Plunder Bug
Introduction
The Hak5 Plunder Bug is a compact, advanced LAN/Ethernet Tap that functions as a mini-switch, allowing for passive monitoring and active engagement via its USB-C port.
Bundled with an Android Root App that enabled packet-capture from your handset, and all necessary cross-platform connection scripts.
Functionality at a glance
The Plunder Bug is designed for System Administrators and Penetration Testers, providing previously impossible functionality from an ethernet tapping device.
In Passive Mode, network traffic can be sniffed, collected and analysed using tools such as WireShark. Combined with tools like pcapfex - automatically dump files recovered from sniffed data.
In Active Mode, the Plunder Bug acts as an unmanaged switch, essentially injecting your device into the network - allowing for standard network analysis and infiltration.
And, for those emergency situations where you need to get jacked into a network - it can even act as a simple USB-C to Ethernet Adaptor.
Small & Discreet
Seriously small form-factor
Dongle Free USB-C
Forget dongles: connect via USB-C
Monitor & Engage
Active & Passive Modes
Gigabit LAN Compatible
Supports 10/100/1000 LANs
Field Optimised
Android App for on-the-go sniffing
What's included
- 1x Hak5 Plunder Bug
- 1x USB-C Cable
- 1x Quick-Start Guide
Technical Specifications
- Supports Native 10/100 Base-T Fast Ethernet
- Supports Gigabit Ethernet (auto-degraded to 100MBit)
- ASIX AX88772C Ethernet Chipset
- 1x USB-C Tap / Power Port (5V @ 20 - 300mA)
- 2x RJ45 Ports
Shipping & Packaging
- Each Plunder Bug is dispatched from Europe - no need to worry about slow shipping times, import duties or damaged goods.
- Packed in a sturdy compact 85x130x45mm box.
- We provide worldwide shipping with express options.
Compatible Systems
- Windows: XP, 7, 8, 10 (All Versions)
- OS/X: 10.0 - 10.7 (All Versions)
- Linux: Debian, Ubuntu, CentOS, etc (All Versions)
- Android: Requires Rooted Device
- Hak5 Cloud C2 Compatible