The Colonial Pipeline Hack and OT Security
Due to the cybersecurity issue at Colonial Pipeline, the Colonial Hack, most of the fuel supply to the east coast has been disrupted for more than a week. It has ...
Blog Alias todayDecember 14, 2021 1234 3 4
Are you looking for the perfect gift for the hacker in your life? We’ve scoured our amazon purchase histories and here’s what we think would be great gifts for any hacker in your life.
Just click on the images or the titles for a direct link to the amazon listing.
Widely regarded as the Red Team Bible, “RTFM: Red Team Field Manual” by Ben Clark is a welcome addition to any security enthusiast’s bookshelf.
A USB rubber ducky is a fun and compact tool, but getting more than a few can eat into your budget. So, what are the cheaper alternatives? For the price of one “official” rubber ducky, you can get fifteen that can handle 90% of use cases.
Here are some links to point you in the right direction when getting started.
https://github.com/mame82/duck2spark
“Access All Areas: A User’s Guide to the Art of Urban Exploration” is another terrific addition to the hacker’s bookshelf. This book covers physical pen testing from an urban explorer’s perspective.
Travel routers are worth their weight in gold. Our Principal Security Engineer personally own four of them. Travel routers are a versatile tool that allow you to use your phone as a hotspot and provide a Wi-Fi network to all your devices. They can also be used to convert a wired connection to a wireless connection in a pinch. With built in VPN support for several providers, you can take a secure network anywhere you go.
The gatepass tool is one of our go-to physical bypass tools. Our engineers have one in each of our entry kits.
Mousejacking is a novel technique that has been the deciding factor in winning a few redteam engagement. This crazy radio allows you to inject keystrokes into vulnerable mice and keyboard dongles.
Faster, smaller, and easier than a proxmark, the Keysy is a great solution for quickly cloning RFID cards.
A great tool to always have on hand, the watch can be used to deauth a Wi-Fi client when attempting to capture a Wi-Fi handshake. Other uses include knocking out wireless cameras and creating a beacon flood to make identifying legitimate wireless access points impossible.
A hardware Swiss army knife for any hacker, Raspberry Pi’s offer the ability to rapidly prototype new technology and spin up micro services. Create a tiny portable hacking rig by installing Kali, get rid of those annoying ads with a pihole server, or create a home media server by installing Kodi.
What the Kangaroo PC lacks in power it makes up in portability. It is the size of an iPhone and holds 4GBs of memory so its our first choice for on the go hacking. In our experience, we found ParrotOS to be the best option for this pocket-sized offensive PC as opposed to the installed version of windows.
Don’t let the price tag scare you; this is the best option for the security pro that can’t disconnect. GDP packs 16GB of memory and GPU capability in a device the size of a Nintendo Switch. The installed version of windows is snappy,, not bloated, and in our testing had no issues running windows and Kali in a VM. With all the power and tools of a full-size PC and the ability to plug into a dock, the GPD could be a complete system replacement for some security engineers.
Written by: Alias
Notices Alias
Due to the cybersecurity issue at Colonial Pipeline, the Colonial Hack, most of the fuel supply to the east coast has been disrupted for more than a week. It has ...
Blog Alias / September 23, 2024
Penetration testing is becoming the vaccinations of the tech industry. Everyone is expected to get one; some don’t believe in them, and others only do it because they are told to. But what is really being purchased? A pen test follows four basic elements of security: It’s crucial to know vulnerabilities, but once those vulnerabilities ...
Blog Alias / August 19, 2024
When we think about the impact of cybersecurity attacks, it’s easy to fall into the trap of believing that data is only as valuable as the ransom a company is willing to pay to retrieve it. We’ve seen this misconception challenged by the rising number of attacks on hospitals and schools, but what often flies ...
Copyright 2019 Cyber Security Design Concept by <a href="http://qantumthemes.com?rel=demo" target="_blank">QantumThemes</a>.