Hacking Gear Overview
My hacking gear is divided into several categories, each equipped with specialized tools for different aspects of security testing. Each tool is essential for assessing vulnerabilities and will be covered in greater detail in separate sections. Here’s a brief overview:
WiFi Pentesting
-
Pineapple Mark 7 & MK7AC Adapter: Used for creating Evil Portals, rogue access points, and performing man-in-the-middle (MITM) attacks to intercept and analyze network traffic.
-
Alfa AWUS1900 AC: Ideal for de-authentication attacks and packet injection on WPA/WPA2 networks, enhancing wireless penetration testing.
-
Flipper Zero with WiFi Dev Board: A portable tool for wireless testing, scanning, and performing de-authentication attacks against WiFi networks.
-
ESP32 WiFi Chip with Pentesting Firmware: Utilized for network scanning, packet injection, and executing denial-of-service (DoS) attacks on WiFi networks.
-
Yagi Antenna (25 dBi): A long-range antenna that extends WiFi testing capabilities, allowing for long-distance assessments and signal interception.
Hotplug Attacks
-
Bash Bunny: Automates credential theft, network attacks, and system compromises via USB insertion. Capable of executing a variety of payloads for stealthy, rapid exploitation.
-
OMG Cable Elite & OMG Plug Elite: Malicious USB devices designed for keystroke injection, remote access, and covert payload execution once connected to a target device. These are ideal for undetected remote control over compromised systems.
-
Rubber Ducky (2x): Famous for delivering quick and stealthy payloads via USB. It mimics a standard HID (keyboard), injecting pre-configured keystrokes to deploy scripts in seconds.
-
Licensed Rubber Ducky Payload Studio Pro: A powerful tool for creating customized payloads, allowing for personalized and tailored attack scenarios using Ducky Script.
Implants & Remote Access
-
Key Croc: A covert keylogger disguised as a USB cable, capable of gathering keystrokes and executing payloads on compromised machines without detection.
-
Shark Jack (x2): Portable network penetration tools, each loaded with Nmap payloads for network scanning, vulnerability discovery, and on-the-go assessments.
-
LAN Turtle: A covert network implant that provides persistent remote access, useful for monitoring internal networks and data exfiltration.
-
Flipper Zero (x2): Versatile devices capable of interacting with NFC, RF, and infrared signals, as well as analyzing and replicating communication protocols.
-
PortaPack H2 with HackRF One: A comprehensive setup for radio frequency (RF) testing, enabling interception, signal analysis, and transmission across various RF bands.
-
RTL-SDR v5: A software-defined radio for monitoring and analyzing a wide range of RF signals, from FM radio to advanced communications.
Data Storage
-
Lacie Rugged External Hard Drives (2TB each, password-protected): Secure, durable drives for storing all gathered assessments, reports, and captured data from various penetration testing activities.
