This is a low cost credit card sized desktop computer that runs Linux and it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming.
2. Rubber Ducky USB
The Rubber ducky looks similar to a USB Pen drive, it can be used for variety of attacks, hack a system, inject a keystroke into a system, inject payloads and also steal information and sensitive data.
3. LAN Turtle
The LAN Turtle by Hak5 is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.
4. Crazy Radio
This is a long range open USB radio dongle Radio power amplifier giving 20dBm output power · 1km range LOS with Crazyflie 2.0. It is also a great building block for systems that require longer range than WiFi
5. Cactus WHID (Keylogger)
This is a Keylogger it allows Keystrokes to be sent through WiFi to a target Machine.
The target recognises the Ducky as both a standard HID keyboard and a serial port, allows interactive commands and scripts to be executed on the target remotely.
6. Dstike Wi-Fi Duether
Dstike can kick devices off a network irrespective of whether you are connected to it or not, it scans for nearby networks and selects individuals or networks it wants to kick out then kick it out
7. Magspoof
Magspoof allows its user to store different kind of credit cards and magstripes in one device. The device that can spoof/emulate any magnetic stripe or credit card
8. Ubertooth One
Ubertooth One is a small, open-source USB device with an antenna powered by an ARM Cortex-M3 chip and a CC2400 wireless transceiver. You can sniff and monitor Bluetooth signals from nearby devices
9. Wi-Fi Pineapple
Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.
Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
2. Raspberry Pi:
This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming
Malware is a term that describes any malicious software that can harm your devices or data.
Types of malware and what they do:
-Virus:
A code that inserts itself into an application and executes when the app is run. It can damage or delete files, corrupt data, or spread to other programs.
-Ransomware:
A type of malware that encrypts your data and demands a ransom for the decryption key.
-Spyware:
It collects information about your activities, such as passwords, payment details, or messages, without your consent.
-Trojan:
A Trojan disguises itself as a legitimate or desirable program, but performs malicious actions once installed. It can take control of your system, steal data, or download more malware.
-Worm:
A type of malware that spreads through a network by replicating itself. It can consume bandwidth, slow down performance, or damage network devices.
Social Engineering:
This is the use of psychological tricks and manipulation to get people to release sensitive information.
Types of social engineering and what they do:
-Phishing:
Sending fake emails that look like they are from a trusted source, such as a bank or a company, and asking for personal or financial information.
-Vishing:
This known as ‘voice phishing’, it involves calling someone on the phone and pretending to be someone else, such as a tech support person or a government official, and asking for information or money.
-Smishing:
This is referred to a ‘SMS Phishing’ it involves sending fake text messages that look like they are from a trusted source, such as a delivery service or a lottery, and asking for information or money.
-Whaling:
Targeting high-level executives or important people with phishing or vishing attacks, and trying to get access to their accounts or sensitive data.
-Spear Phishing:
Targeting a specific person or group with phishing or vishing attacks, and using information about them to make the messages more convincing.