Hacking Gadgets You Can Buy on Amazon!
Buy here:
14. Proxmark3 NFC RFID Card Reader
https://amzn.to/3JJ55J5
13. RTL-SDR
https://amzn.to/3FTQVUb
12. Micro-controllers
https://amzn.to/3FTQYiP
11. Adafruit Bluefruit LE Sniffer
https://amzn.to/3zat1jm
10. Hardware Keylogger
https://amzn.to/40lPlTu
9. Bad USB
https://amzn.to/40lPbvm
8. USB Killer
https://amzn.to/3ZdJcqL
7. WiFi Deauther Watch
https://amzn.to/42CSkbz
6. Ubertooth One
Show More Show Less View Video Transcript
0:00
The best hacking products, hackers tools on Amazon
0:04
Get the best tools and products for hacking. The tools in this video are perfect for anyone who wants to learn how to hack
0:12
Number 14, ProMark 3 NFC RFID Card Reader. If you have a ProMark 3, you have the most powerful and complete RFID NFC testing device
0:23
for 125 kilohertz, 134 kilohertz, and 13.56 megahertz frequencies. This device can copy the information from RFID and NFC cards
0:34
The blank cards that come with this package can be used to make new copies. We can buy blank cards from Amazon if we need more
0:41
so it's not a bad idea to put some more money into it to make it better
0:45
To improve the range of LF and HF, we need antennas with a longer reach
0:50
Another new and useful upgrade for it is the Blue Shark Bluetooth 2.0 upgrade
0:55
which lets you control the ProMark 3 wirelessly and add an external battery to turn it into a self-sufficient device
1:02
that you can connect to your computer or smartphone and control. The Walrus NFC app has been updated to let you control it with Bluetooth
1:10
It also solves the problem of high temperatures by adding a metal cooler
1:14
Number 13. RTL-SDR The RTL-SDR is a low-cost, software-defined radio that uses an RTL-2832 U-based DVB-T TV tuner dongle
1:27
It has the ability to pick up radio waves. We can use it to hear what other people are talking about
1:32
It can also listen in on and read SMS and GSM phone calls
1:37
It's very helpful for people who work in cybersecurity. Number 12, microcontrollers
1:43
Different kinds of microcontrollers are used by ethical hackers. Some of them are important for an ethical hacker to have in his or her backpack
1:52
The ASP8266 is a $6 Wi-Fi development board that can be used in many ways
1:58
including making our own Wi-Fi deauthor. It can also make phishing pages that can be sent over Wi-Fi
2:05
Ethical hackers will find this tiny microcontroller to be a great choice
2:09
Home is where we could make our own USB rubber ducky. The Arduino Pro Micro is a great product that doesn cost very much but if we want to change the script we have to reset it and upload a new script from our computer Number 11 Adafruit Bluefruit LE Sniffer A special firmware image has been put on the Adafruit Bluefruit LE friend which turns it into a simple Bluetooth low sniffer
2:34
We can passively capture data exchanges between two Bluetooth low-energy devices and send it to
2:40
Wireshark, an open-source network ysis tool, where we can see things on a packet level and use
2:45
useful descriptors to make sense of the values without having to open the 2,000-page Bluetooth
2:51
4.0 core specification every time. Number 10. Hardware Keylogger. A hardware keylogger can be
2:58
put in the space between the USB keyboard and the computer. It keeps track of every keystroke on the
3:04
keyboard, making it an essential tool for any cybersecurity expert. This is a simple keylogger
3:09
made of hardware. It can hold up to 16 megabytes of information. Most of the time, this is enough
3:15
to record keystrokes for a year. Then we can take it out and plug it into our computer so we can see
3:20
what keys were pressed. Some keyloggers can be controlled by Wi-Fi or text message. It can't be
3:26
found by any software. Number nine, bad USB. It's a great replacement for the USB rubber ducky
3:34
This device has custom hardware that's built around the Atmega32U4 and ESP12S. This device
3:41
uses Wi-Fi to send keystrokes to a target computer. The target sees the ducky as both
3:46
a standard HID keyboard and a serial port. This means that interactive commands and scripts can
3:52
be run on the target from a distance. Attackers can easily move it around as a thumb drive and
3:57
plug it into any PC to add payload and run their own commands. It can also be controlled over Wi-Fi
4:03
It looks like a regular USB thumb drive, which is a big plus, but it doesn't work as quickly as
4:09
the USB rubber ducky. Number 8. USB Killer. Since USB gets its power from the computer and can't send
4:17
more voltage, computers don't check how much current is going through it. But what if we use
4:21
this to burn our whole system? Using this on other people is against the law. When plugged into a
4:27
device, the USB Killer quickly charges its capacitors from the USB power lines. When the
4:33
device is charged, negative 200 volt DC is sent through the data lines of the host device. This
4:39
