Difference between revisions of "Sniffing Devices"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 4: Line 4:


== Wired Technologies ==
== Wired Technologies ==
* USB
* LAN
* LAN
* cable connected IoT protocols
* cable connected IoT protocols
=== USB ===
* [[USB Rubber Ducky]] - rogue USB attack stick re-writeable
* [[Bash Bunny]] - USB attack platform. It delivers penetration testing attacks and IT automation tasks in seconds by emulating combinations of trusted USB devices – like gigabit Ethernet, serial, flash storage and keyboards.
* [[Beagle USB 12 Protocol Analyzer]] - tool for debugging and monitoring traffic on your full- and low-speed USB based applications.
* [[Bugblat Minisniffer USB Protocol Analyzer]] - Compact, cross-platform hardware USB Protocol Analyzer. Capture, debug and analyse USB connections easily and economically.
* [[Forensic USB keylogger cable]] - USB keylogging cable can be accessed via WiFi, 8GB USB thumbdrive
* [[Key Croc - Smart Keylogger]] - Smart keylogger, Keystroke Injection, Network Hijacking, Detection Evasion via WiFi
* [[O.MG Cable Programmer USB]] - Programmer to exploit USB cable
* [[O.MG Demoseed EDU, malicious USB cable]] - Educational hardware implant kit, for assembling and programming a malicious USB cable.
* [[O.MG Exploit USB Cable USB-C to USB-A]] - Covert exploitation kit USB cable, runs a Webserver and works also as wireless access point
* [[O.MG Malcious USB Cable Detector]] - Detect malicous USB cables and block data while charging.
* [[Signal Owl]] - Portable SIGINT Platform, offering payload automation for Wifi, GPS, Bluetooth, SDR, etc
* [[USB Keylogger Max 8GB]] - USB keylogger can be accessed via WiFi, 8GB USB thumbdrive
* [[USB Killer Pro Kit V3]] - USB Killer instantly and permanently disables unprotected hardware
* [[USB Ninja Pro-kit with Remote control]] - covert USB exploit framework with coustom payloads functions as a USB cable and remotely triggered
* [[USB Ninja Remote Control]] - covert USB exploit framework with wireless remote trigger
* [[USB Power Delivery Analyzer]]


=== LAN - Ethernet ===
=== LAN - Ethernet ===

Revision as of 19:47, 15 November 2022

Summary

This documentary mentions sniffing devices of the Elvis Lab maintained at the date of 19-12-2021.

Wired Technologies

  • USB
  • LAN
  • cable connected IoT protocols

USB

LAN - Ethernet

Cable connected IoT protocols

Wireless Technologies

  • WiFi
  • Bluetooth LE (advertising only)
  • 802.15.4 (used by Zigbee, Xbee, 6LoWPAN)
  • ZWave (European frequency, 868MHz)
  • RFID + NFC

Wireless WiFi

802.11ac WiFi, Bluetooth 4.2

Bluetooth

Zigbee

802.15.4 (Zigbee, 6LoWPAN)

Z-Wave

LoRa

Wireless access point

RFID + NFC

  • Proxmark 3- for sniffing in low frequency ( 125kHz and 134kHz) and high frequency (13.56mHz) bands