Info@NationalCyberSecurity
Info@NationalCyberSecurity

7 hacking tools that look harmless but can do real damage | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


Adrian Kingsley-Hughes/ZDNET

One of the best ways to stay safe and secure when using your computers and other electronic devices is to be aware of the risks. For the past decade, that’s precisely what I’ve been doing.

Most risks are obvious: use strong passwords, don’t download and install software from untrustworthy websites, or hand your unlocked device to a third party.

Also: The best security keys you can buy

However, there are less obvious — yet equally dangerous — risks that can result in device or network intrusion, or even device destruction.

The transparent Flipper Zero offers a tantalizing glimpse into the inner workings of the device

, those digital pets that would die or turn evil if you neglected them). 

Also: 7 cool and useful things to do with your Flipper Zero

But beneath the fun exterior and the dolphin virtual pet is a pen-testing Swiss army knife, capable of all sorts of things, thanks to the built-in infrared transceiver, sub-GHz wireless antenna, iButton/NFC/RFID reader/writer/emulator, and GPIO connectors, which allow the Flipper Zero to connect to other gadgets. There’s also a USB port that can be connected to computers and smartphones. 

This broad capability means the Flipper Zero can be used to control items that have an infrared remote control, to clone RFID cards and NFC tags, to capture and retransmit radio frequencies that control things, such as access barriers and even car locks, and to be connected to computers or iPhone and Android devices, which can be used to send keystrokes to the system to do… well, pretty much anything you can do from a keyboard.

AlsoHow to unlock the Flipper Zero hacking tool’s true power

And that’s just the tip of the iceberg. For $169, the Flipper Zero O.MG cables and dongle can be used to attack unsuspecting devices

 is a tiny computer, which remains dormant until the cable is connected to a device such as a PC or Mac, or even an iPhone or Android smartphone. Then, when it’s connected, the computer wakes up and gets to work.

The computer at the end of an O.MG cable acts like a tiny keyboard, pumping out keystrokes to the device it’s connected to.

This hidden keyboard can do pretty much whatever an operator at a keyboard can do. It can steal Wi-Fi passwords, copy files and move them to remote locations, delete files, plant spyware or malware, and much more.

Also: The best VPN services (and how to choose the right one for you)

The capabilities of these cables are terrifying. The elite version can connect to Wi-Fi, be programmed to trigger remotely, and can even self-destruct, so the O.MG cable becomes a regular cable, which makes it hard to identify the technology as the source of a hack. 

Believe me when I say these cables look, feel, and work just like regular cables. They come in a selection of colors and connection types and blend in with your other cables.

Prices for an O.MG cable ranges from $119 to $200 USBKill Tactical kit

devices are little dongles that look like USB flash drives, but instead of storing data, they send circuit-busting electrical charges into the devices they are plugged into.

Laptops, PCs, smartphones, and even TVs, network routers, and pretty much anything that’s got a port on it are susceptible to being zapped by USBKill. 

Also: 6 simple cybersecurity rules to live by 

The devices can be triggered by pressing a button, using bluetooth, running a timed attack, or even by passing your hand over the device when wearing a covert magnetic ring.

These devices provide yet another reason to avoid plugging random stuff into your devices. 

4. USB Nugget

USB Nugget looks like a cat.

Retia/ZDNET

This is a simple and cheap, but very effective device.

Inside its tiny shell, the USB Nugget — which looks like a kitty — has everything needed to drop malicious payloads to pretty much whatever the device finds itself connected to.

Also: 3 security gadgets I never leave home without

Thanks to a built-in ESP32–S2 Wi-Fi chipset, this device can be controlled remotely, so that the hacker doesn’t even have to be anywhere near the system.

5. Wi-Fi Pineapple

The futuristic-looking Wi-Fi Pineapple.

Hak5/ZDNET

The Wi-Fi Pineapple USB Rubber Ducky

While the tool looks like a regular flash drive, the Rubber Ducky can be programmed to “type” commands into any device it’s plugged into.

The tool is yet another reason why you shouldn’t just plug random stuff into your electronics. However, the Rubber Ducky is so discreet that someone might plug it into a device, leave it connected, and it might be days, weeks or even months before it’s found.   

7. LAN Turtle

LAN Turtle has some surprises inside.

Hak5/ZDNET

On the outside the LAN Turtle O.MG UnBlocker.

looks like a data blocker. But not only does it not block data, it also acts like an O.MG cable and can be used to steal data or drop malicious payloads on the host system.

Once again, these hacking tools are hard to detect among all the other tech kit that people have in their workplaces. Be careful what you plug into your devices, or else. 

!function(f,b,e,v,n,t,s)
{if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};
if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version=’2.0′;
n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];
s.parentNode.insertBefore(t,s)}(window, document,’script’,
‘https://connect.facebook.net/en_US/fbevents.js’);
fbq(‘set’, ‘autoConfig’, false, ‘789754228632403’);
fbq(‘init’, ‘789754228632403’);

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW