Invisible device. Penetrating into a local network with an ‘undetectable’ hacker gadget

Date: 29/07/2023

Unauthorized access to someone else’s device can be gained not only through a USB port, but also via an Ethernet connection – after all, Ethernet sockets are so abundant in modern offices and public spaces. In this article, I will explain how to penetrate into a local network using a special ‘invisible’ device and how this device operates.
Read full article →

Evil Ethernet. BadUSB-ETH attack in detail

Date: 07/07/2023

If you have a chance to plug a specially crafted device to a USB port of the target computer, you can completely intercept its traffic, collect cookies and passwords, and hack the domain controller. The attack is delivered over Wi-Fi, and this article explains how to implement it.
Read full article →

VERY bad flash drive. BadUSB attack in detail

Date: 07/07/2023

BadUSB attacks are efficient and deadly. This article explains how to deliver such an attack, describes in detail the preparation of a malicious flash drive required for it, provides code that must be written on this device, and discusses how to make Windows and Linux users plug your ‘memory stick’ into their computers.
Read full article →