
Hacking the Holiday: A Hacker’s Gift Guide
Are you looking for the perfect gift for the hacker in your life? We’ve scoured our amazon purchase histories and here’s what we think would be great gifts for any ...
“Top 10 Gifts for the Hacker in Your life” articles are incredibly common. But how do you know if some of the tools listed are actually worthwhile?
We recently sat down with two of our security engineers to talk about different gadgets and tools of the trade on this week’s SecureAF. We then decided to determine what tools are worth your time and money, or “L33t” and what tools are not at all worth your attention, or “Lame.”
Listen to the episode to learn why we think these tools are worthwhile and how we’ve used them before for security engagements.
Below are links to a few of the tools we discussed that were l33t.
You can learn more about the tools by reaching out to our team or following the links to their pages.
Keysy Handheld is a tiny card that can easily fit in your pocket. It can be used to quickly and easily clone a car remote or a lower class security card. Up to four different RFIDs can be added and used at the press of a button!
Proxmarx is similar to a Keysy but is generally more difficult to use. It can do more but’s it’s also a more complicated process. To operate, the user needs to run a system on their PC to copy the RFID.
Shark Jack is a network attack tool that can be used to collect information about the network like credentials. It’s something our engineers use on site all the time.
Crazyradio is a 2.4ghz radio initially designed to control drones over that frequency has been discovered to be able to operate keyboards and mice over the same frequency. So any Logitech or Microsoft keyboard from a certain era are susceptible to this.
This was just a taste of the many tools and gadgets we talked about this weeks on SecureAF episode; L33t or Lame!
Written by: Alias
Blog Alias
Are you looking for the perfect gift for the hacker in your life? We’ve scoured our amazon purchase histories and here’s what we think would be great gifts for any ...
Blog Tanner Shinn / February 20, 2025
As US cybersecurity professionals, we are well-versed in the tactics, techniques, and procedures (TTPs) of advanced persistent threats (APTs) from various countries. We have detailed indicators of compromise (IOCs) for groups like APT41 from China and APT28 from Russia. However, when it comes to American APTs, the landscape is far murkier. Beyond some recognition of ...
Blog Alias / January 22, 2025
In recent years, there has been an alarming growth in the number of data breaches affecting 500 or more individuals, alongside an increase in the total number of individuals impacted. Cyberattacks, particularly through hacking and ransomware, have surged in scale and frequency, posing significant risks to healthcare organizations and the sensitive data they manage. The ...
Copyright 2019 Cyber Security Design Concept by <a href="http://qantumthemes.com?rel=demo" target="_blank">QantumThemes</a>.