Akademie — android

#pentestips Hands on the USB Ninja Professional

Geposted von Lab401 Lee am

#pentestips Hands on the USB Ninja Professional
In today's PTT, we'll walk through how to use the USBNinja Pro - from unpacking to payloading. Inspired by the NSA Project "COTTONMOUTH", the entire device is hidden inside a USB cable and controlled wirelessly!

Weiterlesen →

#pentestips: Know your "BadUSB"

Geposted von Lab401 Lee am

#pentestips: Know your "BadUSB"
"BadUSB" devices are innocent-looking USB-based devices that have ulterior motives and are typically found in every pentester's toolkit. today we learn a little more about them in #pentestips.

Weiterlesen →

#pentestips: HackRF with Android Smartphone : Duplicate a Fixed Code Alarm Remote

Geposted von Lab401 Lee am

#pentestips: HackRF with Android Smartphone : Duplicate a Fixed Code Alarm Remote
You can copy an RF remote in less than 5 seconds with the HACKRF one check out this #Pentestips !

Weiterlesen →

Proxmark 3 & Project Walrus: Easier Pentesting

Geposted von Lab401 Steve am

Proxmark 3 & Project Walrus: Easier Pentesting

Project Walrus is an an open-source Android-based tool that aims to provide a unified interface over multiple RFID devices.

Designed as a pentesting / red-teaming accessory, it also provides a centralised system for bulk-reading cards, card management, reading, writing and emulation.

Learn how to easily sniff, emulate and write LF and HF cards with Project Walrus.

Weiterlesen →