Abhishek Meena - {πŸ”₯} Profile picture
COO at @Vulncure | πŸ–ŠοΈ Tester | πŸͺ² Hunter HOF - Google 🀝 Sharing Knowledge with infosec community πŸ“¬ Inbox Whenever Need Help

Dec 4, 2022, 14 tweets

Top 12 Accessories that Hacker use Mostly
#bugbounty #Infosec #Hacked #hacking

List of Items🧡:πŸ‘‡

1. Raspberry Pi 4

This is very useful we can install entire Kali Linux on this credit card sized computer.

Raspberry Pi also can be used in many other projects. Cybersecurity experts use it on various way.

πŸ‘‡: More

2. USB Rubber Ducky

The USB Rubber Ducky delivers powerful payloads in seconds by taking advantage of the target computers inherent trust all while deceiving humans by posing as an ordinary USB drive.

πŸ‘‡: More

3. Wifi Pineapple

This will automate the auditing of WiFi networks and saves the results.

We can control it with awesome web based interface.

πŸ‘‡: More

4. Ubertooth One

Ubertooth One is designed primarily as an advanced Bluetooth receiver, offering capabilities beyond that of traditional adapters,

Which allow for it to be used as a BT signal sniffing and monitoring platform.

πŸ‘‡: More

5. WiFi Deauther Watch

A jammer just blocks everything within a radius.

πŸ‘‡: More

6. USB Killer

the USB Killer rapidly charges its capacitors from the USB power lines. When the device is charged, -200VDC is discharged over the data lines of the host device.

As the result target device becomes burned and unrepairable.

πŸ‘‡: More

7. Bad USB

Attacker can easily carry it as a thumb drive and plug into any PC to inject payload, running own command on it, it also can be controlled over WiFi.

It looks like innocent USB thumb drive, which is a great advantage.

πŸ‘‡: More

8. Hardware Keylogger

A hardware keylogger can be inserted between USB keyboard and computer. It captures all the keystrokes made from the keyboard, must have thing for every cybersecurity expert.

πŸ‘‡: More

9. Micro-controllers

There are lots of micro-controllers used by ethical hackers.

NodeMCU ESP8266

A Wifi development board and Can be used in various way, It also can be used to create phishing pages over WiFi.

πŸ‘‡: More

10. RTL-SDR

It can be used to intercept radio frequencies. We can use it for listening others conversations. It is also able to intercept GSM mobile calls and SMS. It is very useful for cybersecurity experts.

πŸ‘‡: More

11. Proxmark3 NFC RFID Card Reader

This devices can make read the data of RFID and NFC cards and then make a copy of it. We can write the new copies on blank cards provided with this package

πŸ‘‡: More

12. WiFi Adapters (Monitor Mode & Packet Injection)

WiFi adapter specially which supports monitor mode and packet injection is essential for WiFi penetration testing. So most of the hackers uses it.

πŸ‘‡: More

Thanks You Reading This Amazing Thread 🧡On :
Top 12 Accessories that Hacker use Mostly

Hope you'll like this πŸ‘

Check out πŸ‘‡ :
=====
My Bugbounty Tips Group : t.me/bugbountyresou…
=====

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling