Top 12 Accessories that Hacker use Mostly
#bugbounty #Infosec #Hacked #hacking
List of Itemsπ§΅:π
1. Raspberry Pi 4
This is very useful we can install entire Kali Linux on this credit card sized computer.
Raspberry Pi also can be used in many other projects. Cybersecurity experts use it on various way.
π: More
2. USB Rubber Ducky
The USB Rubber Ducky delivers powerful payloads in seconds by taking advantage of the target computers inherent trust all while deceiving humans by posing as an ordinary USB drive.
π: More
3. Wifi Pineapple
This will automate the auditing of WiFi networks and saves the results.
We can control it with awesome web based interface.
π: More
4. Ubertooth One
Ubertooth One is designed primarily as an advanced Bluetooth receiver, offering capabilities beyond that of traditional adapters,
Which allow for it to be used as a BT signal sniffing and monitoring platform.
π: More
5. WiFi Deauther Watch
A jammer just blocks everything within a radius.
π: More
6. USB Killer
the USB Killer rapidly charges its capacitors from the USB power lines. When the device is charged, -200VDC is discharged over the data lines of the host device.
As the result target device becomes burned and unrepairable.
π: More
7. Bad USB
Attacker can easily carry it as a thumb drive and plug into any PC to inject payload, running own command on it, it also can be controlled over WiFi.
It looks like innocent USB thumb drive, which is a great advantage.
π: More
8. Hardware Keylogger
A hardware keylogger can be inserted between USB keyboard and computer. It captures all the keystrokes made from the keyboard, must have thing for every cybersecurity expert.
π: More
9. Micro-controllers
There are lots of micro-controllers used by ethical hackers.
NodeMCU ESP8266
A Wifi development board and Can be used in various way, It also can be used to create phishing pages over WiFi.
π: More
10. RTL-SDR
It can be used to intercept radio frequencies. We can use it for listening others conversations. It is also able to intercept GSM mobile calls and SMS. It is very useful for cybersecurity experts.
π: More
11. Proxmark3 NFC RFID Card Reader
This devices can make read the data of RFID and NFC cards and then make a copy of it. We can write the new copies on blank cards provided with this package
π: More
12. WiFi Adapters (Monitor Mode & Packet Injection)
WiFi adapter specially which supports monitor mode and packet injection is essential for WiFi penetration testing. So most of the hackers uses it.
π: More
Thanks You Reading This Amazing Thread π§΅On :
Top 12 Accessories that Hacker use Mostly
Hope you'll like this π
Check out π :
=====
My Bugbounty Tips Group : t.me/bugbountyresouβ¦
=====
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.