HackRF One acts like a sound card of computer. It processes Digital Signals to Radio waveforms allowing integration of large-scale communication networks. It is designed to test, develop, improvise and modify the contemporary Radio Frequency systems.
While we are constantly surrounded by radio waves and digital tech such as broadcasting stations, WiFi, bluetooth, smart phones, GPS and IT infrastructures, the HackRF One is a Software-Defined Radio that can interact with any of these technologies. The majority of wireless systems in the digital age could easily be transceived by HackRF One. The vision behind it is to bring an open source peripheral that could assist modern day engineers and researchers for improving next generation communication systems.
2. Ubertooth One
The Ubertooth One is an open source 2.4 GHz wireless development platform suitable for Bluetooth experimentation. Commercial Bluetooth monitoring equipment can easily be priced at over $10,000 , so the Ubertooth was designed to be an affordable alternative platform for monitoring and development of new BT, BLE, similar and wireless technologies.
The Ubertooth One was created by Mike Ossmann at Great Scott Gadgets in 2011 when he realized that there was not an off-the-shelf BT adapter that offered the capabilities he required.
3. Lock Pick Set
This pick set contains the 9 most popular picks, 4 most popular tension wrenches and most popular broken key extractor. It comes with a quality leather case that has flap over lid with a snap. The picks are made of stainless steel with reinforced handles which are welded rather then riveted.
4. LAN Tap Pro
The LAN Tap Pro is a passive Ethernet tap, requiring no power for operation. There are active methods of tapping Ethernet connections (e.g., a mirror port on a switch), but none can beat passive taps for portability. To the target network, the LAN Tap looks just like a section of cable, but the wires in the cable extend to the monitoring ports in addition to connecting one target port to the other.
The monitoring ports (J3 and J4) are receive-only; they connect to the receive data lines on the monitoring station but do not connect to the station’s transmit lines. This makes it impossible for the monitoring station to accidentally transmit data packets onto the target network.
KeyGrabber products are hardware keyloggers. The keystroke recorder has up to 2GB of memory capacity, stored on a FAT file system. The device is completely transparent from computer operation, and no software or drivers are required. International keyboard layouts are also supported.
See the comparison chart as some versions have a clock/battery for times-stamping keystrokes. Some have a module for sending keystrokes via wireless so you don’t need full physical access again and can obtain keystrokes immediately via TCP direct stream or have keystrokes sent to you via email.
6. YARD Stick One
YARD Stick One is a sub-1 GHz wireless transceiver controlled directly from your computer. It uses the same radio circuit as the popular IM-Me. The radio functions that are possible by customizing IM-Me firmware are now at your fingertips when you attach YARD Stick One to a computer via USB.
YARD Stick One (Yet Another Radio Dongle) comes with RfCat firmware installed, courtesy of atlas. RfCat allows you to control the wireless transceiver from an interactive Python shell or your own program running on your computer. YARD Stick One also has CC Bootloader installed, so you can upgrade RFCat or install your own firmware without any additional programming hardware.
7. Alfa AWUS036NHA
A classic Wi-Fi board for injecting packets. The Alfa stands out for the quality of its materials, and for its use of chipsets which can be set to monitoring mode – a requirement for wireless audits.
8. WiFi Pineapple
The WiFi Pineapple hardware is a purpose built wireless auditing platform, combining versatile and convenient components to address the needs of the penetration tester. Please familiarize yourself with the WiFi Pineapple layout and specifications.
WiMonitor makes Wi-Fi packet sniffing and network monitoring dead simple! Once configured the device automatically scans channels 1-13 in the 2.4GHz band, captures packets and sends them to a remote IP address over Ethernet for further processing. The encapsulation is compatible with Wireshark so you can analyze Wi-Fi traffic using it.
10. USB Rubber Ducky
The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regular keyboard and accept pre-programmed keystroke payloads at over 1000 words per minute.
Payloads are crafted using a simple scripting language and can be used to drop reverse shells, inject binaries, brute force pin codes, and many other automated functions for the penetration tester and systems administrator.
11. TP Link WL722N
The TP-LINK TL-WN722NC is this adapter with an included cradle.”11n High-gain USB Adapter-6 (AR) A” and “REV: 1.0” is silkscreened on the board in the FCC photos (PCB v1.0 Atheros AR9271-AL1E) Known at least two EAN numbers: 6935364050467 and 6935364090432 1T1R SISO, 4dBi detachable Omni Directional antenna.
Which Support classic Wi-Fi board for injecting packets, and for its use of chipsets which can be set to monitoring mode – a requirement for wireless audits.
Since, there are lot’s of hackers devices. Let us know your favorite device comment into below.