Security Tools 2017-10-09T16:53:33+00:00

TOOLS / HERRAMIENTAS

WiFi Pineapple Mk.V, THE EVIL TWIN

Simulates a regular WiFi access point, could open (no password) and bridged to a secure WiFi, but as a man-in-the-middle it can look into communications and insert arbitrary code. Alternatively, it can also reply to beacons promiscuously to harvest information (respond “Yes, I am your WiFi” and allow connections to all devices in the area to record their IDs and passwords. Now you have an idea why it is called promiscuous mode).ESPAÑOL

Connect to the Internet to simulate a normal router. ESPAÑOL

For control and data extraction without evidence in airwaves. ESPAÑOL

Simulates open WiFi access point, secondary encrypted control channel. ESPAÑOL

Extra data storage (apart from SD), or peripherals like GPS for tracking. ESPAÑOL

Batteries allow portable, concealable deployment for over 3 days; Indefinite time with adapter plugged to AC outlet. ESPAÑOL

Raspberry Pi 3B, HACK-N-GO

A hacking computer that fits in your palm? That sounds like trouble. This powerful microcomputer comes in a small package, yet it can easily run the most notable hacking operating system without breaking a sweat resistor. Allows for inclusion of several software tools to gather information, exploit vulnerabilities, and much more. Coupled with the exposed connectors for GPIO (General Purpose Input/Output), hardware peripherals can work alongside software to crate the ultimate all-in-one hacking tool.

High Definition 8 Mega Pixels, allowing for excellent video monitoring and recording. ESPAÑOL

Low energy consumption connectivity for concealed, long term deployment. ESPAÑOL

Allows for addition of virtually any hardware, like cloners for corporate badges (RFID), bugs (microphones) and transceivers, hardware hacking (connecting directly to and manipulating other peripherals) ESPAÑOL

For control and data extraction without evidence in airwaves. ESPAÑOL

Multiple peripherals like long range WiFi Antenna, GPS, extra storage, etc. ESPAÑOL

High Definition 8 Mega Pixels, allowing for excellent video monitoring and recording. ESPAÑOL

Low energy consumption connectivity for concealed, long term deployment. ESPAÑOL

Allows for addition of virtually any hardware, like cloners for corporate badges (RFID), bugs (microphones) and transceivers, hardware hacking (connecting directly to and manipulating other peripherals) ESPAÑOL

For control and data extraction without evidence in airwaves. ESPAÑOL

Multiple peripherals like long range WiFi Antenna, GPS, extra storage, etc. ESPAÑOL

USB Rubber Ducky, NOT A TOY!

Displayed without the case for clarity, it is easily concealed within any thumb drive case, except it is not a storage device. Assume you just plugged this seemingly innocent USB to your computer just now, but since it works like a keyboard, by the time to finish reading this sentence it will have already input several commands and copied your user password. It is “password123”. Joking aside, the fact that  it can type like a keyboard means two different things: with a dedicated processor it can type amazingly fast, and it will not be stopped by antivirus or similar since why would they block the keyboard, if it is the user typing stuff (shh… the computer doesn’t tell the difference)?

for keyboard emulation and very fast typing. ESPAÑOL

allow for quick exploit deployment and storing gathered data. ESPAÑOL

allows for immediate preparation of attack (without losing previous info). ESPAÑOL