Hacking the Holiday: A Hacker’s Gift Guide
Are you looking for the perfect gift for the hacker in your life? We’ve scoured our amazon purchase histories and here’s what we think would be great gifts for any ...
“Top 10 Gifts for the Hacker in Your life” articles are incredibly common. But how do you know if some of the tools listed are actually worthwhile?
We recently sat down with two of our security engineers to talk about different gadgets and tools of the trade on this week’s SecureAF. We then decided to determine what tools are worth your time and money, or “L33t” and what tools are not at all worth your attention, or “Lame.”
Listen to the episode to learn why we think these tools are worthwhile and how we’ve used them before for security engagements.
Below are links to a few of the tools we discussed that were l33t.
You can learn more about the tools by reaching out to our team or following the links to their pages.
Keysy Handheld is a tiny card that can easily fit in your pocket. It can be used to quickly and easily clone a car remote or a lower class security card. Up to four different RFIDs can be added and used at the press of a button!
Proxmarx is similar to a Keysy but is generally more difficult to use. It can do more but’s it’s also a more complicated process. To operate, the user needs to run a system on their PC to copy the RFID.
Shark Jack is a network attack tool that can be used to collect information about the network like credentials. It’s something our engineers use on site all the time.
Crazyradio is a 2.4ghz radio initially designed to control drones over that frequency has been discovered to be able to operate keyboards and mice over the same frequency. So any Logitech or Microsoft keyboard from a certain era are susceptible to this.
This was just a taste of the many tools and gadgets we talked about this weeks on SecureAF episode; L33t or Lame!
Written by: Alias
Blog Alias
Are you looking for the perfect gift for the hacker in your life? We’ve scoured our amazon purchase histories and here’s what we think would be great gifts for any ...
Blog Alias / November 22, 2024
Hello everyone, As a penetration tester and security engineer, I want to bring to your attention a critical vulnerability that demands immediate action. CVE-2024-10924 impacts the “Really Simple Security” WordPress plugin, and addressing it should be your top priority if this tool is active on your website. Key Information CVE-2024-10924 affects versions 9.0.0 through 9.1.1.1 ...
Blog Alias / September 23, 2024
Penetration testing is becoming the vaccinations of the tech industry. Everyone is expected to get one; some don’t believe in them, and others only do it because they are told to. But what is really being purchased? A pen test follows four basic elements of security: It’s crucial to know vulnerabilities, but once those vulnerabilities ...
Copyright 2019 Cyber Security Design Concept by <a href="http://qantumthemes.com?rel=demo" target="_blank">QantumThemes</a>.