Learn all about USB attacks, USB Rubber Ducky, HID Attacks, BadUSB, keystroke injections, WiFi jamming.

100% Off,Hacking,IT & Software,Paid Now Free

Ethical Hacking with Hardware Gadgets

7 Feb , 2018  

 

Requirements
  • General IT know-how
  • possibility of installing new software (Windows, macOS)
  • Interest in IT-Security and hardware projects
 
Description

In this course we will have a look at a couple of hardware gadgets which can be used for hacking.

USB Hacking

I will present you how a keystroke injection attack works and present USB sticks like USB Rubber Ducky and while show you how to write your own scripts to exploit this vulnerability. 

In a series of lecture I will show you how you can build a lower-cost version of the USB Rubber Ducky by using cheap Chinese made development boards which are compatible with the Arduino platform.

After you understand how the attack works and are able to build your own device, I will explain what options are available in order to protect yourself. 

WiFi jamming

WiFi Jammers or to call them more properly WiFi deauthers, are basically a very easy way of kicking everybody out from a specific Wi-Fi network and if wanted, making the Wi-Fi network useless. 

This section is dealing with a known vulnerability in the IEEE 802.11 (Wi-Fi) protocol even with WPA2. While the data you are transferring by the Wi-Fi network is encrypted and better protected, the problem are the so called management frames that are not always authenticated, thus allowing an attacker for example to disconnect the devices from the network by sending a so-called deauthentication frame, used to terminate a connection.

I will show you how it is done and what you can do to protect yourself.

Expected more?

I plan to explore other devices and attack techniques, based on your feedback!

Who is the target audience?
  • Users interested in IT-security and and privacy
  • Anyone who wants to extend their know-how in IT-security
  • Network / IT Administrators

Learn all about USB attacks, USB Rubber Ducky, HID Attacks, BadUSB, keystroke injections, WiFi jamming.

 

Ethical Hacking with Hardware Gadgets

 

 

 

Most Liked Related Post

, ,


Top Selling Courses

  • Learn how to create stunning website designs in Photoshop
  • Become an expert in the ethical hacking and network security tool Nmap!
  • The fastest way to actually master Java programming and become a dangerous developer!
  • Learn Android Development, Java & Android Studio from Scratch in 5 Weeks. Build Whatsapp Clone, Diary App & Android Apps
  • Learn advanced techniques to hack into WiFi & wired networks & write own python scripts to implement custom MITM attacks
  • The real deal behind Crypto Trading and ICO's.
  • Learn how to pick the most high-quality and game-changing ICOs in 2018 and onwards to help build your Retirement fund!