Skip to main content

Cool Tools for Hacking

 The good kind- hacking, "Hacking" in general ... when people hear that H word.. they think, some kid or malicious group fueled by energy drinks within RGB ambiance, sitting there mashing away at their keyboards dawning a hoodie.

Sure, that may be a sub group of individuals...

...but, hacking is ...

Well, have you ever taken something apart, curious of how it works? Or used your mouse and right clicked on a web site to inspect its "page source"? As a kid, have you ever dismantled something? Maybe took your action figures and switched a feature from one to the other? Added the shield off of Master Splinter and attached it to Jedi Sith- in your mind it made that figure better or solved some problem you dreamt up of. I myself took the blades off of (i forgot the Teenage Mutant Ninja Turtles enemy) and attached them to Leonardo, my favorite Teenaged Mutant Ninja Turtle. Made him look vicious and unstoppable... added some missile launchers to his back and other armor. I hacked my toys, you hacked your toiys.., you are a hacker.

Hacking isn't always negative- it's just a way of changing soimething, adapting something to meet a certain outconme/ a desired outcome- maybe to get data out of sonmething- maybe to make something better- maybe just to see how something just works...

The following are tools to use to do just that; to see how something 'ticks'..

https://signalens.com/signalsdrpro/

https://www.crowdsupply.com/newae/chipwhisperer-husky

Many more items found here













Comments

Popular posts from this blog

Miggitty Miggitty Mac Address

 Helping your router identify your WiFi adapter on your network. A Mac address is unique. Kinda like your device's fingerprint. It's made of 6 sets of 2 characters and separated by semiolonsì. A Mac address is comprised of letters and numbers. As an example; something like this ... 01:aa:gg:88:bb:ccp What Makes a Mac Address First six characters are classified as organizational unique identifier.. or OUI...  popular lookup tools/ databases are IEEE ieee Public Mac Address Look Up Tool... Online Search Tool by Wire Shark, to name a couple- there are many more...some more upto date than the other. If you can't locate the OUI within one, give the others a try.  A Tool such as the WiFi Pineapple can link directly to OUI resources giving us an efficient research tool for network analysis. OUI's For Research Utilising such data as an OUI can be of tremendous importance- providing shortcuts, Where once blind, guessing... now, knowing a manufacturer, can point us to default log...

Windows Doesn't recognize Your HackRF device? Wrong Drivers? Try ...

 Mostly for me to remember, but Windows at times has a lapse in judgement with certain devices, DIY gadgets, peripherals that you maybe trying to connect to- for me, it was my HackRF( I have since stumbled upon a better way to start for the HackF if having driver woes- which I will cover in another post- but keep reading, since this is still good knowledge to know regarding driver issues )- no matter what, my PC could not recognize the HackRF/ or would recognize it, but as a keyboard. I required Windows to apply the correct drivers to the device so that it could be recognized for what it is... a...SDR. A HackRF.  Guessing What's Right... Making Assumptions. Getting it Wrong. So, really what we see here is that when connecting that never connected before thing into your PC, Windows is making an assumption on what that thing is, and then applying the best driver that it thinks suites that thing... From experience, and a general rule of life... "assumptions" aren't the b...

Getting Down with Wireshark as a Network Monitoring Tool

Wireshark-  When you need to get down and dirty with individual packets, it's the undisputed champ. But what happens when you're trying to figure out what's actually going down on a high-speed, chaotic network? Not just  the wireless activity- getting more involved; seeing what is actually going on, what users on the network are active in/ their activities- what can we see? Scrolling through a billion packets to find out who's hogging all the bandwidth with Netflix isn't just a headache; it's practically impossible. Wireshark is a microscope, but sometimes you need a satellite view. You want to know the big picture: what apps are running, who the top talkers are, and if something sketchy is happening, without spending hours creating ridiculously complex filters. The Secret Sauce: ntop's nDPI Enter the total game-changer: nDPI (ntop Deep Packet Inspection) . Think of standard Wireshark as a mailman who only reads the outside of the envelope (the packet heade...