The Top Cyber Espionage Devices You Don't Want to See
... unless you are using them.
The Pwn
Plug Academic Edition is the Industry’s First
Enterprise Penetration Testing Drop Box
- Wireless (802.11b/g/n) high gain Bluetooth & USB Ethernet
adapters
- Fully-automated NAC/802.1x/Radius bypass
- One-click EvilAP, stealth mode & passive recon
The Pwn Plug Academic Edition acts as a penetration testing drop
box that covers most of a full-scale pentesting engagement, from
physical-layer to application layer. The Pwn Plug Academic Edition
is controlled through a simple web-based administration and comes
preloaded with an array of penetration testing tools and Wireless,
Bluetooth, and USB Ethernet adapters.
The Pwn
Plug R3 is a next-generation penetration testing
device in a portable, shippable, “Plug-and-Pwn” form factor.
- Onboard high-gain 802.11a/b/g/n wireless
- Onboard Bluetooth
- External 4G/GSM cellular
- Greatly improved performance and reliability
The Pwn Plug R3 is a next-generation penetration testing device
in a portable, shippable, “Plug-and-Pwn” form factor. With onboard
high-gain 802.11a/b/g/n wireless, onboard Bluetooth, external
4G/GSM cellular, ruggedized case design, and greatly improved
performance and reliability, the Pwn Plug R3 is the enterprise
penetration tester’s dream tool.
The MiniPwner
The MiniPwner
is described as a penetration testing “drop box”. You (or maybe a
cleaner you’ve bribed) needs to plug it into an Ethernet plug in
the target’s building, and then you can slurp all the data out of
their network via a wifi link.
The penetration tester uses stealth or social engineering
techniques to plug the MiniPwner into an available network port.
(common locations include conference rooms, unoccupied
workstations, the back of IP Telephones, etc.)
Once it is plugged in, the penetration tester can log into the
MiniPwner and begin scanning and attacking the network. The MiniPwner can
simultaneously establish SSH tunnels through the target network,
and also allow the penetration tester to connect to the MiniPwner
via Wifi.
WiFi
Pineapple Mark V
Slightly larger than a smartphone the WiFi Pine-apple Mark V is
the “ultimate” cyber surveillance device. It uses an “intuitive”
web interface to enable hackers to break into a corporate’s IT
networks through its wifi connections. It costs $100.
USB Switchblade
The goal of the USB Switchblade is to silently recover information
from a target Windows 2000 or higher computer, including password
hashes, LSA secrets, IP information, etc.
A gadget that looks like a USB stick has a
program that swings into action when it’s inserted into the USB
drive and can then begin its naughty work without the user knowing
it by exploiting a flaw in USB autorun settings. How about
dropping it in the car park of your target’s offices, seeing if
someone will pick it up and plug it in to see what’s on it…
USB
8GB Flash Drive Cufflinks
The thing
about these is that the bad guy can carry a load of malware, ready
for use at any time. These go for less than $50. Easy to smuggle
in.
The
Rubber Ducky
The Rubber Ducky is becoming the “field-weapon of choice” for
cyber spies. It’s the size of a normal USB stick but when you plug
it in to a PC it pretends to be a keyboard and starts ‘typing’
away, possibly trying to break into systems or maybe stealing
passwords. If you get a few seconds alone with someone’s phone
you can get an adapter to plug it in and maybe hack that too. (The last five items courtesy of Financial News.)