This is very useful we can install entire Kali Linux on this credit card sized computer.
Raspberry Pi also can be used in many other projects. Cybersecurity experts use it on various way.
π: More
2. USB Rubber Ducky
The USB Rubber Ducky delivers powerful payloads in seconds by taking advantage of the target computers inherent trust all while deceiving humans by posing as an ordinary USB drive.
π: More
3. Wifi Pineapple
This will automate the auditing of WiFi networks and saves the results.
We can control it with awesome web based interface.
π: More
4. Ubertooth One
Ubertooth One is designed primarily as an advanced Bluetooth receiver, offering capabilities beyond that of traditional adapters,
Which allow for it to be used as a BT signal sniffing and monitoring platform.
π: More
5. WiFi Deauther Watch
A jammer just blocks everything within a radius.
π: More
6. USB Killer
the USB Killer rapidly charges its capacitors from the USB power lines. When the device is charged, -200VDC is discharged over the data lines of the host device.
As the result target device becomes burned and unrepairable.
π: More
7. Bad USB
Attacker can easily carry it as a thumb drive and plug into any PC to inject payload, running own command on it, it also can be controlled over WiFi.
It looks like innocent USB thumb drive, which is a great advantage.
π: More
8. Hardware Keylogger
A hardware keylogger can be inserted between USB keyboard and computer. It captures all the keystrokes made from the keyboard, must have thing for every cybersecurity expert.
π: More
9. Micro-controllers
There are lots of micro-controllers used by ethical hackers.
NodeMCU ESP8266
A Wifi development board and Can be used in various way, It also can be used to create phishing pages over WiFi.
π: More
10. RTL-SDR
It can be used to intercept radio frequencies. We can use it for listening others conversations. It is also able to intercept GSM mobile calls and SMS. It is very useful for cybersecurity experts.
π: More
11. Proxmark3 NFC RFID Card Reader
This devices can make read the data of RFID and NFC cards and then make a copy of it. We can write the new copies on blank cards provided with this package
πHere are some tips for preventing SSRF attacks:
β‘ Validate user-supplied input:
Make sure to properly validate any user-supplied input to ensure that it is not malicious.
This can help to prevent attackers from sending crafted requests to your application.
π§΅(2/n)
β‘ Use a whitelist approach :
Instead of trying to identify and block specific types of malicious input, a whitelist approach allows you to specify the types of input that are allowed.
This can help to prevent attackers from sending requests to unintended destinations.
β’ /passwd: A human-readable text file which stores information of user account.
β’ etc/group: also a human-readable text file which stores group information as well as user belongs to which group can be identified through this file.
Threadπ§΅: π
β’ Encrypted password:
The X denotes encrypted password which is actually stored inside /shadow file. If the user does not have a password, then the password field will have an *(asterisk).
More : π
β’ User Id (UID): Every user must be allotted a user ID
β’ (UID). UID 0 (zero) is kept for root user and UIDs 1-99 are kept for further predefined accounts, UID x.x.x.x
β’ Group Id (GID): It denotes the group of each user; like as UIDs, the first x.x.x.x