paint-brush
5 Popular Hacker Hardware Tools in 2022 by@brettioman
2,938 reads
2,938 reads

5 Popular Hacker Hardware Tools in 2022

by Douglass JacobsNovember 1st, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

These hardware tools look harmless to humans and animals, but they are powerful. Keyboard injector is a hacker gadget disguised as a USB flash drive that sends preloaded keystrokes to the device and performs different FUD (completely undetectable) attacks. USB Killer is a very dangerous device, which can burn the device by releasing high-voltage current circularly.
featured image - 5 Popular Hacker Hardware Tools in 2022
Douglass Jacobs HackerNoon profile picture
Today, mobile phones have become a part of our bodies, making our life so easy and efficient. Everything is under control. It seems that all kinds of U disk viruses and blue screen crash in the PC era have gone forever. In fact, the hardware threats that endanger the security of personal data have never been far away from us (and mobile phones), but we have relaxed our vigilance or are completely unable to distinguish these malicious devices. Next, we introduce five popular hacker hardware tools in 2022 (still). These tools look harmless to humans and animals, but they are powerful.

Keyboard injector: automatically execute various commands

A keyboard injector is a hacker gadget disguised as a USB flash drive. It integrates reprogrammed USB peripheral malicious firmware. When it is connected to a host computer (including a desktop computer or Android phone), it will be judged as a keyboard by the system. The keyboard injector then sends preloaded keystrokes to the device and performs different FUD (completely undetectable) attacks. FUD attacks can perform the following tasks:
  1. Download and execute malware
  2. Execute system commands
  3. Get the reverse shell
  4. Stealing password

Hardware keyboard recorder: record every keystroke

Software keyboard recorders have long been heard of, but few people can recognize hardware keyboard recorders. It looks like a micro USB adapter or USB flash drive, which can store all keystroke information in our computers and mobile phones. If the keyboard is connected to the host with a hardware keyboard recorder, it can also secretly upload keystroke information to the cloud for storage. The hardware keyboard recorder can store the information of each keystroke, including browsing data, entered passwords, bank details, etc.

USB Killer: Burn your computer instantly

As its name implies, USB Killer is a very dangerous device, which can not only cause damage to the device but also be very easy to use. USB Killer has been popular for several years. Its principle is to burn the device by releasing high-voltage current circularly. It looks like an ordinary USB device (such as a USB flash disk), but it has a capacitor inside, which can be charged from the power line and bombard the device with high-voltage DC current up to 200V repeatedly until the device is burned out and cannot be repaired.

NFC and RFID card readers: Stealing credit cards in space

Many daily cards use NFC and RFID (radio frequency identification) to share data, such as access control and door lock cards and credit cards. Hackers can use NFC and RFID card readers to "space" read and clone any card, and then steal or abuse it. This hacker card reader can perform a variety of advanced functions when connected to a PC. The best way to prevent hackers from stealing credit cards or access cards is to put the cards in a card bag or box with an RF shielding function. There are many personal protection products that provide such functions in the market.

NetHunter Hacker Mobile Tools: Stealing Secrets by Charging

Today, everyone uses smartphones and pays special attention to the security protection of mobile phones. However, few people realize that mobile phones can also be a hacker tool, especially when you need to connect other people's mobile phones to your desktop. In the movies, we see hackers usually hide behind computer screens in dark rooms, but we have never seen them use mobile phones to carry out hacker attacks. In fact, such attacks are more threatening. NetHunter is a mobile penetration test platform that can be installed on Android phones. It has a large number of pre-installed hacker tools, which can turn mobile phones into powerful hacker attack platforms. Suppose you are working in a coffee shop temporarily, and someone asks if you can quickly charge your mobile phone on your laptop. The kind of you may not realize the risk of doing so. However, once the hacker's mobile phone is connected to your laptop to "charge", the hacker can send keystroke instructions to your laptop to perform different tasks, such as setting a back door, stealing passwords, and so on, without even touching his mobile phone (to avoid alerting you).



바카라사이트 바카라사이트 온라인바카라