learn something new. If
you have a lot of money, I can’t forbid you to buy what you want, even
if you don’t need it. I have such a strange feeling that people who made
money quickly, they have this as the main rule. Who cares.
Some of things listed below I use at work, some privately and some
only for tests or to expand my knowledge. The list is so extensive and
some products at a fairly high price that my friends have no problems,
when on some occasion they need to buy me a gift. The truth is that I
have no friends, no Facebook, no wife and I’m sitting in a dark basement
under my mother’s house and I have to buy each gift myself
The list
Anyway,
here is the list of hacker gadgets - I will try to keep it up to date
as other my articles, so feel free to get back to this list in the
future, I will definitely add something new - if you know any
interesting too, let me know in the comments.
ALFA AWUS036ACH
Equipped with 802.11ac wireless standards, and years of field-proven experiences, ALFA AWUS036ACH provides 2.4GHz 300Mbps or 5.0GHz 867Mbps Wi-Fi data transfer speeds for outstanding blah blah blah… best wireless USB network card you need to hack your neighbor WIFI. Recommended to use with Kali, mentioned in any WIFI hacking guide. I have it, works like a charm. You need it! You need it, if you want to test some WIFI security.
TP-LINK TL-WR802N
TL-WR802N-04
300Mbps Wireless N Nano Router. Pocket-size ideal for travel use. I always have it with me on my holiday or business trip. Small and fast. Easy to configure. It provides me with safe use of the Internet in the hotel room. Thanks to this device, your computer is not exposed directly to a publicly available network. This one is popular in my country, but you will probably find similar in place you live. I also recommend GL-iNet products like microuter-N300, Shadow (GL-AR300M Series) or Mango (GL-MT300N-V2).
YubiKey
5nfc-key
The industry’s #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. I am using YubiKey 5 NFC. Best option for two factor authentication. Easy to use with many services and operating systems. NFC function works very well with mobile phones. Yubico company provides many variants of Yubikey, if you are not sure which one you should choose, use their quiz to get suggestion. I sleep more peacefully with this key.
Hardware Wallet
hardware-wallets
If you are a cryptocurrency enthusiast, have a lot of various coins and want to properly secure your funds, you should think about a hardware wallet. There are two popular suppliers of this type of equipment on the market. Trezor and Ledger. Both offer two devices. Trezor One, Trezor Model T and Ledger Nano S, Ledger Nano X. I do not have enough cryptocurrencies to worry about their safe storage, the devices are so expensive that it is not profitable for me to buy them yet. I trust my long strong password stored in KeepassXC and the encryption and backup of the wallets. However, I have one Trezor in mind.
USB killer
USBKill-V4
The USBKill is a device that stress tests hardware. When plugged in, power is taken from a USB-Port, multiplied, and discharged into the data-lines, typically disabling an unprotected device. The new models have the option of remote activation from the phone or after a specified time.
Hardware keylogger
airdrive-keylogger
The AirDrive Keylogger is an innovative ultra-small USB hardware keylogger, only 0.8” (20 mm) in length. It can be accessed with any Wi-Fi device such as a computer, laptop, tablet or smartphone.
Camera cover
camera-cover
The covers for the camera are available in various colors, sizes and made from various materials. They are probably not as popular as they used to be and if someone wanted to use them, should consistently do it on every device not only on laptop. Of course, being watched by a camera on your own laptop is most likely, but also difficult to achieve. Most people who are aware of what they are doing on the network and on their own computer, with an appropriate anti-virus/firewall program, are the least at risk. However, if you know a not responsible computer user, buy him such a cover. It also looks much better than a piece of tape.
Portable Cell Phone Jammers
EO08007
The signal jammer is a cool thing. Be careful, however, because devices of this type should not be used in public spaces. In most places on earth, such devices are considered illegal and their use is forbidden by law. Do not buy cheap Chinese counterfeit products and make sure the radio is adjusted to the wavebands used in your country before buying. From now on, blocking Wifi, GSM, LTE, GPS, Bluetooth is not a problem.
Data Blocker
data-blocker
Simply attach between your USB cable and charger to physically block data transfer or syncing. Charge mobile devices without any risk of hacking or uploading viruses.
Amateur Radio
BAOFENG-UV-5R
An amateur, portable radio can be useful to listen to what is happening on the air. I recommend BAOFENG UV-5R Dual Band Handheld. Not all uniformed services use the new digital and encrypted solutions. Remember not to transmit because a permit is required for this. Do not make what you listen to publicly because it is also regulated by law depending on the country.
Precision Screwdriver Repair Tool Kit
reapir-toolkit
If you often disassemble various types of devices, you definitely need this type of set. It is useful not only for hackers, but also for repairing electronics at home or opening a laptop for cleaning. Personally I am using tool kit from IFIXIT. Very good quality. Previously, I had various types of cheaper sets that always broke and damaged over time because of poor quality. It is worth investing in something better than throwing out the tip with each screw.
Smart Card RFID Reader/Writer NFC
card-reader-writer
Portable and stationary devices for reading and writing various types of access cards. Useful when we have access to, for example, an employee card and would like to clone it. Used for building penetration testing.
Magnetic Card Reader & Writer
MSR X6 Magnetic Card Reader & Writer is able to read/write/erase on Hi&Lo Coercive cards on track 1/2/3, including credit cards, ATM cards, drivers license, grocery stores, gift cards etc. Perfect for card cloning.
Blockplate
seed-plate
Have you ever wondered how to safely store the seed of your BTC wallet? I don’t mean a program like KeepassXC, but something more offline, in the event of a program, computer or backup failure. It cannot be a piece of paper in a safe, because the paper deteriorates quickly. Until recently, I did not know that such a thing existed. Check Blockplate, Cassette Solo or Capsule Solo. A piece of steel on which you can save your seed and keep it in a safe, without fear that it will be damaged.
Privacy roll stamp
roller-rubber-stamp
I have no idea how this is called, I call it privacy roll stamp and I bought it on Aliexpress, it showed when I was browsing some products as something that might interest me. First time advertisement was useful. If you care about your privacy and the security of your data, you probably have a shredder at home and all documents are properly destroyed before they end up in the trash. If you are fed up with tearing waybills off parcels or bothersome blurring them with a marker pen, you will like this funny roller rubber stamp. You will erase important information quickly and efficiently.
Solar charger
solar-charger
Portable, folding, waterproof solar charger. Sometimes can save your life, if you are in the wild and need to win important auction on eBay.
Lock Pick Set
lockpicks
Lock picking is the practice of unlocking a lock by manipulating the components of the lock device without the original key. Although lock-picking can be associated with criminal intent, it is an essential skill for the legitimate profession of locksmithing, and is also pursued by law-abiding citizens as a useful skill to learn, or simply as a hobby (locksport).
RFID Detector
rfid-detector
With this RFID Detector you can find out frequency and duty cycle of any passive LF (125kHz) / HF (13.56 MHz) reader!
USB Rubber Ducky
rubber-ducky
Imagine plugging in a seemingly innocent USB drive into a computer and installing backdoors, exfiltrating documents, or capturing credentials. Awesome right. Do it like a pro, do it in Mr. Robot style!
Comments
Post a Comment