Hacker attack and defense security hardware series
Network security personnel flash malicious Firmware firmware into the computer's chip (CPU), allowing unauthorized attackers to easily enter the system, but the computer administrators themselves cannot be found in the system. People who use this attack method are imaged. Call it "hardware hacking".
7个产品
-
WIFI coconut full spectrum sniffer
70.00 USDThere are 14 channels on the 2.4 GHz WiFi spectrum. Why packet sniff with only one radio? -
BadUSB hacker USB flash drive
20.00 USDSome viruses modify the firmware of a USB device to trick the operating system into detecting the USB device as a keyboard. As a result, viruses may execute commands under your user account to download malware, etc. -
HACKCHIP
80.00 USDEl Kentaro wanted a feature-rich hacking station, but wanted to keep it light, portable and unobtrusive. When he came across Next Thing Co. PocketCHIP, a pocket computer for MODs, he knew he had found the perfect platform for the project. PocketCHIP is easy to crack by design, but its real purpose is to be a portable retro gaming system (if marketing materials are any indication). -
PortaPow USB 2.0
10.00 USDUnlike most USB connectors, the PortaPow USB data blocker does not have any data-carrying wires, making it physically impossible to transmit unnecessary information in any direction. Thanks to PortaPow's SmartCharge chip, your charging time will not be affected by the fixed charging signal feature in similar products. If you're building a suite of hacking tools, be sure to add this. -
Portable Linux Kali USB flash drive
10.00 USDThis is a USB flash drive, integrated with KALI system, plug in your computer can access your system. -
REID Blocker
20.00 USDOur RFID Block cards protect your RFID/NFC cards (credit cards, ID cards, key cards, etc.) from digital theft. By placing the block card on the card you want to protect, thieves will not be able to access your data. -
iCopy-XS
90.00 USDiCopy-XS is a powerful portable RFID cloning device that uses proxmark software under the hood and contains an easy-to-use user interface that eliminates the hassle of RFID cloning. It supports most HF and LF cards on the market and is a must-have tool for penetration testers and security researchers.