discharge cycle will keep happening many times per second until the USB killer is
4:44
taken away so the target device is burned and can no longer be fixed number seven Wi de watch as the name suggests it a de It stops Wi users from being able to log in
4:58
and disconnects them. It does not jam. The ASP8266 Wi-Fi development board
5:04
is used to make this happen. It looks like a watch version would be a very cool tool for any hacker
5:10
A jammer just makes noise on a certain frequency range, like 2.4 gigahertz
5:15
A de-authentication attack, on the other hand, is only possible because of a flaw in the Wi-Fi standard 802.11. The deal author doesn't mess with
5:23
any frequencies. Instead, it sends a few Wi-Fi packets that tell some devices to disconnect
5:29
This lets us hit each target in a very specific way. A jammer just blocks all signals within a
5:35
certain range, so it's very illegal to use one. Number 6. Ubertooth One. The most well-known
5:42
Bluetooth hacking tool is UberTooth One. It's an open source 2.4 gigahertz wireless development
5:48
platform that can be used to hack Bluetooth. Commercial Bluetooth monitoring equipment can
5:53
easily cost more than $10,000. So the UberTooth was made as a low cost alternative platform from
5:59
monitoring and developing new BT, BLE and similar wireless technologies. UberTooth One is mainly
6:06
meant to be an advanced Bluetooth receiver. It has more features than regular adapters
6:10
so it can be used as a platform for sniffing and monitoring BT signals
6:15
Number 5. HackRF1 What a bunch of gadgets! HackRF1 is a software-defined radio or SDR accessory that can send and receive radio signals between 1 MHz and 6 GHz
6:28
made so that modern and next-generation radio technologies can be tested and worked on
6:33
We can read and change radio frequencies with this tool. HackRF1 is a piece of open-source hardware that can work as a USB peripheral or on its own
6:43
This SDR is better than other low-cost options in one important way
6:48
The radio frequency RF quality, on the other hand, is not as good as expected
6:53
Number 4. Wi-Fi Pineapple The Wi-Fi Pineapple was the first tool to attack Wi-Fi networks
7:00
It was made by Hack5. You can choose from three different models of Hack5
7:04
All of them are good, but the Mark 7 model was the best value for the money
7:09
This will save the results of audits of Wi-Fi networks that are done automatically
7:13
We can control it with a great interface on the web This is a great product for testing the security of wireless networks Number three USB rubber ducky The USB rubber ducky was made and developed
7:25
by Hack5. The HID specification or human interface device is everywhere because almost every computer
7:32
has a keyboard that people can use to enter data. Keyboards tell computers that they are HID devices
7:39
so computers automatically recognize and accept them. The USB rubber ducky sends out powerful payloads in seconds
7:46
by taking advantage of the target computer's natural trust while pretending to be a normal USB drive
7:52
In other words, if we plug it into a computer, the computer will recognize it as a keyboard and inject, type, save, and run our pre-programmed payload
8:02
This device can carry a wide range of payloads. We can also write our own code with ease
8:07
one of the easiest ways to break into a system is to get physical access to it
8:12
Number two, Raspberry Pi Zero W. This is a small handheld computer that's perfect for carrying the
8:19
best penetration testing software tools and all external hardware hacking tools. The best known cybersecurity distros for it are PwnP1 Aloha and Kali Linux. PwnP1 is a USB
8:31
attack platform that can be set up in many different ways. It's built around the inexpensive
8:36
Raspberry Pi Zero or Raspberry Pi Zero W. PwnP1's successor is PwnP1 Aloha. We recommend the USB
8:44
Type-A Pongo Pen adapter shown above. We can also use it without a head, without a monitor
8:50
This device is hooked up to a power bank in our bag and we can use our handheld mobile device to
8:54
control it using VNC. Number 1. Raspberry Pi 4. Raspberry Pi is the most popular single board
9:03
computer on the market. Almost all people who work in security use this device. This is very
9:08
helpful because we can put the whole Kali Linux distribution on this computer about the size of a
9:14
credit card. Raspberry Pi can be used in many other projects as well. It's used in many ways
9:19
by people who work in cybersecurity. In the fifth episode of the first season of Mr. Robot
9:25
Elliot hacks into the network that controls the temperature in order to destroy magnetic tapes
9:30
For a good hacker, the Raspberry Pi can be used for anything
9:34
Anyone who works in information security or programming needs to have this tool
9:39
Thank you so much for watching this video
#Computer Security
#Hacking & Cracking
#Hobbies & Leisure
#Antivirus & Malware
#Network Security


