READ MORE:
- Google Chrome Hacking | How to see saved password in chrome?
- [Google’s Fuchsia OS] | What is Fuchsia OS | Things You Should Know
- [Instagram Tricks 2018] How to increase real Instagram Followers | Get Free Instagram Followers
- [Instagram Hack] Creating instagram phising page And how to hack instagram account?
- Kali Linux VS Parrot in 2018 | Introduce ParrotSec Os | The next big thing which is better for learning ethical hacking?
- **New Multi Stylish Text Generator in 2018 | Convert Text Into Different New Styles
- [Facebook Hacking] How to create facebook phising page And How to hack facebook account using phising page?
Note : Everything shown is to be used for educational purpose only. All information in this presentation has the goal to teach you the techniques used by hacker in order to avoid their attacks. Please make sure before analyzing. applications that you have the approval of the owner of the applications you are analyzing. Hacking is a crime and I am not responsible for the way you use it.
These tools are very costly, and these tools are not available soon.
- Ubertooth ONE
- Proxmark3 kit
- Raspberry Pi
- LAN Turtle
- Hackers RF ONE
- Rubber Ducky
- Alfa Network Board
- Wi-Fi Jammer
- Dark Purple USB
Ubertooth ONE
Proxmark3 kit
Raspberry Pi
LAN Turtle
This type of system admin and pen-test tool provides stealthy remote access, as it stays connected to a USB port covertly. Besides this, it allow users to harvest information from the network and has the capacity to execute a MITM (man-in-the-middle attack).
HckerRF ONE
This tool insalls a powerful SDR (Software-Defined Radio) system. In other other words it is essentially a radio communication device which installs software to be used in place of typically installed hardware. This way, it is capable of processing all kinds of radio signals ranging from 10 MHz to 6 GHz from a single peripheral, which can be connected to the computer via a USB port. With the help of this tool, you can capture the calling flow.
Rubber Ducky
This is special pen drive is a device that works as a programmed keyboard in the shape of a USB drive. When you plug it into a computer, it starts writing automatically to launch programs and tools which may either be available on the victim computer or loaded onto the drive’s onboard Micro SD, in order to extract information.
Alfa Network Board
A classic Wi-Fi board for injecting packet. The Alfa stands out for the quality of its materials, and for its use of chipsets which can be set to monitoring mode –a requirement of wireless audits.
Wi-FI Jammer
WiFi jammer is one of the many types of signal jammers created to help people solve different problems coming from cell phones, radio signals and wireless connections. Every kind of signal jammer is designed to work with specific frequency range, and WiFi jammer is not an exception.
WiFi signal jammer has been made to successfully block wireless signals in WiFi frequency range (2.4-2.5 GHz) and in addition it blocks Bluetooth signals because the match the same frequency range. Everything else in this type of jammer works the same as in other jammers, maybe with some minor differences.
Dark Purple USB
A Simple USB stick created by A Russian security researcher known as “Dark Purple”. Dark Purple can instantly destroy any machine it, plugs into including your PC, LAPTOP and TV. These tools can destroy the entire machine. A Russian security researcher demonstrates the destructive capability of a so called “killer USB Stick”.
So friends this is the end of the article ,if you like this post please share it your friends. thank you so much ,stay tune with this blog and blog’s admin Mr. Aditya Singh