Sooner or later if you are IT guy, interested in security and hacking, you will start reading about various technologies, devices and electronics used by ethical hackers or penetration testers. I call it toys for boys. I have a few of them and plan to buy more, as you can easily guess, my wife is not very happy about it. These toys are not cheap and you should buy it only when you know you will use it. In any other case, it will be more of a curiosity and just a gadget instead of a work tool. However, with each of them, you will learn something new. If you have a lot of money, I can’t forbid you to buy what you want, even if you don’t need it. I have such a strange feeling that people who made money quickly, they have this as the main rule. Who cares.
Some of things listed below I use at work, some privately and some only for tests or to expand my knowledge. The list is so extensive and some products at a fairly high price that my friends have no problems, when on some occasion they need to buy me a gift. The truth is that I have no friends, no Facebook, no wife and I’m sitting in a dark basement under my mother’s house and I have to buy each gift myself …φ(。。*).
Anyway, here is the list of hacker gadgets - I will try to keep it up to date as other my articles, so feel free to get back to this list in the future, I will definitely add something new - if you know any interesting too, let me know in the comments.
Equipped with 802.11ac wireless standards, and years of field-proven experiences, ALFA AWUS036ACH provides 2.4GHz 300Mbps or 5.0GHz 867Mbps Wi-Fi data transfer speeds for outstanding blah blah blah… best wireless USB network card you need to hack your neighbor WIFI. Recommended to use with Kali, mentioned in any WIFI hacking guide. I have it, works like a charm. You need it! You need it, if you want to test some WIFI security.
300Mbps Wireless N Nano Router. Pocket-size ideal for travel use. I always have it with me on my holiday or business trip. Small and fast. Easy to configure. It provides me with safe use of the Internet in the hotel room. Thanks to this device, your computer is not exposed directly to a publicly available network. This one is popular in my country, but you will probably find similar in place you live. I also recommend GL-iNet products like microuter-N300, Shadow (GL-AR300M Series) or Mango (GL-MT300N-V2).
The industry’s #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. I am using YubiKey 5 NFC. Best option for two factor authentication. Easy to use with many services and operating systems. NFC function works very well with mobile phones. Yubico company provides many variants of Yubikey, if you are not sure which one you should choose, use their quiz to get suggestion. I sleep more peacefully with this key.
If you are a cryptocurrency enthusiast, have a lot of various coins and want to properly secure your funds, you should think about a hardware wallet. There are two popular suppliers of this type of equipment on the market. Trezor and Ledger. Both offer two devices. Trezor One, Trezor Model T and Ledger Nano S, Ledger Nano X. I do not have enough cryptocurrencies to worry about their safe storage, the devices are so expensive that it is not profitable for me to buy them yet. I trust my long strong password stored in KeepassXC and the encryption and backup of the wallets. However, I have one Trezor in mind.
The USBKill is a device that stress tests hardware. When plugged in, power is taken from a USB-Port, multiplied, and discharged into the data-lines, typically disabling an unprotected device. The new models have the option of remote activation from the phone or after a specified time.
The AirDrive Keylogger is an innovative ultra-small USB hardware keylogger, only 0.8” (20 mm) in length. It can be accessed with any Wi-Fi device such as a computer, laptop, tablet or smartphone.
The covers for the camera are available in various colors, sizes and made from various materials. They are probably not as popular as they used to be and if someone wanted to use them, should consistently do it on every device not only on laptop. Of course, being watched by a camera on your own laptop is most likely, but also difficult to achieve. Most people who are aware of what they are doing on the network and on their own computer, with an appropriate anti-virus/firewall program, are the least at risk. However, if you know a not responsible computer user, buy him such a cover. It also looks much better than a piece of tape.
The signal jammer is a cool thing. Be careful, however, because devices of this type should not be used in public spaces. In most places on earth, such devices are considered illegal and their use is forbidden by law. Do not buy cheap Chinese counterfeit products and make sure the radio is adjusted to the wavebands used in your country before buying. From now on, blocking Wifi, GSM, LTE, GPS, Bluetooth is not a problem.
Simply attach between your USB cable and charger to physically block data transfer or syncing. Charge mobile devices without any risk of hacking or uploading viruses.
An amateur, portable radio can be useful to listen to what is happening on the air. I recommend BAOFENG UV-5R Dual Band Handheld. Not all uniformed services use the new digital and encrypted solutions. Remember not to transmit because a permit is required for this. Do not make what you listen to publicly because it is also regulated by law depending on the country.
If you often disassemble various types of devices, you definitely need this type of set. It is useful not only for hackers, but also for repairing electronics at home or opening a laptop for cleaning. Personally I am using tool kit from IFIXIT. Very good quality. Previously, I had various types of cheaper sets that always broke and damaged over time because of poor quality. It is worth investing in something better than throwing out the tip with each screw.
Portable and stationary devices for reading and writing various types of access cards. Useful when we have access to, for example, an employee card and would like to clone it. Used for building penetration testing.
MSR X6 Magnetic Card Reader & Writer is able to read/write/erase on Hi&Lo Coercive cards on track 1/2/3, including credit cards, ATM cards, drivers license, grocery stores, gift cards etc. Perfect for card cloning.
Have you ever wondered how to safely store the seed of your BTC wallet? I don’t mean a program like KeepassXC, but something more offline, in the event of a program, computer or backup failure. It cannot be a piece of paper in a safe, because the paper deteriorates quickly. Until recently, I did not know that such a thing existed. Check Blockplate, Cassette Solo or Capsule Solo. A piece of steel on which you can save your seed and keep it in a safe, without fear that it will be damaged.
I have no idea how this is called, I call it privacy roll stamp and I bought it on Aliexpress, it showed when I was browsing some products as something that might interest me. First time advertisement was useful. If you care about your privacy and the security of your data, you probably have a shredder at home and all documents are properly destroyed before they end up in the trash. If you are fed up with tearing waybills off parcels or bothersome blurring them with a marker pen, you will like this funny roller rubber stamp. You will erase important information quickly and efficiently.
Portable, folding, waterproof solar charger. Sometimes can save your life, if you are in the wild and need to win important auction on eBay.
Lock picking is the practice of unlocking a lock by manipulating the components of the lock device without the original key. Although lock-picking can be associated with criminal intent, it is an essential skill for the legitimate profession of locksmithing, and is also pursued by law-abiding citizens as a useful skill to learn, or simply as a hobby (locksport).
With this RFID Detector you can find out frequency and duty cycle of any passive LF (125kHz) / HF (13.56 MHz) reader!
Imagine plugging in a seemingly innocent USB drive into a computer and installing backdoors, exfiltrating documents, or capturing credentials. Awesome right. Do it like a pro, do it in Mr. Robot style!