TOOLS / HERRAMIENTAS
WiFi Pineapple Mk.V, THE EVIL TWIN
Simulates a regular WiFi access point, could open (no password) and bridged to a secure WiFi, but as a man-in-the-middle it can look into communications and insert arbitrary code. Alternatively, it can also reply to beacons promiscuously to harvest information (respond “Yes, I am your WiFi” and allow connections to all devices in the area to record their IDs and passwords. Now you have an idea why it is called promiscuous mode).ESPAÑOL
Connect to the Internet to simulate a normal router. ESPAÑOL
For control and data extraction without evidence in airwaves. ESPAÑOL
Simulates open WiFi access point, secondary encrypted control channel. ESPAÑOL
Extra data storage (apart from SD), or peripherals like GPS for tracking. ESPAÑOL
Batteries allow portable, concealable deployment for over 3 days; Indefinite time with adapter plugged to AC outlet. ESPAÑOL
Raspberry Pi 3B, HACK-N-GO
A hacking computer that fits in your palm? That sounds like trouble. This powerful microcomputer comes in a small package, yet it can easily run the most notable hacking operating system without breaking a sweat resistor. Allows for inclusion of several software tools to gather information, exploit vulnerabilities, and much more. Coupled with the exposed connectors for GPIO (General Purpose Input/Output), hardware peripherals can work alongside software to crate the ultimate all-in-one hacking tool.
High Definition 8 Mega Pixels, allowing for excellent video monitoring and recording. ESPAÑOL
Low energy consumption connectivity for concealed, long term deployment. ESPAÑOL
Allows for addition of virtually any hardware, like cloners for corporate badges (RFID), bugs (microphones) and transceivers, hardware hacking (connecting directly to and manipulating other peripherals) ESPAÑOL
For control and data extraction without evidence in airwaves. ESPAÑOL
Multiple peripherals like long range WiFi Antenna, GPS, extra storage, etc. ESPAÑOL
High Definition 8 Mega Pixels, allowing for excellent video monitoring and recording. ESPAÑOL
Low energy consumption connectivity for concealed, long term deployment. ESPAÑOL
Allows for addition of virtually any hardware, like cloners for corporate badges (RFID), bugs (microphones) and transceivers, hardware hacking (connecting directly to and manipulating other peripherals) ESPAÑOL
For control and data extraction without evidence in airwaves. ESPAÑOL
Multiple peripherals like long range WiFi Antenna, GPS, extra storage, etc. ESPAÑOL
USB Rubber Ducky, NOT A TOY!
Displayed without the case for clarity, it is easily concealed within any thumb drive case, except it is not a storage device. Assume you just plugged this seemingly innocent USB to your computer just now, but since it works like a keyboard, by the time to finish reading this sentence it will have already input several commands and copied your user password. It is “password123”. Joking aside, the fact that it can type like a keyboard means two different things: with a dedicated processor it can type amazingly fast, and it will not be stopped by antivirus or similar since why would they block the keyboard, if it is the user typing stuff (shh… the computer doesn’t tell the difference)?
for keyboard emulation and very fast typing. ESPAÑOL
allow for quick exploit deployment and storing gathered data. ESPAÑOL
allows for immediate preparation of attack (without losing previous info). ESPAÑOL